Author
Listed:
- Pooja Yadav
(Computer Science and Engineering, Birla Institute of Technology, Patna, Bihar, 800014, India)
- Ajit Kumar Keshri
(Computer Science and Engineering, Birla Institute of Technology, Patna, Bihar, 800014, India)
Abstract
Nowadays, hackers can exploit unprotected e-commerce networks to attack an e-commerce network. As Malware becomes increasingly prevalent, diverse and sophisticated, recent studies highlight the effectiveness of deep Convolutional Neural Networks (CNNs) in detecting malware through attack classification. The background of this is complicated by factors such as data immutability, buyer, fraud and social network attacks. To overcome these issues, our proposed Convolution-based Buffalo Optimization (CbBO) is developed. To increase the performance, traditional buffalo optimization can be combined in a hybrid way with neural networks. The process of buffalo optimization entails identifying the best options depending on herd behavior. It may be necessary to alter how the optimization procedure searches the hyperparameter space to adapt this method to CNNs. Create a fitness feature that assesses CNN’s performance, especially regarding malware detection. Moreover, this research acts as the security classifier for e-commerce systems to identify attack variants and enhance security attack detection. Additionally, a technical model is developed to depict the dynamism of the model’s constituent parts. In the context of e-commerce security, our study will present simulation results to assess the effectiveness of the proposed paradigm. The CbBO model has been implemented using the Python platform and experimental validation demonstrates its capability to achieve 96% accuracy in effectively identifying DDoS attacks.
Suggested Citation
Pooja Yadav & Ajit Kumar Keshri, 2025.
"Enhancing the Security of E-Commerce Systems Against Various Types of Attacks Using Deep Learning Model,"
International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 24(06), pages 1801-1824, August.
Handle:
RePEc:wsi:ijitdm:v:24:y:2025:i:06:n:s0219622025500233
DOI: 10.1142/S0219622025500233
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wsi:ijitdm:v:24:y:2025:i:06:n:s0219622025500233. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Tai Tone Lim (email available below). General contact details of provider: http://www.worldscinet.com/ijitdm/ijitdm.shtml .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.