Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA

IF 1.2 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS
Ponnuviji NAMAKKAL PONNUSAMY, Vigilson Prem Monickaraj, Ezhumalai Periyathambi
{"title":"Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA","authors":"Ponnuviji NAMAKKAL PONNUSAMY, Vigilson Prem Monickaraj, Ezhumalai Periyathambi","doi":"10.24846/v31i2y202209","DOIUrl":null,"url":null,"abstract":": Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.","PeriodicalId":49466,"journal":{"name":"Studies in Informatics and Control","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Studies in Informatics and Control","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.24846/v31i2y202209","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

: Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.
基于Sgd-LSTM和C2HA的云环境下高效入侵检测和防御模型
云计算是一种有吸引力的技术范式,已被广泛用作存储和分析不同用户数据的工具。由于对云的访问是通过Internet实现的,因此存储在云中的数据很容易受到来自外部和内部入侵者的攻击。因此,云服务提供商(csp)需要采取行动,以提供一个安全的框架来检测云中的入侵,并保护和保护客户信息免受黑客和入侵者的侵害。本文提出了一种基于Sgd-LSTM和基于签名的访问控制策略的入侵检测与防御系统(IDPS)模型,用于检测和防御云中的各种入侵。该系统包括三个阶段:用户注册阶段、入侵检测阶段和入侵防御阶段。最初,用户注册是基于唯一的ID和密码执行的,然后,密码通过使用C2HA算法转换为哈希码,然后存储在云中用于身份验证。在入侵检测阶段,采用Sgd-LSTM分类器预测云数据的状态,从而丢弃来自云的入侵数据包。最后,在入侵防御阶段,采用基于签名的用户认证控制对云环境的数据访问,对合法用户进行认证。通过与现有分类器的比较,实验证明了所提出的分类器能够有效地检测出入侵者。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Studies in Informatics and Control
Studies in Informatics and Control AUTOMATION & CONTROL SYSTEMS-OPERATIONS RESEARCH & MANAGEMENT SCIENCE
CiteScore
2.70
自引率
25.00%
发文量
34
审稿时长
>12 weeks
期刊介绍: Studies in Informatics and Control journal provides important perspectives on topics relevant to Information Technology, with an emphasis on useful applications in the most important areas of IT. This journal is aimed at advanced practitioners and researchers in the field of IT and welcomes original contributions from scholars and professionals worldwide. SIC is published both in print and online by the National Institute for R&D in Informatics, ICI Bucharest. Abstracts, full text and graphics of all articles in the online version of SIC are identical to the print version of the Journal.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信