Advanced modelling and recurrent analysis in network security: Scrutiny of data and fault resolution
1 Automation / Process Control Engineer, Gist Limited, London, United Kingdom.
2 Oriental Energy Resources Limited, Lagos, Nigeria.
3 Senior Software Engineer, Cross over health, USA.
Research Article
World Journal of Advanced Research and Reviews, 2024, 23(02), 2373–2390
Article DOI: 10.30574/wjarr.2024.23.2.2582
Publication history:
Received on 17 July 2024; revised on 24 August 2024; accepted on 26 August 2024
Abstract:
This research dealt with the critical integration of advanced modelling techniques and recurrent analysis within network security, with a primary goal of enhancing the critical analysis of network data and improving fault resolution processes. The study focuses on the development of advance, predictive models capable of identifying and mitigating security threats in real-time, leveraging the power of Recurrent Neural Networks (RNNs) alongside other sophisticated machine learning techniques. By harnessing the dynamic capabilities of these models, the research aims to address the growing complexity and sophistication of network threats, which require continuous monitoring and adaptive responses. Also, the study investigates the effectiveness of these advanced models in environments where network conditions are constantly evolving, necessitating security protocols that can dynamically adjust to new and emerging threats. Through rigorous data scrutiny and recurrent analysis, the research seeks to establish fault resolution mechanisms that not only detect and neutralize immediate security breaches but also anticipate potential vulnerabilities before they can be exploited. Ultimately, this research contributes to the advancement of network security by providing a framework that integrates cutting-edge technology with real-time adaptability, ensuring that security measures remain robust and effective in the face of ever-changing digital threats.
Keywords:
Recurrent Neural Networks (RNNs); Network Security; Predictive Modelling; Fault Resolution; Real-Time Threat Mitigation; Adaptive Security Protocols
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0