2021
DOI: 10.1108/ijpcc-04-2021-0102
|View full text |Cite
|
Sign up to set email alerts
|

An enhanced network intrusion detection system for malicious crawler detection and security event correlations in ubiquitous banking infrastructure

Abstract: Purpose In the recent era, banking infrastructure constructs various remotely handled platforms for users. However, the security risk toward the banking sector has also elevated, as it is visible from the rising number of reported attacks against these security systems. Intelligence shows that cyberattacks of the crawlers are increasing. Malicious crawlers can crawl the Web pages, crack the passwords and reap the private data of the users. Besides, intrusion detection systems in a dynamic environment provide m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 40 publications
(41 reference statements)
0
2
0
Order By: Relevance
“…However, there are still some unethical crawlers who attempt to deceive web servers and management to conceal their actual identities. Complex and compound procedures should be used to find unethical crawlers [9], [10]. A web crawler that automatically finds and retrieves every website page is used to gather web pages.…”
Section: Introductionmentioning
confidence: 99%
“…However, there are still some unethical crawlers who attempt to deceive web servers and management to conceal their actual identities. Complex and compound procedures should be used to find unethical crawlers [9], [10]. A web crawler that automatically finds and retrieves every website page is used to gather web pages.…”
Section: Introductionmentioning
confidence: 99%
“…Current gait analysis methods have shown reasonable performance; however these methods have only been tested on benchmarks with as few as ten participants [6]. Subsequently, DARPA's Human ID at a Distance (HumanID) [7][8][9] programme promoted not only methodologies but also datasets in its second stage. Several template-based methods [10][11][12] stand out as the most common automatic recognition methods nowadays.…”
Section: Introductionmentioning
confidence: 99%