Paradigm Shift in Adaptive Cyber Defense for Securing the Web Data
Keywords:
Web applications, CybersecurityAbstract
In response to the growing demand for complicated computer tasks and handling large amounts of data, web applications are becoming more sophisticated. However, with the rapid advancements in online technology come significant concerns over security. Attackers are becoming more skilled and well-prepared, and cyberthreats are growing swiftly. Data transmitted via the internet must be more dependable and safer. Certain techniques, known as data provenance-aware techniques, are able to identify instances of data manipulation or unlawful access. They thoroughly examine the data to identify any potential risks and defend against various forms of assaults. Keeping web data and applications safe is a challenge for those in the cybersecurity field, especially as more people use the internet because these techniques can manage issues like missing or ambiguous information and are more effective at defending against internet attacks. They strengthen security by utilizing concepts found in nature, such as deception and camouflage. The effectiveness of these techniques for protecting web data and apps and developing more intelligent security measures will be examined in this article.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Dosanapudi Uday Kumar, Petikam Sai Rishi, Penmetsa Sai Ganesh Raju, Vemana Lekhaj Valli Kumar
This work is licensed under a Creative Commons Attribution 4.0 International License.