Review Of Intrusion Detection System In Various E-Commerce Platforms
DOI:
https://doi.org/10.52783/jns.v14.3959Keywords:
Machine learning, e-commerce, malicious activity, threat detection framework, IDSAbstract
The twenty-first century has witnessed a rapid growth of technological advancements aiming to lead the world towards a new era of innovations. E-commerce is a phenomenal product of this innovatory stream, and its influence extends far beyond traditional retail. The application circle of e-commerce is widespread in almost every sector of our life, including areas such as healthcare, finance, education, and more, proving its validity and impact on our routine life vividly. E-commerce communications depend on modern devices such as laptops, personal computers, communication sensors, servers, switches, etc. The expanding domain of e-commerce applications is bringing the involvement of more communication devices, which raises a serious question about the security of the whole communication system. Integrating suspicious entities with the mainstream communication network may create malicious activities resulting in severe outcomes. Hence, we need a secure communication framework to ensure attack-efficient and reliable communication streams, especially in critical sectors like healthcare, where data privacy and system integrity are paramount. This paper reviews different efficient and secure electronic payment systems, with an emphasis on their application across various sectors, including healthcare, Supply chain.
Downloads
Metrics
References
F. Fernández-Bonilla, C. Gijón, and B. J. T. P. De la Vega, “E-commerce in Spain: Determining factors and the importance of the e-trust,” Telecommunications Policy vol. 46, no. 1, pp. 102280, 2022.
I. Zennaro, S. Finco, M. Calzavara et al., “Implementing E-Commerce from Logistic Perspective: Literature Review and Methodological Framework,” Sustainability vol. 14, no. 2, pp. 911, 2022.
A. H. Mohamad, G. F. Hassan, and A. S. J. A. S. E. J. Abd Elrahman, "Impacts of e-commerce on planning and designing commercial activities centres: A developed approach," Ain Shams Engineering Journal, vol. 13, no. 4, pp. 101634, 2022.
Q. Hu, T. Lou, J. Li et al., “New practice of e-commerce platform: Evidence from two trade-in programs,” vol. 17, no. 3, pp. 875-892, 2022.
M. Zeng, R. Liu, M. Gao et al., "Demand forecasting for rural E-commerce logistics: a grey prediction model based on weakening buffer operator," Mobile information systems vol. 2022, 2022.
S. Escursell, P. Llorach-Massana, and M. B. J. J. o. c. p. Roncero, “Sustainability in e-commerce packaging: A review,” Journal of cleaner production, vol. 280, pp. 124314, 2021.
M. Kolotylo-Kulkarni, W. Xia, and G. J. J. o. B. R. Dhillon, “Information disclosure in e-commerce: A systematic review and agenda for future research,” Journal of Business Research vol. 126, pp. 221-238, 2021.
H. Yu, Y. Zhao, Z. Liu et al., “Research on the financing income of supply chains based on an E-commerce platform,” Technological Forecasting and Social Change, vol. 169, pp. 120820, 2021.
T. Tokar, R. Jensen, and B. D. J. B. H. Williams, “A guide to the seen costs and unseen benefits of e-commerce,” A guide to the seen costs and unseen benefits of e-commerce., vol. 64, no. 3, pp. 323-332, 2021.
B. Givan, R. Wirawan, D. Andriawan et al., “Effect of Ease And Trustworthiness To Use E-Commerce for Purchasing Goods Online,” International Journal of Educational Research & Social Sciences, vol. 2, no. 2, pp. 277-282, 2021.
K. Zong, Y. Yuan, C. E. Montenegro-Marin et al., “Or-based intelligent decision support system for e-commerce,” Journal of Theoretical and Applied Electronic Commerce Research, vol. 16, no. 4, pp. 1150-1164, 2021.
S. Elia, M. Giuffrida, M. M. Mariani et al., “Resources and digital export: An RBV perspective on the role of digital technologies and capabilities in cross-border e-commerce,” Journal of Business Research, vol. 132, pp. 158-169, 2021.
R. K. Jamra, B. Anggorojati, D. I. Sensuse et al., "Systematic Review of Issues and Solutions for Security in E-commerce." pp. 1-5.
M. A. Hassan, Z. Shukur, and M. K. J. c. Hasan, “An efficient secure electronic payment system for e-commerce,” computers, vol. 9, no. 3, pp. 66, 2020.
J. Wang, "Research on the Construction of Integrated Management Information System for E-commerce Enterprises Based on Cloud Computing." pp. 1039-1042.
H. Treiblmaier, C. J. E. C. R. Sillaber, and Applications, “The impact of blockchain on e-commerce: a framework for salient research topics,” vol. 48, pp. 101054, 2021.
R.-C. Härting, and C. Reichstein, "Potential Use of Bitcoin in B2C E-commerce." pp. 33-40.
