Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN

被引:18
|
作者
Rani, Deevi Radha [1 ,2 ]
Geethakumari, G. [1 ]
机构
[1] BITS Pilani, Dept Comp Sci & Informat Syst, Hyderabad Campus, Hyderabad, India
[2] VFSTR Deemed Be Univ, Dept Comp Sci & Engn, Guntur, Andhra Pradesh, India
关键词
Anti-forensic attacks; Modified Elliptic Curve Cryptography (MECC); Cuttle Fish optimization Algorithm (CFA); Deep Learning Modified Neural Network (DLMNN); B-tree Huffman Encoding (BHE); ALGORITHM;
D O I
10.1016/j.comcom.2019.11.048
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Anti-forensics is a set of techniques and measures adopted by an attacker aimed at compromising the digital investigation process in a computational environment. Cloud computing, which is an environment providing on demand resources to users, is susceptible to anti-forensic attacks. An anti-forensic attacker in the cloud can influence the cloud forensic process and tamper with evidences, causing damage to the investigation. Though some solutions have been proposed against anti-forensic attacks in cloud, there is a need to secure the evidences while in transit as well as in storage. In this work, we propose efficient algorithms for secure data (evidence) transmission and early detection of Anti-Forensic Attack (AFA). First, the data packets are compressed using a B-tree Huffman Encoding (BHE) algorithm; next, the packet marking technique is implemented to secure the IP address of the sender. For securely sending the data, we propose the Modified Elliptic curve cryptography (MECC) algorithm which encrypts the data packets and transmits it to a receiver. At the receiver side, the training is done using a Deep Learning Modified Neural Network (DLMNN) classifier, which tests the received data packet IP-address. Based on the IP-address of the sender, DLMNN identifies whether the received packet is an packet attacked or a non-attacked one. After the identification of the data packets, the decryption and de-compression of non-attacked data packets are done to obtain the original information. The original evidence information is further analyzed for investigation purposes. Experimental results shown by the proposed method are weighed against the prevailing techniques for performace comparison.
引用
收藏
页码:799 / 810
页数:12
相关论文
共 50 条
  • [1] A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
    Rani, Deevi Radha
    Geethakumari, G.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 2385 - 2398
  • [2] A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
    Rani, Deevi Radha
    Geethakumari, G.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020,
  • [3] A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
    Deevi Radha Rani
    G. Geethakumari
    Peer-to-Peer Networking and Applications, 2021, 14 : 2385 - 2398
  • [4] CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments
    Guri, Mordechai
    PROCEEDINGS OF THE 2023 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2023, 2023, : 100 - 107
  • [5] Data distribution and secure data transmission using IANFIS and MECC in IoT
    Pampapathi, B. M.
    Nageswara Guptha, M.
    Hema, M. S.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (03) : 1471 - 1484
  • [6] Data distribution and secure data transmission using IANFIS and MECC in IoT
    B. M. Pampapathi
    M. Nageswara Guptha
    M. S. Hema
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 1471 - 1484
  • [7] Secure Streaming Forensic Data Transmission for Trusted Cloud
    Liu, Anyi
    Liu, Jigang
    Uehara, Tetsutaro
    SFCS'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY AND FORENSICS IN COMMUNICATION SYSTEMS, 2014, : 3 - 10
  • [8] A dual hashing-based authentication and secure data transmission scheme for vehicular cloud environment using MECC with optimal resource allocation mechanism
    J. Varalakshmi
    S. Dhanasekaran
    Soft Computing, 2024, 28 (17-18) : 10423 - 10437
  • [9] ANTI-FORENSIC CAPACITY AND DETECTION RATING OF HIDDEN DATA IN THE Ext4 FILESYSTEM
    Goebel, Thomas
    Baier, Harald
    ADVANCES IN DIGITAL FORENSICS XIV, 2018, 532 : 87 - 110
  • [10] Counter-act against GAN-based attacks: A collaborative learning approach for anti-forensic detection
    Uddin, Kutub
    Jeong, Tae Hyun
    Oh, Byung Tae
    APPLIED SOFT COMPUTING, 2024, 153