Neural Net Architecture Strategy Identifying Zero-Day Attacks in the Dark Web

Neural Net Architecture Strategy Identifying Zero-Day Attacks in the Dark Web

Shruthi J., Sumathi M. S., Bharathi R., Vidya R. Pai
ISBN13: 9781668439425|ISBN10: 1668439425|ISBN13 Softcover: 9781668439432|EISBN13: 9781668439449
DOI: 10.4018/978-1-6684-3942-5.ch007
Cite Chapter Cite Chapter

MLA

Shruthi J., et al. "Neural Net Architecture Strategy Identifying Zero-Day Attacks in the Dark Web." Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence, edited by Romil Rawat, et al., IGI Global, 2022, pp. 86-102. https://doi.org/10.4018/978-1-6684-3942-5.ch007

APA

Shruthi J., Sumathi M. S., Bharathi R., & Pai, V. R. (2022). Neural Net Architecture Strategy Identifying Zero-Day Attacks in the Dark Web. In R. Rawat, S. Telang, P. William, U. Kaur, & O. C.U. (Eds.), Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence (pp. 86-102). IGI Global. https://doi.org/10.4018/978-1-6684-3942-5.ch007

Chicago

Shruthi J., et al. "Neural Net Architecture Strategy Identifying Zero-Day Attacks in the Dark Web." In Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence, edited by Romil Rawat, et al., 86-102. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-6684-3942-5.ch007

Export Reference

Mendeley
Favorite

Abstract

Companies must foresee most critical security threats to keep one step ahead of attackers. Because attackers always refine their techniques to avoid detection and because attackers are persistently imaginative, network traffic analysis solutions have evolved providing organizations with a feasible path forward. Maintaining network visibility has gotten more challenging and time demanding as DevOps, cloud computing, and IoT (internet of things) gain popularity. Network traffic analysis can incorporate its core functionalities to detect malicious intent. The authors developed a unique darknet traffic analysis and network management solution to automate the malicious intent detection process. This strong computational intelligence forensics tool decodes network traffic, viral traffic, and encrypted communication. WANNs, a weight-independent neural network design, can detect zero-day threats. With a sophisticated solution, many businesses can protect their most valuable assets from malicious intent detection on the dark web.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.