Title
Veštačke neuronske mreže za detekciju veb napada
Creator
Stevanović, Nikola M., 1992
CONOR:
127609865
Copyright date
2025
Object Links
Select license
Autorstvo-Nekomercijalno-Bez prerade 3.0 Srbija (CC BY-NC-ND 3.0)
License description
Dozvoljavate samo preuzimanje i distribuciju dela, ako/dok se pravilno naznačava ime autora, bez ikakvih promena dela i bez prava komercijalnog korišćenja dela. Ova licenca je najstroža CC licenca. Osnovni opis Licence: http://creativecommons.org/licenses/by-nc-nd/3.0/rs/deed.sr_LATN. Sadržaj ugovora u celini: http://creativecommons.org/licenses/by-nc-nd/3.0/rs/legalcode.sr-Latn
Language
Serbian
Cobiss-ID
Theses Type
Doktorska disertacija
description
Datum odbrane: 15.07.2025.
Other responsibilities
University
Univerzitet u Nišu
Faculty
Prirodno-matematički fakultet
Group
Odsek za matematiku i informatiku
Alternative title
Artificial neural networks for web attack detection
Publisher
[N. Stevanović]
Format
101 list
description
Biografija autora: str. [103].
Bibliografija: str. [92-102].
description
Artificial intelligence
Abstract (en)
This dissertation presents a comprehensive approach to web attack
detection using artificial neural networks. The collection of diverse
malicious web traffic was carried out using honeypots, enabling the
creation of a robust dataset for training models to identify cyber
threats. The study addresses zero-day attack detection through various
machine learning techniques capable of identifying previously
unknown vulnerabilities in network traffic. To reduce catastrophic
forgetting in dynamic attack environments, the use of multiple
incremental learning strategies has been proposed, which enable
continuous model adaptation with minimal loss of previously
acquired knowledge. Тhe study introduces a population-based feature
selection method, which improves classification efficiency by
focusing on the most relevant network features. The dissertation
presents a deep learning model for phishing email detection, based on
the architectures of recurrent and convolutional neural networks.
Moreover, advanced feature weighting and embedding techniques are
employed to enhance phishing website detection. By integrating these
methods, this dissertation provides a scalable and adaptive solution
for real-time detection of web-based threats, offering significant
advancements in the fields of web security and machine learning.
Authors Key words
veštačke neuronske mreže, rekurentne neuronske mreže,
konvolucione neuronske mreže, odabir atributa, ponderisanje
atributa, inkrementalno učenje, sajber bezbednost, detekcija veb
napada, zamke, detekcija fišinga
Authors Key words
artificial neural networks, recurrent neural networks, convolutional
neural networks, feature selection, feature weighting, incremental
learning, cybersecurity, web attack detection, honeypots, phishing
detection
Classification
004.8(043.3)
Subject
P 176
Type
Tekst
Abstract (en)
This dissertation presents a comprehensive approach to web attack
detection using artificial neural networks. The collection of diverse
malicious web traffic was carried out using honeypots, enabling the
creation of a robust dataset for training models to identify cyber
threats. The study addresses zero-day attack detection through various
machine learning techniques capable of identifying previously
unknown vulnerabilities in network traffic. To reduce catastrophic
forgetting in dynamic attack environments, the use of multiple
incremental learning strategies has been proposed, which enable
continuous model adaptation with minimal loss of previously
acquired knowledge. Тhe study introduces a population-based feature
selection method, which improves classification efficiency by
focusing on the most relevant network features. The dissertation
presents a deep learning model for phishing email detection, based on
the architectures of recurrent and convolutional neural networks.
Moreover, advanced feature weighting and embedding techniques are
employed to enhance phishing website detection. By integrating these
methods, this dissertation provides a scalable and adaptive solution
for real-time detection of web-based threats, offering significant
advancements in the fields of web security and machine learning.
“Data exchange” service offers individual users metadata transfer in several different formats. Citation formats are offered for transfers in texts as for the transfer into internet pages. Citation formats include permanent links that guarantee access to cited sources. For use are commonly structured metadata schemes : Dublin Core xml and ETUB-MS xml, local adaptation of international ETD-MS scheme intended for use in academic documents.