{"title":"通过集成区块链和基于ai的方法增强入侵检测和Kerberos攻击防御","authors":"Nisha Rajpal , Dinesh Rai","doi":"10.1016/j.suscom.2025.101178","DOIUrl":null,"url":null,"abstract":"<div><div>In today's linked digital world, securing computer networks as well as systems is critical. The increasing complexity as well as the regularity of network attacks demand creative and effective intrusion detection solutions to protect against possible threats. Kerberos, an established token-based authentication technology, is notable for its cryptographic method, privacy assurance, and data protection whenever identifying eligible users. At the same time, it fails to offer proper channel protection for transmitting user credentials between the client and server pathways. This study presents an integrated approach for detecting Kerberos attacks and intrusions within computing systems and networks. It combines artificial intelligence and Blockchain technology with a proxy re-encryption scheme to enhance security measures. After pre-processing, the input data is recorded on the blockchain, subjected to proxy re-encryption, and stripped of noise. The utilization of threshold proxy re-encryption in the consensus process eliminates dependence on third-party central service providers. As proxy service nodes, a number of consensus nodes within the blockchain network re-encrypt data and combine translated ciphertext. Throughout the process, no personal information is revealed. In this study, the methods of Principal Component Analysis and Chi-square Test are used to reduce the dimension of the main components with the greatest variation and to discover and pick the most relevant features from the target variable. To detect the normal and attack systems, all selected important features have been categorized utilizing the KNN classifier. Throughout the investigation, the proposed approach was used to evaluate the openly available dataset KDD-99.</div></div>","PeriodicalId":48686,"journal":{"name":"Sustainable Computing-Informatics & Systems","volume":"47 ","pages":"Article 101178"},"PeriodicalIF":5.7000,"publicationDate":"2025-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enhancing intrusion detection and Kerberos attack prevention with an integrated blockchain and AI-based approach\",\"authors\":\"Nisha Rajpal , Dinesh Rai\",\"doi\":\"10.1016/j.suscom.2025.101178\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In today's linked digital world, securing computer networks as well as systems is critical. The increasing complexity as well as the regularity of network attacks demand creative and effective intrusion detection solutions to protect against possible threats. Kerberos, an established token-based authentication technology, is notable for its cryptographic method, privacy assurance, and data protection whenever identifying eligible users. At the same time, it fails to offer proper channel protection for transmitting user credentials between the client and server pathways. This study presents an integrated approach for detecting Kerberos attacks and intrusions within computing systems and networks. It combines artificial intelligence and Blockchain technology with a proxy re-encryption scheme to enhance security measures. After pre-processing, the input data is recorded on the blockchain, subjected to proxy re-encryption, and stripped of noise. The utilization of threshold proxy re-encryption in the consensus process eliminates dependence on third-party central service providers. As proxy service nodes, a number of consensus nodes within the blockchain network re-encrypt data and combine translated ciphertext. Throughout the process, no personal information is revealed. In this study, the methods of Principal Component Analysis and Chi-square Test are used to reduce the dimension of the main components with the greatest variation and to discover and pick the most relevant features from the target variable. To detect the normal and attack systems, all selected important features have been categorized utilizing the KNN classifier. Throughout the investigation, the proposed approach was used to evaluate the openly available dataset KDD-99.</div></div>\",\"PeriodicalId\":48686,\"journal\":{\"name\":\"Sustainable Computing-Informatics & Systems\",\"volume\":\"47 \",\"pages\":\"Article 101178\"},\"PeriodicalIF\":5.7000,\"publicationDate\":\"2025-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Sustainable Computing-Informatics & Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S221053792500099X\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sustainable Computing-Informatics & Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S221053792500099X","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Enhancing intrusion detection and Kerberos attack prevention with an integrated blockchain and AI-based approach
In today's linked digital world, securing computer networks as well as systems is critical. The increasing complexity as well as the regularity of network attacks demand creative and effective intrusion detection solutions to protect against possible threats. Kerberos, an established token-based authentication technology, is notable for its cryptographic method, privacy assurance, and data protection whenever identifying eligible users. At the same time, it fails to offer proper channel protection for transmitting user credentials between the client and server pathways. This study presents an integrated approach for detecting Kerberos attacks and intrusions within computing systems and networks. It combines artificial intelligence and Blockchain technology with a proxy re-encryption scheme to enhance security measures. After pre-processing, the input data is recorded on the blockchain, subjected to proxy re-encryption, and stripped of noise. The utilization of threshold proxy re-encryption in the consensus process eliminates dependence on third-party central service providers. As proxy service nodes, a number of consensus nodes within the blockchain network re-encrypt data and combine translated ciphertext. Throughout the process, no personal information is revealed. In this study, the methods of Principal Component Analysis and Chi-square Test are used to reduce the dimension of the main components with the greatest variation and to discover and pick the most relevant features from the target variable. To detect the normal and attack systems, all selected important features have been categorized utilizing the KNN classifier. Throughout the investigation, the proposed approach was used to evaluate the openly available dataset KDD-99.
期刊介绍:
Sustainable computing is a rapidly expanding research area spanning the fields of computer science and engineering, electrical engineering as well as other engineering disciplines. The aim of Sustainable Computing: Informatics and Systems (SUSCOM) is to publish the myriad research findings related to energy-aware and thermal-aware management of computing resource. Equally important is a spectrum of related research issues such as applications of computing that can have ecological and societal impacts. SUSCOM publishes original and timely research papers and survey articles in current areas of power, energy, temperature, and environment related research areas of current importance to readers. SUSCOM has an editorial board comprising prominent researchers from around the world and selects competitively evaluated peer-reviewed papers.