MOBILE APPLICATION SECURITY ANALYSIS MODEL BASED ON ARTIFICIAL INTELLIGENCE
DOI:
https://doi.org/10.26906/SUNZ.2025.1.124-128Keywords:
neural network, ML, DL, ANN, mobile application, cyber threat, firewallAbstract
The article considers the possibilities of using neural networks to ensure a secure environment for using devices.
It reviews several neural network architectures that are already used to prevent attacks by attackers, the main areas of attack
on mobile applications, and learning algorithms. It describes the features of using recurrent neural networks to analyze the
dangerous space. The results of the article show that neural networks can be an effective tool for preventing data loss and
hacker attacks. However, further research is needed to optimize the architecture and parameters of neural networks to improve
the accuracy of threat detection.
Downloads
References
1. Drahuntsov R., Rabchun D. and Brzhevska Z. (2020) “PRINCIPLES OF ENSURING SECURITY OF INFORMATION publication “Cybersecurity: education, science, technology”. No. 4 (8). P. 49-60. DOI: https://doi.org/10.28925/2663-4023.2020.8.4960
2. Enck W., Ongtang M. and McDaniel P. (2009) “Understanding android security”. IEEE security & privacy. No. 1. P. 50-57. DOI: https://doi.org/10.1109/MSP.2009.26
3. Sosnovy V.O. and Zamriy I.V. (2022) “NETWORK SECURITY USING A RECURRENT NEURAL NETWORK”. Electronic specialist scientific publication “Word of a Scientist”. No. 5. P. 21-24.
4. Ivanichenko, Y., Sablina, M. and Kravchuk, K. (2021) “USING MACHINE LEARNING IN CYBER SECURITY”. Electronic professional scientific publication “Cybersecurity: education, science, technology”. No. 4 (12). P. 132-142. DOI: https://doi.org/10.28925/2663-4023.2021.12.132142
5. Attack indicators based on artificial intelligence allow you to predict and stop threats as quickly as possible: website. URL:https://iitd.com.ua/news/
6. Sharma B., Mangrulkar R. (2019) “Deep learning applications in cyber security: a comprehensive review, challenges and prospects”. International Journal of Engineering Applied Sciences and Technology. No. 4(8). P. 148-159. DOI: https://doi.org/10.33564/IJEAST.2019.v04i08.023
7. Lakhno V., Yerbolat K., Bagdat Y., Kryvoruchko O., Desiatko A., Tsiutsiura S. (2022). “Local network protection model of educational institution server virtualization system”. Cybersecurity: education, science, technology. No. 2 (18). P. 6-23. DOI: https://doi.org/10.28925/2663-4023.2022.18.623
8. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin and A. Courville. (2017) “Improved training of Wasserstein GANs”. In Proc. of the 31st Int. Conf. on Neural Information Processing Systems. P. 5769-5779.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.