Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  Published Paper Details:

  Paper Title

COMPARATIVE ANALYSIS ON RESEARCH CHALLENGES, APPLICATIONS AND METHODOLOGIES FOR CYBER SECURITY THROUGH AI BASED ALGORITHMS

  Authors

  Sruthi Mol P,  Dr. Sathish Kumar N

  Keywords

Cyber Attacks, Intelligent Algorithms, Cognitive Science, Machine Learning, Deep Learning

  Abstract


Cyber analysts find it more and more challenging to efficiently monitor the volume, velocity, and diversity of data produced as the number of Internet-connected equipment grows. Cyber security tactics that rely on signatures are unlikely to deliver the performance needed to find new attack vectors. The development of advanced attack techniques that can evade detection by present security systems is also made possible by technical advancements. We require cutting-edge tools and technologies to identify, investigate, and take prompt action on new assaults and threats as the cyber threat scenario gets worse. To identify various sorts of attacks, a cyber-security system must be constructed. The use of various intelligence algorithms in cyber security enabled the detection and analysis of attacks on computer networks. Artificial intelligence, machine learning, and deep learning algorithms are used in cyber security to take the best feature representation possible out of a large data set. This has been used in a number of cyber security scenarios, including the analysis, prediction, and detection of attacks. The purpose of this work is to analyze cyber security attack datasets using clever methods. Additionally, it offers a thorough comparing of algorithm effectiveness and field application to explain the advantages of network protection optimization methods. We analyze the key traits of reflective deep learning approaches used in cyber security application domains, we bring the recent developments in deep learning, and we offer an insight of resources required like a systematic framework and appropriate datasets before analytically and comparably assessing state-of-the-art services from the research. We point out the shortcomings of the examined works and present a picture of the current problems in the field, offering helpful advice and best practices for academics and developers tackling relevant issues. Finally, we identify current research directions and pain issues that need to be addressed.

  IJCRT's Publication Details

  Unique Identification Number - IJCRT2310232

  Paper ID - 245046

  Page Number(s) - c34-c56

  Pubished in - Volume 11 | Issue 10 | October 2023

  DOI (Digital Object Identifier) -    http://doi.one/10.1729/Journal.36990

  Publisher Name - IJCRT | www.ijcrt.org | ISSN : 2320-2882

  E-ISSN Number - 2320-2882

  Cite this article

  Sruthi Mol P,  Dr. Sathish Kumar N,   "COMPARATIVE ANALYSIS ON RESEARCH CHALLENGES, APPLICATIONS AND METHODOLOGIES FOR CYBER SECURITY THROUGH AI BASED ALGORITHMS", International Journal of Creative Research Thoughts (IJCRT), ISSN:2320-2882, Volume.11, Issue 10, pp.c34-c56, October 2023, Available at :http://www.ijcrt.org/papers/IJCRT2310232.pdf

  Share this article

  Article Preview

  Indexing Partners

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer