A Novel Approach of BRELU RESNET Based Cyber Attack Detection System with BAIT Based Approach for Mitigation

S. Prabhu, Nethravathi P. S.
{"title":"A Novel Approach of BRELU RESNET Based Cyber Attack Detection System with BAIT Based Approach for Mitigation","authors":"S. Prabhu, Nethravathi P. S.","doi":"10.47992/ijaeml.2581.7000.0134","DOIUrl":null,"url":null,"abstract":"Purpose: Industrial Control Systems become more vulnerable to digital attacks by merging communication groups and the Internet of Things, which could have severe implications. An Intrusion Detection System is essential in IoT businesses for identifying and stopping assaults. To ensure data privacy and security in the face of digital attacks, legislation and large enterprises should develop network security policies today. As people-based full frameworks have become more vital in today's society, they've also become targets for hostile activities, compelling both industry and research to concentrate more on dealing with local area disruption recognition issues. Contraption reviewing techniques have shown to be effective tools for resolving in-network interruption location issues.\n\nDesign/Methodology/Approach: This investigation yielded a very unique strategy for tackling hub moderation utilizing a Classification and Encryption method. The UNSW-NB15 dataset is acquired and divided into Data for preparation and testing from the start. The information is pre-handled and included are eliminated right away within the preparation time frame. The TWM Algorithm is then used to determine the relevant highlights from that moment onward. The BRELU-RESNET classifier then sorts the input into went after and non-went after categories. The compromised information is then saved in the security log record, and the typical data is encrypted using the ESHP-ECC computation. The shortest path distance is then calculated using Euclidean distance. Finally, the data is available. Finally, using the DSHP-ECC computation, the information is decrypted. If the information is available in the log document during testing, it is regarded as the sought-after data and is prevented from the transmission. If it is not present, then the process of digital assault recognition begins.\n\nFindings/Result: The research is based on the UNSW-NB 15 dataset, which shows that the proposed method achieves an unreasonable awareness level of 98.34 percent, particularity level of 77.54 percent, exactness level of 96.6 percent, Precision level of 97.96 percent, review level of 98.34 percent, F-proportion of 98.15 percent, False Positive Rate of 22.46 percent, False Negative Rate of 1.66 percent, and Matthew's connection coefficient of 77.38\n\nOriginality/Value: This experimental-based research article examines the malicious activities in the cyberspace using BRELU-RESNET approach and mitigated by using BAIT based approach mechanism.\n\nPaper Type: Research Analysis.","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"355 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Applied Engineering and Management Letters","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47992/ijaeml.2581.7000.0134","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose: Industrial Control Systems become more vulnerable to digital attacks by merging communication groups and the Internet of Things, which could have severe implications. An Intrusion Detection System is essential in IoT businesses for identifying and stopping assaults. To ensure data privacy and security in the face of digital attacks, legislation and large enterprises should develop network security policies today. As people-based full frameworks have become more vital in today's society, they've also become targets for hostile activities, compelling both industry and research to concentrate more on dealing with local area disruption recognition issues. Contraption reviewing techniques have shown to be effective tools for resolving in-network interruption location issues. Design/Methodology/Approach: This investigation yielded a very unique strategy for tackling hub moderation utilizing a Classification and Encryption method. The UNSW-NB15 dataset is acquired and divided into Data for preparation and testing from the start. The information is pre-handled and included are eliminated right away within the preparation time frame. The TWM Algorithm is then used to determine the relevant highlights from that moment onward. The BRELU-RESNET classifier then sorts the input into went after and non-went after categories. The compromised information is then saved in the security log record, and the typical data is encrypted using the ESHP-ECC computation. The shortest path distance is then calculated using Euclidean distance. Finally, the data is available. Finally, using the DSHP-ECC computation, the information is decrypted. If the information is available in the log document during testing, it is regarded as the sought-after data and is prevented from the transmission. If it is not present, then the process of digital assault recognition begins. Findings/Result: The research is based on the UNSW-NB 15 dataset, which shows that the proposed method achieves an unreasonable awareness level of 98.34 percent, particularity level of 77.54 percent, exactness level of 96.6 percent, Precision level of 97.96 percent, review level of 98.34 percent, F-proportion of 98.15 percent, False Positive Rate of 22.46 percent, False Negative Rate of 1.66 percent, and Matthew's connection coefficient of 77.38 Originality/Value: This experimental-based research article examines the malicious activities in the cyberspace using BRELU-RESNET approach and mitigated by using BAIT based approach mechanism. Paper Type: Research Analysis.
基于BRELU RESNET的网络攻击检测系统与基于诱饵的缓解方法
目的:通过合并通信组和物联网,工业控制系统变得更容易受到数字攻击,这可能会产生严重影响。入侵检测系统在物联网业务中对于识别和阻止攻击至关重要。面对数字攻击,为了确保数据隐私和安全,立法机构和大型企业应该在今天制定网络安全政策。随着以人为本的完整框架在当今社会变得越来越重要,它们也成为敌对活动的目标,迫使行业和研究人员更多地关注处理局部区域中断识别问题。精巧的审查技术已被证明是解决网络中断位置问题的有效工具。设计/方法/方法:这项调查产生了一种非常独特的策略,用于利用分类和加密方法解决集线器调节问题。采集UNSW-NB15数据集,从一开始就分为Data进行准备和测试。这些信息是预先处理的,包括在准备时间框架内立即删除。然后使用TWM算法确定从该时刻开始的相关亮点。然后,BRELU-RESNET分类器将输入分类为跟踪和非跟踪类别。然后将泄露的信息保存在安全日志记录中,并使用ESHP-ECC计算对典型数据进行加密。然后用欧几里得距离计算最短路径距离。最后,数据是可用的。最后,使用DSHP-ECC计算对信息进行解密。如果在测试过程中,日志文件中有可用的信息,则将其视为急需的数据,并阻止其传输。如果它不存在,那么数字攻击识别过程就开始了。结果:研究基于UNSW-NB 15数据集,结果表明,本文方法的不合理认知度为98.34%,特异性为77.54%,准确性为96.6%,精度为97.96%,评审率为98.34%,f -比例为98.15%,假阳性率为22.46%,假阴性率为1.66%,马修连接系数为77.38独创性/价值:本文利用BRELU-RESNET方法对网络空间中的恶意活动进行了研究,并利用基于诱饵的方法机制进行了缓解。论文类型:研究分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信