P. J. Sathish Kumar, B. R. Tapas Bapu, S. Sridhar, V. Nagaraju
{"title":"基于胶囊卷积多态图注意的有效网络安全攻击检测","authors":"P. J. Sathish Kumar, B. R. Tapas Bapu, S. Sridhar, V. Nagaraju","doi":"10.1002/ett.70069","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>As digitalization permeates all aspects of life, the Internet has become a critical platform for communication across various domains. Workstations within organizations often handle sensitive and private data, underscoring the need for encryption to safeguard information and prevent unauthorized access. Despite advances in system security, challenges remain in the form of system vulnerabilities and evolving cyber threats. Intrusion detection using deep learning (DL), which serves as the second line of defense after firewalls, has progressed rapidly, yet still faces issues such as misclassification, false positives, and delayed or inadequate responses to attacks. These ongoing problems necessitate continuous improvement in system security screening and intrusion detection to protect networks effectively. Therefore, in this research, a novel DL framework called capsule convolutional polymorphic graph attention neural network with tyrannosaurus optimization algorithm (CCPGANN-TOA) is utilized for attack detection due to its advanced feature representation, graph attention for focusing on key data points, polymorphic graphs for adaptability, and TOA for performance optimization. Normal data are then encrypted using the digital signature algorithm based on elliptic curve cryptography (DSA-ECC) because it provides strong security with smaller key sizes, resulting in faster computations and efficient resource utilization. The proposed method outperforms traditional approaches in terms of 99.98% accuracy of data set I, 99.9% accuracy of data set II, and 900 Kbps higher throughput with low delay.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 3","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Efficient Cyber Security Attack Detection With Encryption Using Capsule Convolutional Polymorphic Graph Attention\",\"authors\":\"P. J. Sathish Kumar, B. R. Tapas Bapu, S. Sridhar, V. Nagaraju\",\"doi\":\"10.1002/ett.70069\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>As digitalization permeates all aspects of life, the Internet has become a critical platform for communication across various domains. Workstations within organizations often handle sensitive and private data, underscoring the need for encryption to safeguard information and prevent unauthorized access. Despite advances in system security, challenges remain in the form of system vulnerabilities and evolving cyber threats. Intrusion detection using deep learning (DL), which serves as the second line of defense after firewalls, has progressed rapidly, yet still faces issues such as misclassification, false positives, and delayed or inadequate responses to attacks. These ongoing problems necessitate continuous improvement in system security screening and intrusion detection to protect networks effectively. Therefore, in this research, a novel DL framework called capsule convolutional polymorphic graph attention neural network with tyrannosaurus optimization algorithm (CCPGANN-TOA) is utilized for attack detection due to its advanced feature representation, graph attention for focusing on key data points, polymorphic graphs for adaptability, and TOA for performance optimization. Normal data are then encrypted using the digital signature algorithm based on elliptic curve cryptography (DSA-ECC) because it provides strong security with smaller key sizes, resulting in faster computations and efficient resource utilization. The proposed method outperforms traditional approaches in terms of 99.98% accuracy of data set I, 99.9% accuracy of data set II, and 900 Kbps higher throughput with low delay.</p>\\n </div>\",\"PeriodicalId\":23282,\"journal\":{\"name\":\"Transactions on Emerging Telecommunications Technologies\",\"volume\":\"36 3\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2025-02-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transactions on Emerging Telecommunications Technologies\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/ett.70069\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70069","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
An Efficient Cyber Security Attack Detection With Encryption Using Capsule Convolutional Polymorphic Graph Attention
As digitalization permeates all aspects of life, the Internet has become a critical platform for communication across various domains. Workstations within organizations often handle sensitive and private data, underscoring the need for encryption to safeguard information and prevent unauthorized access. Despite advances in system security, challenges remain in the form of system vulnerabilities and evolving cyber threats. Intrusion detection using deep learning (DL), which serves as the second line of defense after firewalls, has progressed rapidly, yet still faces issues such as misclassification, false positives, and delayed or inadequate responses to attacks. These ongoing problems necessitate continuous improvement in system security screening and intrusion detection to protect networks effectively. Therefore, in this research, a novel DL framework called capsule convolutional polymorphic graph attention neural network with tyrannosaurus optimization algorithm (CCPGANN-TOA) is utilized for attack detection due to its advanced feature representation, graph attention for focusing on key data points, polymorphic graphs for adaptability, and TOA for performance optimization. Normal data are then encrypted using the digital signature algorithm based on elliptic curve cryptography (DSA-ECC) because it provides strong security with smaller key sizes, resulting in faster computations and efficient resource utilization. The proposed method outperforms traditional approaches in terms of 99.98% accuracy of data set I, 99.9% accuracy of data set II, and 900 Kbps higher throughput with low delay.
期刊介绍:
ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:
- to attract cutting-edge publications from leading researchers and research groups around the world
- to become a highly cited source of timely research findings in emerging fields of telecommunications
- to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish
- to become the leading journal for publishing the latest developments in telecommunications