{"title":"利用高效数据包检查器算法实现神经秘钥安全云存储","authors":"Satya Prakash Maurya , Rahul Mishra , Upma Kumari","doi":"10.1016/j.csa.2024.100071","DOIUrl":null,"url":null,"abstract":"<div><p>Cloud computing technology is utilized for the commercial purpose of implementing virtualization for the storage of data, which is then controlled and made accessible to users via remote servers. With the increased use of various communication devices and direct access to web servers, there is a favorable opportunity to orchestrate attacks and exploit vulnerabilities in a system. Distributed Denial of Service (DDoS) is a commonly used technique employed by attackers in cloud environments. This study introduces a security layer incorporating a Packet Checker Algorithm (PCA) to detect and eliminate counterfeit packets. The algorithm takes into account transmission delay time as well as minimum and maximum thresholds, thereby enhancing the response time of the Intrusion Detection Process (IDP) in a cloud environment that utilizes neural encryption. Neural encryption is used to synchronize neural networks and create new public channel protocols for a secure cloud storage paradigm. This study greatly expands upon the hop count inspection and filtering method. It incorporates the time slot filtering function and implements a unique key set to differentiate between genuine packets and falsified packets. This novel methodology has the capability to detect Distributed Denial of Service (DDoS) attacks and related anomalies during the initial phases of data transmission. The technique considers Time-to-Live (TTL), Hope count, and Transmission-Delay-Time as crucial components.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100071"},"PeriodicalIF":0.0000,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000377/pdfft?md5=6b28723533b3bd31b017b0c813de15c5&pid=1-s2.0-S2772918424000377-main.pdf","citationCount":"0","resultStr":"{\"title\":\"Neural secret key enabled secure cloud storage with efficient packet checker algorithm\",\"authors\":\"Satya Prakash Maurya , Rahul Mishra , Upma Kumari\",\"doi\":\"10.1016/j.csa.2024.100071\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Cloud computing technology is utilized for the commercial purpose of implementing virtualization for the storage of data, which is then controlled and made accessible to users via remote servers. With the increased use of various communication devices and direct access to web servers, there is a favorable opportunity to orchestrate attacks and exploit vulnerabilities in a system. Distributed Denial of Service (DDoS) is a commonly used technique employed by attackers in cloud environments. This study introduces a security layer incorporating a Packet Checker Algorithm (PCA) to detect and eliminate counterfeit packets. The algorithm takes into account transmission delay time as well as minimum and maximum thresholds, thereby enhancing the response time of the Intrusion Detection Process (IDP) in a cloud environment that utilizes neural encryption. Neural encryption is used to synchronize neural networks and create new public channel protocols for a secure cloud storage paradigm. This study greatly expands upon the hop count inspection and filtering method. It incorporates the time slot filtering function and implements a unique key set to differentiate between genuine packets and falsified packets. This novel methodology has the capability to detect Distributed Denial of Service (DDoS) attacks and related anomalies during the initial phases of data transmission. The technique considers Time-to-Live (TTL), Hope count, and Transmission-Delay-Time as crucial components.</p></div>\",\"PeriodicalId\":100351,\"journal\":{\"name\":\"Cyber Security and Applications\",\"volume\":\"3 \",\"pages\":\"Article 100071\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-08-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2772918424000377/pdfft?md5=6b28723533b3bd31b017b0c813de15c5&pid=1-s2.0-S2772918424000377-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cyber Security and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2772918424000377\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber Security and Applications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2772918424000377","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud computing technology is utilized for the commercial purpose of implementing virtualization for the storage of data, which is then controlled and made accessible to users via remote servers. With the increased use of various communication devices and direct access to web servers, there is a favorable opportunity to orchestrate attacks and exploit vulnerabilities in a system. Distributed Denial of Service (DDoS) is a commonly used technique employed by attackers in cloud environments. This study introduces a security layer incorporating a Packet Checker Algorithm (PCA) to detect and eliminate counterfeit packets. The algorithm takes into account transmission delay time as well as minimum and maximum thresholds, thereby enhancing the response time of the Intrusion Detection Process (IDP) in a cloud environment that utilizes neural encryption. Neural encryption is used to synchronize neural networks and create new public channel protocols for a secure cloud storage paradigm. This study greatly expands upon the hop count inspection and filtering method. It incorporates the time slot filtering function and implements a unique key set to differentiate between genuine packets and falsified packets. This novel methodology has the capability to detect Distributed Denial of Service (DDoS) attacks and related anomalies during the initial phases of data transmission. The technique considers Time-to-Live (TTL), Hope count, and Transmission-Delay-Time as crucial components.