WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Model based Solution for Preventing Modern Web-based Cyberattacks using Edge Computing, Artificial Intelligence and Cloud Computing

Avinash Sawade Sawade

Download Paper

Paper Contents

Abstract

Businesses are increasingly adopting web-based applications, which is leading to a rise in cyberattacks this leads to weaknesses in these applications. As threat actors continue to develop more creative attacks, it is harder for cyber defence technologies to keep pace. Attackers are always ready with creative attacks with the help of encoding schemes, obfuscated payloads, new 0-day exploits, etc. To prevent such web-based attacks the major defence mechanism implemented is the Web Application Firewall(WAF) but still, it gets bypassed with various tactics of payload and exploit development. To reduce the gap between attack strategies and defensive mechanisms there is a need of model based solution which will be in sync with the creative art of bypassing mechanisms adopted by threat actors. Along with the need for such a learning model, there is also a need for data pre-processing, analysis, and prevention of malicious inputs as near as possible to the client side. This model will be an extension to the existing Web Application firewall. The model must be based on advantage of cloud-based technologies, Edge computing, Artificial Intelligence, Machine learning, and Edge intelligence. The adoption of Edge computing and Edge Intelligence will help to avoid conflict between legit request and malicious request and will reduce the unnecessary data passing through and will work on the requests only which seems malicious. The request which seems malicious but not having rules and fingerprints to get detected by the firewall will be sent to the learning model situated in the cloud to realize the intent of the request and if deemed malicious will create a new rule to drop the request otherwise the request will be flagged as safe and allowed to pass through. The newly created rule will help to drop such malicious requests if received in the future.

Copyright

Copyright © 2023 Avinash Sawade. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS30100006791
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Mon-Fri: 9:00 AM - 5:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science.Designed and Developed by EVG Software Solutions All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us