J. Zhang, S. Nazir, A. Huang et al., “Multicriteria decision and machine learning algorithms for component security evaluation: library-based overview,” Security and Communication Networks 2020, vol. 2020, 2020.
S. Vinoth, H. L. Vemula, B. Haralayya et al., “Application of cloud computing in banking and e-commerce and related security threats,” Materials Today: Proceedings, vol. 51, pp. 2172-2175, 2022.
R. Kozik, M. Pawlicki, M. Szczepański et al., "Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment." pp. 257-266.
I. D’Adamo, R. González-Sánchez, M. S. Medina-Salgado et al., "E-commerce calls for cyber-security and sustainability: How European citizens look for a trusted online environment," Sustainability, vol. 13, no. 12, pp. 6752, 2021.
H. Pallathadka, E. H. Ramirez-Asis, T. P. Loli-Poma et al., “Applications of artificial intelligence in business management, e-commerce and finance,” Materials Today: Proceedings, 2021.
M. Korkmaz, O. K. Sahingoz, and B. Diri, "Detection of phishing websites by using machine learning-based URL analysis." pp. 1-7.
F. Behgounia, B. J. I. J. o. C. S. Zohuri, and I. Security, “Machine Learning Driven An E-Commerce,” International Journal of Computer Science and Information Security (IJCSIS), vol. 18, no. 10, 2020.
M. Zhang, L. Lin, and Z. J. C. C. Chen, “Lightweight security scheme for data management in E-commerce platform using dynamic data management using blockchain model,” Lightweight security scheme for data management in E-commerce platform using dynamic data management using blockchain model." Cluster Computing (2021): 1-15., pp. 1-15, 2021.
N. L. Bhatia, V. K. Shukla, R. Punhani et al., "Growing Aspects of Cyber Security in E-Commerce." pp. 1-6.
M. Li, L. Zhu, Z. Zhang et al., “Anonymous and verifiable reputation system for E-commerce platforms based on blockchain,” IEEE Transactions on Network and Service Management, vol. 18, no. 4, pp. 4434-4449, 2021.
M. J. Girsang, R. Hendayani, and Y. Ganesan, "Can Information Security, Privacy and Satisfaction Influence The E-Commerce Consumer Trust?." pp. 1-7.
Z. Zhu, Y. Bai, W. Dai et al., “Quality of e-commerce agricultural products and the safety of the ecological environment of the origin based on 5G Internet of Things technology,” Environmental Technology & Innovation 22 (2021): 101462., vol. 22, pp. 101462, 2021.
L. T. T. J. J. o. R. Tran, and C. Services, “Managing the effectiveness of e-commerce platforms in a pandemic,” Journal of Retailing and Consumer Services 58 (2021): 102287, vol. 58, pp. 102287, 2021.
Z. Zhu, Y. Bai, W. Dai et al., “Quality of e-commerce agricultural products and the safety of the ecological environment of the origin based on 5G Internet of Things technology,” Environmental Technology & Innovation, 22, 101462., vol. 22, pp. 101462, 2021.
M. H. Gouthier, C. Nennstiel, N. Kern et al., “The more the better? Data disclosure between the conflicting priorities of privacy concerns, information sensitivity and personalization in e-commerce,” Journal of Business Research vol. 148, pp. 174-189, 2022.
O. Saritas, P. Bakhtin, I. Kuzminov et al., "Big data augmented business trend identification: the case of mobile commerce," Scientometrics 126.2 (2021): 1553-1579., vol. 126, no. 2, pp. 1553-1579, 2021.
J.-P. A. Yaacoub, O. Salman, H. N. Noura et al., “Cyber-physical systems security: Limitations, issues and future trends,” Microprocessors and microsystems 77 (2020): 103201., vol. 77, pp. 103201, 2020.
M. Aliyu, M. Umar, N. J. S. J. o. S. Salisu et al., “Assessing User’s Perception on Security Challenges of Selected E-Commerce Websites in Nigeria,” SLU Journal of Science and Technology, 4(1&2), 177-187., vol. 4, no. 1&2, pp. 177-187, 2022.
Verma, S.B., Yadav, A.K. (2021). Hard Exudates Detection: A Review., Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9927-9_12
SB Verma, Brijesh P., and BK Gupta, Containerization and its Architectures: A Study, ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, Vol. 11 N. 4 (2022), 395-409, eISSN: 2255-2863, DOI: https://doi.org/10.14201/adcaij.28351
Anamika Agarwal, S. B. V., B. K. Gupta, A Review of Cloud Security Issues and Challenges, ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, Issue, Vol. 12 N. 1 (2023), pp 1-22, eISSN: 2255-2863, 2023, https://doi.org/10.14201/adcaij.31459
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.