An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN

被引:1
作者
Alotaibi, Nouf Saeed [1 ]
机构
[1] Shaqra Univ, Dept Comp Sci, Coll Sci & Humanities Al Dawadmi, Shaqra 11961, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 76卷 / 02期
关键词
Intrusion detection system; logistic tanh-based convolutional neural network classification (LTH-CNN); correlation coefficient based mayfly optimization (CC-MA); cyber security; NETWORK;
D O I
10.32604/cmc.2023.039446
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection System (IDS) is a network security mechanism that analyses all users' and applications' traffic and detects malicious activities in real-time. The existing IDS methods suffer from lower accuracy and lack the required level of security to prevent sophisticated attacks. This problem can result in the system being vulnerable to attacks, which can lead to the loss of sensitive data and potential system failure. Therefore, this paper proposes an Intrusion Detection System using Logistic Tanh-based Convolutional Neural Network Classification (LTH-CNN). Here, the Correlation Coefficient based Mayfly Optimization (CC-MA) algorithm is used to extract the input characteristics for the IDS from the input data. Then, the optimized features are utilized by the LTH-CNN, which returns the attacked and non-attacked data. After that, the attacked data is stored in the log file and non-attacked data is mapped to the cyber security and data security phases. To prevent the system from cyber-attack, the Source and Destination IP address is converted into a complex binary format named 1's Complement Reverse Shift Right (CRSR), where, in the data security phase the sensed data is converted into an encrypted format using Senders Public key Exclusive OR Receivers Public Key-Elliptic Curve Cryptography (PXORP-ECC) Algorithm to improve the data security. The Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) dataset and real-time sensor are used to train and evaluate the proposed LTH-CNN. The suggested model is evaluated based on accuracy, sensitivity, and specificity, which outperformed the existing IDS methods, according to the results of the experiments.
引用
收藏
页码:2061 / 2078
页数:18
相关论文
共 26 条
[1]   An Intelligent Tree-Based Intrusion Detection Model for Cyber Security [J].
Al-Omari, Mohammad ;
Rawashdeh, Majdi ;
Qutaishat, Fadi ;
Alshira'H, Mohammad ;
Ababneh, Nedal .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (02)
[2]  
Alpaño PVS, 2017, TENCON IEEE REGION, P2825, DOI 10.1109/TENCON.2017.8228342
[3]   Security Verification for Cyber-Physical Systems Using Model Checking [J].
Chan, Ching-Chieh ;
Yang, Cheng-Zen ;
Fan, Chin-Feng .
IEEE ACCESS, 2021, 9 :75169-75186
[4]   Intrusion Detection for Cyber-Physical Systems Using Generative Adversarial Networks in Fog Environment [J].
de Araujo-Filho, Paulo Freitas ;
Kaddoum, Georges ;
Campelo, Divanilson R. ;
Santos, Aline Gondim ;
Macedo, David ;
Zanchettin, Cleber .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) :6247-6256
[5]   Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems [J].
Fang, Chongrong ;
Qi, Yifei ;
Cheng, Peng ;
Zheng, Wei Xing .
AUTOMATICA, 2020, 112
[6]   Security Assessment for Cyber Physical Distribution Power System Under Intrusion Attacks [J].
Fu, Rong ;
Huang, Xiaojuan ;
Xue, Yusheng ;
Wu, Yingjun ;
Tang, Yi ;
Yue, Dong .
IEEE ACCESS, 2019, 7 :75615-75628
[7]   Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection [J].
Gifty, R. ;
Bharathi, R. ;
Krishnakumar, P. .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (Suppl 1) :23-34
[8]   A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection [J].
Haghnegandar, Lida ;
Wang, Yong .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (13) :9427-9441
[9]   Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges [J].
Han, Song ;
Xie, Miao ;
Chen, Hsiao-Hwa ;
Ling, Yun .
IEEE SYSTEMS JOURNAL, 2014, 8 (04) :1049-1059
[10]  
Imran M., 2018, International Journal of Scientific Research in Computer Science Applications and Management Studies, V7, P1