Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA

IF 1.2 4区 计算机科学 Q4 AUTOMATION & CONTROL SYSTEMS Studies in Informatics and Control Pub Date : 2022-06-30 DOI:10.24846/v31i2y202209
Ponnuviji NAMAKKAL PONNUSAMY, Vigilson Prem Monickaraj, Ezhumalai Periyathambi
{"title":"Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA","authors":"Ponnuviji NAMAKKAL PONNUSAMY, Vigilson Prem Monickaraj, Ezhumalai Periyathambi","doi":"10.24846/v31i2y202209","DOIUrl":null,"url":null,"abstract":": Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.","PeriodicalId":49466,"journal":{"name":"Studies in Informatics and Control","volume":" ","pages":""},"PeriodicalIF":1.2000,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Studies in Informatics and Control","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.24846/v31i2y202209","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

: Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于Sgd-LSTM和C2HA的云环境下高效入侵检测和防御模型
云计算是一种有吸引力的技术范式,已被广泛用作存储和分析不同用户数据的工具。由于对云的访问是通过Internet实现的,因此存储在云中的数据很容易受到来自外部和内部入侵者的攻击。因此,云服务提供商(csp)需要采取行动,以提供一个安全的框架来检测云中的入侵,并保护和保护客户信息免受黑客和入侵者的侵害。本文提出了一种基于Sgd-LSTM和基于签名的访问控制策略的入侵检测与防御系统(IDPS)模型,用于检测和防御云中的各种入侵。该系统包括三个阶段:用户注册阶段、入侵检测阶段和入侵防御阶段。最初,用户注册是基于唯一的ID和密码执行的,然后,密码通过使用C2HA算法转换为哈希码,然后存储在云中用于身份验证。在入侵检测阶段,采用Sgd-LSTM分类器预测云数据的状态,从而丢弃来自云的入侵数据包。最后,在入侵防御阶段,采用基于签名的用户认证控制对云环境的数据访问,对合法用户进行认证。通过与现有分类器的比较,实验证明了所提出的分类器能够有效地检测出入侵者。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Studies in Informatics and Control
Studies in Informatics and Control AUTOMATION & CONTROL SYSTEMS-OPERATIONS RESEARCH & MANAGEMENT SCIENCE
CiteScore
2.70
自引率
25.00%
发文量
34
审稿时长
>12 weeks
期刊介绍: Studies in Informatics and Control journal provides important perspectives on topics relevant to Information Technology, with an emphasis on useful applications in the most important areas of IT. This journal is aimed at advanced practitioners and researchers in the field of IT and welcomes original contributions from scholars and professionals worldwide. SIC is published both in print and online by the National Institute for R&D in Informatics, ICI Bucharest. Abstracts, full text and graphics of all articles in the online version of SIC are identical to the print version of the Journal.
期刊最新文献
Event-Triggered Piecewise Continuous Tracking Control of Networked Control Systems using Linear Perturbed System Models with Time Delays Development of Hybrid Model based on Artificial Intelligence for Maximizing Solar Energy Yield Optimal Second Order Sliding Control for the Robust Tracking of a 2-Degree-of-Freedom Helicopter System based on Metaheuristics and Artificial Neural Networks Modeling of a Hybrid Controller for Electric Vehicle Battery Charging Using Photovoltaic Panels Duty Cycles Mathematical Analysis and Empirical Thrust-Force Performance Curves of a Brushless Electric Motor
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1