{"title":"基于Sgd-LSTM和C2HA的云环境下高效入侵检测和防御模型","authors":"Ponnuviji NAMAKKAL PONNUSAMY, Vigilson Prem Monickaraj, Ezhumalai Periyathambi","doi":"10.24846/v31i2y202209","DOIUrl":null,"url":null,"abstract":": Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.","PeriodicalId":49466,"journal":{"name":"Studies in Informatics and Control","volume":" ","pages":""},"PeriodicalIF":1.2000,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA\",\"authors\":\"Ponnuviji NAMAKKAL PONNUSAMY, Vigilson Prem Monickaraj, Ezhumalai Periyathambi\",\"doi\":\"10.24846/v31i2y202209\",\"DOIUrl\":null,\"url\":null,\"abstract\":\": Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.\",\"PeriodicalId\":49466,\"journal\":{\"name\":\"Studies in Informatics and Control\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2022-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Studies in Informatics and Control\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.24846/v31i2y202209\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Studies in Informatics and Control","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.24846/v31i2y202209","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA
: Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.
期刊介绍:
Studies in Informatics and Control journal provides important perspectives on topics relevant to Information Technology, with an emphasis on useful applications in the most important areas of IT.
This journal is aimed at advanced practitioners and researchers in the field of IT and welcomes original contributions from scholars and professionals worldwide.
SIC is published both in print and online by the National Institute for R&D in Informatics, ICI Bucharest. Abstracts, full text and graphics of all articles in the online version of SIC are identical to the print version of the Journal.