Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and to Predict Future Community Intrusions

S. Prabhu, Nethravathi P. S.
{"title":"Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and to Predict Future Community Intrusions","authors":"S. Prabhu, Nethravathi P. S.","doi":"10.47992/ijaeml.2581.7000.0128","DOIUrl":null,"url":null,"abstract":"Purpose: Because of the apparent rapid advancement in the field of information and communication technology and its constant connection to the internet, customer and organizational data have become vulnerable to cyber-attacks, necessitating the explanation of solutions to ensure the security and protection of information throughout the industry. Today, it is critical for governments and major corporations to implement cybersecurity systems to ensure the confidentiality and security of data in the face of cyber-attacks. As community-based fully systems have become more important in today's society, they've become targets for malicious actions, prompting both industry and the research community to place a greater emphasis on resolving community intrusion detection difficulties. In network intrusion detection challenges, gadget examining algorithms have proven to be a valuable tool.\nDesign/Methodology/Approach: This research provided a fully unique architecture for attack node mitigation as a result of the use of a novel type and encryption mechanism. First, the UNSW-NB15 dataset is received and separated into training and testing data. Within the Training section, information is first and foremost pre-processed, and capabilities are extracted. The relevant features are then chosen using the Taxicab Woodpecker Mating algorithm (TWMA). The BRELU-ResNet classifier is then used to classify the attacked and non-attacked data. The typical statistics are encrypted using the ESHP-ECC method, which is then saved in the security log report. Following that, the shortest distance will be calculated using Euclidean distance. Finally, the information is decrypted utilizing a set of ideas known as DSHP-ECC. If the entry appears in the log record while testing, it is marked as attacked statistics and will not be communicated. The method of detecting cyber-assaults will continue if it is not detected.\nFindings/Result: The analysis is based on the UNSW-NB 15 dataset, which shows that the proposed approach achieves an excessive security level of 93.75 percent. \nOriginality/Value: This experimental-based research article examines the malicious activities in the cyberspace and mitigated by using a SHP-ECC mechanism.\nPaper Type: Research Article","PeriodicalId":184829,"journal":{"name":"International Journal of Applied Engineering and Management Letters","volume":"194 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Applied Engineering and Management Letters","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47992/ijaeml.2581.7000.0128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Purpose: Because of the apparent rapid advancement in the field of information and communication technology and its constant connection to the internet, customer and organizational data have become vulnerable to cyber-attacks, necessitating the explanation of solutions to ensure the security and protection of information throughout the industry. Today, it is critical for governments and major corporations to implement cybersecurity systems to ensure the confidentiality and security of data in the face of cyber-attacks. As community-based fully systems have become more important in today's society, they've become targets for malicious actions, prompting both industry and the research community to place a greater emphasis on resolving community intrusion detection difficulties. In network intrusion detection challenges, gadget examining algorithms have proven to be a valuable tool. Design/Methodology/Approach: This research provided a fully unique architecture for attack node mitigation as a result of the use of a novel type and encryption mechanism. First, the UNSW-NB15 dataset is received and separated into training and testing data. Within the Training section, information is first and foremost pre-processed, and capabilities are extracted. The relevant features are then chosen using the Taxicab Woodpecker Mating algorithm (TWMA). The BRELU-ResNet classifier is then used to classify the attacked and non-attacked data. The typical statistics are encrypted using the ESHP-ECC method, which is then saved in the security log report. Following that, the shortest distance will be calculated using Euclidean distance. Finally, the information is decrypted utilizing a set of ideas known as DSHP-ECC. If the entry appears in the log record while testing, it is marked as attacked statistics and will not be communicated. The method of detecting cyber-assaults will continue if it is not detected. Findings/Result: The analysis is based on the UNSW-NB 15 dataset, which shows that the proposed approach achieves an excessive security level of 93.75 percent. Originality/Value: This experimental-based research article examines the malicious activities in the cyberspace and mitigated by using a SHP-ECC mechanism. Paper Type: Research Article
用于攻击节点缓解和预测未来社区入侵的新型SHP-ECC机制架构
目的:由于信息和通信技术领域的明显快速发展以及与互联网的不断连接,客户和组织数据变得容易受到网络攻击,需要解释解决方案,以确保整个行业的信息安全和保护。如今,对于政府和大公司来说,实施网络安全系统以确保面对网络攻击时数据的保密性和安全性至关重要。随着基于社区的全系统在当今社会变得越来越重要,它们已经成为恶意行为的目标,这促使工业界和研究界更加重视解决社区入侵检测难题。在网络入侵检测挑战中,小工具检测算法已被证明是一种有价值的工具。设计/方法/方法:由于使用了一种新颖的类型和加密机制,本研究为攻击节点缓解提供了一个完全独特的架构。首先,接收UNSW-NB15数据集,将其分离为训练数据和测试数据。在Training部分中,首先对信息进行预处理,然后提取功能。然后使用出租车啄木鸟交配算法(TWMA)选择相关特征。然后使用BRELU-ResNet分类器对受攻击和未受攻击的数据进行分类。典型的统计信息使用ESHP-ECC方法加密,然后保存在安全日志报告中。然后,用欧几里得距离计算最短距离。最后,使用一组称为DSHP-ECC的思想对信息进行解密。如果该条目在测试时出现在日志记录中,则将其标记为受攻击统计数据,并且不会进行通信。检测网络攻击的方法如果没有被检测到,将继续进行。发现/结果:基于UNSW-NB 15数据集的分析表明,所提出的方法达到了93.75%的超额安全水平。原创性/价值:这篇基于实验的研究文章研究了网络空间中的恶意活动,并通过使用SHP-ECC机制进行了缓解。论文类型:研究论文
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信