ADAPTIVE MODEL FOR PROTECTION OF ELECTRONIC RESOURCES AGAINST INFORMATION SECURITY THREATS

Authors

  • Komil Kerimov Department of System and Applied Programming, Tashkent University of Information Technologies named after Muhammad al-Khwarizmi (UZ)
  • Zarina Azizova Department of Information Security Tashkent University of Information Technologies named after Muhammad al-Khwarizmi (UZ)

DOI:

https://doi.org/10.17770/etr2024vol4.8217

Keywords:

adaptability, threat, behavioural analysis, information security, electronic resource, cross-site scripting (XSS), SQL-injection

Abstract

The rapid development of digitalization and the creation of electronic resources, in areas such as e-commerce, government portals and others leads to the actualization of data protection issues. The protection of electronic resources is becoming more and more relevant every day. This article presents the concept of adaptive protection of electronic resources from information security threats. In the course of this research, an adaptive model of protection of electronic resources from threats to information security based on behavioral analysis was developed.


Downloads

Download data is not yet available.

References

A. Makiou, Y. Begriche and А. Serhrouchni, "Improving Web Application Firewalls to detect advanced SQL injection attacks," presented at 10th International Conference on Information Assurance and Security, Japan, 2014.

E. Raff, J. Barker, J. Sylvester and R. Brandon, "Malware Detection by Eating a Whole EXE," presented at the Workshops of the Thirty-Second AAAI Conference on Artificial Intelligence, Ithaca, NY, 2017.

M. Ito and H. Iyatomi, "Web application firewall using character-level convolutional neural network," presented at the 14th International Colloquium on Signal Processing & Its Applications (CSPA), Penang, Malaysia, 2018.

K. Pranathi, S. Kranthi, A. Srisaila and P. Madhavilatha, "Attacks on Web Application Caused by Cross-Site Scripting," presented at the 2nd International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 2018.

P. N. Joshi, N. Ravishankar, M. B. Raju and C. N. Ravi, "Encountering SQL Injection in Web Applications," presented at the 2nd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2018, pp. 257-261.

A. Jana, P. Bordoloi and D. Maity, "Input-based Analysis Approach to Prevent SQL Injection Attacks," presented at the 2020 IEEE Region 10 Symposium (TENSYMP), Dhaka, Bangladesh, 2020.

B. I. Mukhtar and M. A. Azer, "Evaluating the Modsecurity Web Application Firewall Against SQL Injection Attacks," presented at the 15th International Conference on Computer Engineering and Systems (ICCES), Cairo, Egypt, 2020.

Downloads

Published

2024-06-22

How to Cite

[1]
K. Kerimov and Z. Azizova, “ADAPTIVE MODEL FOR PROTECTION OF ELECTRONIC RESOURCES AGAINST INFORMATION SECURITY THREATS”, ETR, vol. 4, pp. 144–149, Jun. 2024, doi: 10.17770/etr2024vol4.8217.