企业虚拟世界中的网络安全攻击检测线程

M. R., A. Jayanthila Devi
{"title":"企业虚拟世界中的网络安全攻击检测线程","authors":"M. R., A. Jayanthila Devi","doi":"10.47992/ijcsbe.2581.6942.0261","DOIUrl":null,"url":null,"abstract":"Purpose: Attempting to get access to a computer, computer network, or computing system without authorization is known as a cyber-attack. To modify, impede, erase, manipulate or steal data from computer systems is the purpose of a cyber-attack. These attacks may be carried out in a number of ways. This placeholder information is used to identify a single instance of the use of a prgramme that may support numerous users at once. A thread is information that a programme requires to serve a single user or a single service request. Cybercriminals make use of technology to do malicious actions on digital systems or networks in order to make a profit. These crimes include hacking computer systems and stealing confidential information from businesses and individuals. A thorough study on the algorithms to detect threats in the virtual world of corporate sectors.\nFinding/Result: Researchers are using a wide array of deep learning algorithms to achieve this goal, and the results have been rather impressive. A system like this may provide substandard results because to its limited ability to describe the problem area and the complexity of its modeling of hazardous behaviours. Supervised learning systems often deliver a high level of accuracy because of the large amount of data made available by manually labelled samples.\nOriginality/Value: Antivirus software is an absolute need for any and all computers. The vast majority of antivirus software is able to identify malicious software such as malware, spyware, ransomware, and harmful email attachments. \nPaper Type: Literature Review.","PeriodicalId":350972,"journal":{"name":"International Journal of Case Studies in Business, IT, and Education","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors\",\"authors\":\"M. R., A. Jayanthila Devi\",\"doi\":\"10.47992/ijcsbe.2581.6942.0261\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Purpose: Attempting to get access to a computer, computer network, or computing system without authorization is known as a cyber-attack. To modify, impede, erase, manipulate or steal data from computer systems is the purpose of a cyber-attack. These attacks may be carried out in a number of ways. This placeholder information is used to identify a single instance of the use of a prgramme that may support numerous users at once. A thread is information that a programme requires to serve a single user or a single service request. Cybercriminals make use of technology to do malicious actions on digital systems or networks in order to make a profit. These crimes include hacking computer systems and stealing confidential information from businesses and individuals. A thorough study on the algorithms to detect threats in the virtual world of corporate sectors.\\nFinding/Result: Researchers are using a wide array of deep learning algorithms to achieve this goal, and the results have been rather impressive. A system like this may provide substandard results because to its limited ability to describe the problem area and the complexity of its modeling of hazardous behaviours. Supervised learning systems often deliver a high level of accuracy because of the large amount of data made available by manually labelled samples.\\nOriginality/Value: Antivirus software is an absolute need for any and all computers. The vast majority of antivirus software is able to identify malicious software such as malware, spyware, ransomware, and harmful email attachments. \\nPaper Type: Literature Review.\",\"PeriodicalId\":350972,\"journal\":{\"name\":\"International Journal of Case Studies in Business, IT, and Education\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Case Studies in Business, IT, and Education\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47992/ijcsbe.2581.6942.0261\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Case Studies in Business, IT, and Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47992/ijcsbe.2581.6942.0261","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

目的:试图未经授权进入计算机、计算机网络或计算系统被称为网络攻击。修改、阻碍、清除、操纵或窃取计算机系统中的数据是网络攻击的目的。这些攻击可能以多种方式进行。此占位符信息用于标识可能同时支持多个用户的程序的单个使用实例。线程是程序为单个用户或单个服务请求提供服务所需的信息。网络犯罪分子利用技术对数字系统或网络进行恶意操作,以获取利润。这些犯罪包括入侵计算机系统和窃取企业和个人的机密信息。对企业部门虚拟世界中威胁检测算法的深入研究。发现/结果:研究人员正在使用广泛的深度学习算法来实现这一目标,结果相当令人印象深刻。这样的系统可能会提供不合格的结果,因为它描述问题区域的能力有限,而且它对危险行为的建模很复杂。监督学习系统通常提供高水平的准确性,因为人工标记的样本提供了大量数据。独创性/价值:杀毒软件是任何和所有计算机的绝对需要。绝大多数杀毒软件能够识别恶意软件,如恶意软件、间谍软件、勒索软件和有害的电子邮件附件。论文类型:文献综述。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cyber Security Attacks Detecting Thread in the Virtual World of Corporate Sectors
Purpose: Attempting to get access to a computer, computer network, or computing system without authorization is known as a cyber-attack. To modify, impede, erase, manipulate or steal data from computer systems is the purpose of a cyber-attack. These attacks may be carried out in a number of ways. This placeholder information is used to identify a single instance of the use of a prgramme that may support numerous users at once. A thread is information that a programme requires to serve a single user or a single service request. Cybercriminals make use of technology to do malicious actions on digital systems or networks in order to make a profit. These crimes include hacking computer systems and stealing confidential information from businesses and individuals. A thorough study on the algorithms to detect threats in the virtual world of corporate sectors. Finding/Result: Researchers are using a wide array of deep learning algorithms to achieve this goal, and the results have been rather impressive. A system like this may provide substandard results because to its limited ability to describe the problem area and the complexity of its modeling of hazardous behaviours. Supervised learning systems often deliver a high level of accuracy because of the large amount of data made available by manually labelled samples. Originality/Value: Antivirus software is an absolute need for any and all computers. The vast majority of antivirus software is able to identify malicious software such as malware, spyware, ransomware, and harmful email attachments. Paper Type: Literature Review.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Go Green: ReUse LED Tube Light and Make it WhatsApp Enabled Using ESP Module, Twilio, and ThingESP Uplifting Brand Equity to Unprecedented levels by Introducing Purpose as the New 8th 'P' in the Marketing Mix Unlocking Potential in the Chemical Industry Sector: An Innovative SWOT Analysis Study Quantitative ABCD Analysis: Indian Household and Personal Care Sector Jung Personality Complexes: Evidence from Mahabharata Characters
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1