Network intrusion detection and prevention strategy with data encryption using hybrid detection classifier

被引:1
作者
Pradeepthi, C. [1 ]
Maheswari, B. Uma [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Comp, Dept Comp Sci & Engn, Bengaluru 560035, India
关键词
Intrusion detection system; Attack types; Encryption; Deep learning; Machine learning; Four barrier authentications; ATTACK DETECTION; INTERNET; SCHEME;
D O I
10.1007/s11042-023-16853-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in technology and communication have led to an increase in data and network sizes. As a result, many intrusions (attacks) are created and pose more challenges to network security. In order to protect the network's confidentiality, integrity, and availability from potential intrusions, an Intrusion Detection System (IDS) was employed to examine network traffic. Despite significant research efforts, IDS still has difficulties detecting novel intrusions and improving detection accuracy while lowering false alarm rates. To solve these problems, a novel intrusion detection approach with data encryption is proposed to detect intrusion and protect data from attackers. The operational process of the proposed approach is divided into three phases. First phase: Intrusion identification from the network through a novel hybrid machine learning and deep learning approach. Second phase: an advanced deep learning approach is utilized to detect the types of attack. The attack types that occur in the network are predicted, and an automatic alarm message is sent to the users. Third phase: advanced encryption model is utilized to store the data securely. The users from the network could able to access data from the storage after complete the four barrier authentication process. Each phase is separately analyzed and compared to existing approaches. Proposed hybrid intrusion detection phase provide 0.97 accuracy and 0.02 false positive rate, as well as proposed attack type detection phase offer 0.96 accuracy and 0.01 false positive rate. Observed values prove that the proposed model is most suitable for all network intrusion detection and data encryption.
引用
收藏
页码:40147 / 40178
页数:32
相关论文
共 50 条
  • [41] Network Intrusion Detection Using Stacked Denoising Autoencoder
    Park, Seongchul
    Seo, Sanghyun
    Kim, Juntae
    ADVANCED SCIENCE LETTERS, 2017, 23 (10) : 9907 - 9911
  • [42] Research on Intelligent Detection of Intrusion Data in Network
    Zhu, Guangjie
    Yao, Honglei
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 5 - 10
  • [43] Intrusion Detection Over Encrypted Network Data
    Karacay, Leyli
    Savas, Erkay
    Alptekin, Halit
    COMPUTER JOURNAL, 2020, 63 (04) : 604 - 619
  • [44] Data Balancing and CNN based Network Intrusion Detection System
    Elghalhoud, Omar
    Naik, Kshirasagar
    Zaman, Marzia
    Manzano, Ricardo S.
    2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC, 2023,
  • [45] Intrusion detection system for controller area network
    Vinayak Tanksale
    Cybersecurity, 7
  • [46] ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance
    Faraj, Omair
    Megias, David
    Garcia-Alfaro, Joaquin
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [47] DeepShield: A Hybrid Deep Learning Approach for Effective Network Intrusion Detection
    Lin, Hongjie
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (07) : 1094 - 1104
  • [48] Intrusion Detection using Naive Bayes Classifier with Feature Reduction
    Mukherjee, Saurabh
    Sharma, Neelam
    2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 119 - 128
  • [49] Layered Approach for Intrusion Detection Using Naive Bayes Classifier
    Sharma, Neelam
    Mukherjee, Saurabh
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 639 - 644
  • [50] Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier
    D. A. Kulikov
    V. V. Platonov
    Automatic Control and Computer Sciences, 2021, 55 : 1080 - 1086