Neural Networks and Rules-based Systems used to Find Rational and Scientific Correlations between being Here and Now with Afterlife Conditions
Neural Networks and Rules-based Systems used to Find Rational and
Article Fingerprint
ReserarchID
CSTNWS22J06
This paper will present an innovative system method of IPR (IP Address Reputation) validation with the assistance of clause of (ML) machine learning for discovering malicious IPs, while also viewing the importance of security of installed applications on AWS (Amazon Web Services) servers. The ML, SANS and AbuseDB datasets that were verified are being integrated through the Wazuh Security Operation Centre (SOC) stage to consume issues at the log ingesting IP address-related level. Having integrated extraction of IPs Wazuh agents, the output does match MITRE ATT&CK framework-filtered IP address from the Wazuh SOC. These algorithms and models based on natural language processing will flag suspicious patterns across IPs through the process of machine learning and prevent the event of a cyberattack at the time. This integration not only boosts cybersecurity information through a single point source of distribution, but it also provides security finds and other resources to prove and maintain awareness against malicious IPs. The final solution includes using the maximum amounts of bad IPs blocking in the ‘IP-List’ of AWS WAF and, if they are added to the Blacklist automatically, checking them through an automatic ML-based signature validation process.
Chanaka Lasantha Nanayakkara. 2026. \u201cDefending Cloud Web Applications Using Machine Learning-Driven Triple Validation of IP Reputation by Integrating Security Operation Center\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 24 (GJCST Volume 24 Issue E1): .
Article file ID not found.
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
The methods for personal identification and authentication are no exception.
The methods for personal identification and authentication are no exception.
Total Score: 103
Country: Sri Lanka
Subject: Global Journal of Computer Science and Technology - E: Network, Web & Security
Authors: Chanaka Lasantha Nanayakkara, Ruvan Abeysekara, MWP Maduranga (PhD/Dr. count: 0)
View Count (all-time): 242
Total Views (Real + Logic): 1044
Total Downloads (simulated): 19
Publish Date: 2026 01, Fri
Monthly Totals (Real + Logic):
Neural Networks and Rules-based Systems used to Find Rational and
A Comparative Study of the Effeect of Promotion on Employee
The Problem Managing Bicycling Mobility in Latin American Cities: Ciclovias
Impact of Capillarity-Induced Rising Damp on the Energy Performance of
This paper will present an innovative system method of IPR (IP Address Reputation) validation with the assistance of clause of (ML) machine learning for discovering malicious IPs, while also viewing the importance of security of installed applications on AWS (Amazon Web Services) servers. The ML, SANS and AbuseDB datasets that were verified are being integrated through the Wazuh Security Operation Centre (SOC) stage to consume issues at the log ingesting IP address-related level. Having integrated extraction of IPs Wazuh agents, the output does match MITRE ATT&CK framework-filtered IP address from the Wazuh SOC. These algorithms and models based on natural language processing will flag suspicious patterns across IPs through the process of machine learning and prevent the event of a cyberattack at the time. This integration not only boosts cybersecurity information through a single point source of distribution, but it also provides security finds and other resources to prove and maintain awareness against malicious IPs. The final solution includes using the maximum amounts of bad IPs blocking in the ‘IP-List’ of AWS WAF and, if they are added to the Blacklist automatically, checking them through an automatic ML-based signature validation process.
We are currently updating this article page for a better experience.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.