Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm

J. Sensors Pub Date : 2022-08-16 DOI:10.1155/2022/9386989
P. Kshirsagar, H. Manoharan, Hassan A. Alterazi, Nawaf Alhebaishi, O. Rabie, S. Selvarajan
{"title":"Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm","authors":"P. Kshirsagar, H. Manoharan, Hassan A. Alterazi, Nawaf Alhebaishi, O. Rabie, S. Selvarajan","doi":"10.1155/2022/9386989","DOIUrl":null,"url":null,"abstract":"Cloud services are a popular concept used to describe how internet-based services are delivered and maintained. The computer technology environment is being restructured with respect to information preservation. Data protection is of critical importance when storing huge volumes of information. In today’s cyber world, an intrusion is a significant security problem. Services, information, and services are all vulnerable to attack in the cloud due to its distributed structure of the cloud. Inappropriate behavior in the connection and in the host is detected using intrusion detection systems (IDS) in the cloud. DDoS attacks are difficult to protect against since they produce massive volumes of harmful information on the network. This assault forces the cloud services to become unavailable to target consumers, which depletes computer resources and leaves the provider exposed to massive financial and reputational losses. Cyber-analyst data mining techniques may assist in intrusion detection. Machine learning techniques are used to create many strategies. Attribute selection techniques are also vital in keeping the dataset’s dimensionality low. In this study, one method is provided, and the dataset is taken from the NSL-KDD dataset. In the first strategy, a filtering method called learning vector quantization (LVQ) is used, and in the second strategy, a dimensionality-simplifying method called PCA. The selected attributes from each technique are used for categorization before being tested against a DoS attack. This recent study shows that an LVQ-based SVM performs better than the competition in detecting threats.","PeriodicalId":14776,"journal":{"name":"J. Sensors","volume":"26 1","pages":"1-13"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Sensors","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1155/2022/9386989","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Cloud services are a popular concept used to describe how internet-based services are delivered and maintained. The computer technology environment is being restructured with respect to information preservation. Data protection is of critical importance when storing huge volumes of information. In today’s cyber world, an intrusion is a significant security problem. Services, information, and services are all vulnerable to attack in the cloud due to its distributed structure of the cloud. Inappropriate behavior in the connection and in the host is detected using intrusion detection systems (IDS) in the cloud. DDoS attacks are difficult to protect against since they produce massive volumes of harmful information on the network. This assault forces the cloud services to become unavailable to target consumers, which depletes computer resources and leaves the provider exposed to massive financial and reputational losses. Cyber-analyst data mining techniques may assist in intrusion detection. Machine learning techniques are used to create many strategies. Attribute selection techniques are also vital in keeping the dataset’s dimensionality low. In this study, one method is provided, and the dataset is taken from the NSL-KDD dataset. In the first strategy, a filtering method called learning vector quantization (LVQ) is used, and in the second strategy, a dimensionality-simplifying method called PCA. The selected attributes from each technique are used for categorization before being tested against a DoS attack. This recent study shows that an LVQ-based SVM performs better than the competition in detecting threats.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线数据存储应用的解析攻击及机器学习算法破解
云服务是一个流行的概念,用于描述如何交付和维护基于互联网的服务。在信息保存方面,计算机技术环境正在重构。在存储大量信息时,数据保护至关重要。在当今的网络世界中,入侵是一个重大的安全问题。由于云的分布式结构,服务、信息、服务在云中都容易受到攻击。使用云中的入侵检测系统(IDS)检测连接和主机中的不当行为。由于DDoS攻击会在网络上产生大量有害信息,因此很难防范。这种攻击迫使目标消费者无法使用云服务,这会耗尽计算机资源,并使提供商面临巨大的财务和声誉损失。网络分析数据挖掘技术可能有助于入侵检测。机器学习技术用于创建许多策略。属性选择技术对于保持数据集的低维度也是至关重要的。本文提供了一种方法,数据集取自NSL-KDD数据集。在第一种策略中,使用了一种称为学习向量量化(LVQ)的过滤方法,在第二种策略中,使用了一种称为PCA的维数简化方法。在针对DoS攻击进行测试之前,将从每种技术中选择的属性用于分类。最近的研究表明,基于lvq的支持向量机在检测威胁方面优于竞争对手。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Index Construction and Application of School-Enterprise Collaborative Education Platform Based on AHP Fuzzy Method in Double Creation Education Practice Optimization of Intelligent Display Mode of Museum Cultural Relics Based on Intelligent Wireless Sensor Network Feature Extraction Method of Art Visual Communication Image Based on 5G Intelligent Sensor Network Scene Classification Using Deep Networks Combined with Visual Attention Spatial Expression of Multifaceted Soft Decoration Elements: Application of 3D Reconstruction Algorithm in Soft Decoration and Furnishing Design of Office Space
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1