Enhancing intrusion detection and Kerberos attack prevention with an integrated blockchain and AI-based approach

IF 5.7 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Nisha Rajpal , Dinesh Rai
{"title":"Enhancing intrusion detection and Kerberos attack prevention with an integrated blockchain and AI-based approach","authors":"Nisha Rajpal ,&nbsp;Dinesh Rai","doi":"10.1016/j.suscom.2025.101178","DOIUrl":null,"url":null,"abstract":"<div><div>In today's linked digital world, securing computer networks as well as systems is critical. The increasing complexity as well as the regularity of network attacks demand creative and effective intrusion detection solutions to protect against possible threats. Kerberos, an established token-based authentication technology, is notable for its cryptographic method, privacy assurance, and data protection whenever identifying eligible users. At the same time, it fails to offer proper channel protection for transmitting user credentials between the client and server pathways. This study presents an integrated approach for detecting Kerberos attacks and intrusions within computing systems and networks. It combines artificial intelligence and Blockchain technology with a proxy re-encryption scheme to enhance security measures. After pre-processing, the input data is recorded on the blockchain, subjected to proxy re-encryption, and stripped of noise. The utilization of threshold proxy re-encryption in the consensus process eliminates dependence on third-party central service providers. As proxy service nodes, a number of consensus nodes within the blockchain network re-encrypt data and combine translated ciphertext. Throughout the process, no personal information is revealed. In this study, the methods of Principal Component Analysis and Chi-square Test are used to reduce the dimension of the main components with the greatest variation and to discover and pick the most relevant features from the target variable. To detect the normal and attack systems, all selected important features have been categorized utilizing the KNN classifier. Throughout the investigation, the proposed approach was used to evaluate the openly available dataset KDD-99.</div></div>","PeriodicalId":48686,"journal":{"name":"Sustainable Computing-Informatics & Systems","volume":"47 ","pages":"Article 101178"},"PeriodicalIF":5.7000,"publicationDate":"2025-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sustainable Computing-Informatics & Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S221053792500099X","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

In today's linked digital world, securing computer networks as well as systems is critical. The increasing complexity as well as the regularity of network attacks demand creative and effective intrusion detection solutions to protect against possible threats. Kerberos, an established token-based authentication technology, is notable for its cryptographic method, privacy assurance, and data protection whenever identifying eligible users. At the same time, it fails to offer proper channel protection for transmitting user credentials between the client and server pathways. This study presents an integrated approach for detecting Kerberos attacks and intrusions within computing systems and networks. It combines artificial intelligence and Blockchain technology with a proxy re-encryption scheme to enhance security measures. After pre-processing, the input data is recorded on the blockchain, subjected to proxy re-encryption, and stripped of noise. The utilization of threshold proxy re-encryption in the consensus process eliminates dependence on third-party central service providers. As proxy service nodes, a number of consensus nodes within the blockchain network re-encrypt data and combine translated ciphertext. Throughout the process, no personal information is revealed. In this study, the methods of Principal Component Analysis and Chi-square Test are used to reduce the dimension of the main components with the greatest variation and to discover and pick the most relevant features from the target variable. To detect the normal and attack systems, all selected important features have been categorized utilizing the KNN classifier. Throughout the investigation, the proposed approach was used to evaluate the openly available dataset KDD-99.
通过集成区块链和基于ai的方法增强入侵检测和Kerberos攻击防御
在当今互联的数字世界中,保护计算机网络和系统的安全至关重要。随着网络攻击的日益复杂和规律性,需要创新和有效的入侵检测方案来防范可能的威胁。Kerberos是一种已建立的基于令牌的身份验证技术,在识别合格用户时,它以其加密方法、隐私保证和数据保护而闻名。同时,它不能为在客户机和服务器路径之间传输用户凭据提供适当的通道保护。本研究提出了一种用于检测计算系统和网络中的Kerberos攻击和入侵的集成方法。它将人工智能和区块链技术与代理重新加密方案相结合,以增强安全措施。输入数据经过预处理后,记录在区块链上,进行代理重新加密,并去噪。在共识过程中使用阈值代理重新加密消除了对第三方中心服务提供者的依赖。作为代理服务节点,区块链网络中的多个共识节点对数据进行重新加密,并将翻译后的密文组合在一起。在整个过程中,不会泄露任何个人信息。本研究采用主成分分析和卡方检验的方法,对变异最大的主成分进行降维,从目标变量中发现并挑选出最相关的特征。为了检测正常和攻击系统,使用KNN分类器对所有选定的重要特征进行了分类。在整个研究过程中,所提出的方法被用于评估公开可用的数据集KDD-99。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Sustainable Computing-Informatics & Systems
Sustainable Computing-Informatics & Systems COMPUTER SCIENCE, HARDWARE & ARCHITECTUREC-COMPUTER SCIENCE, INFORMATION SYSTEMS
CiteScore
10.70
自引率
4.40%
发文量
142
期刊介绍: Sustainable computing is a rapidly expanding research area spanning the fields of computer science and engineering, electrical engineering as well as other engineering disciplines. The aim of Sustainable Computing: Informatics and Systems (SUSCOM) is to publish the myriad research findings related to energy-aware and thermal-aware management of computing resource. Equally important is a spectrum of related research issues such as applications of computing that can have ecological and societal impacts. SUSCOM publishes original and timely research papers and survey articles in current areas of power, energy, temperature, and environment related research areas of current importance to readers. SUSCOM has an editorial board comprising prominent researchers from around the world and selects competitively evaluated peer-reviewed papers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信