咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >An Efficient Cyber Security an... 收藏

An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN

作     者:Nouf Saeed Alotaibi 

作者机构:Department of Computer ScienceCollege of Science and Humanities Al DawadmiShaqra UniversityShaqra11961Saudi Arabia 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2023年第76卷第8期

页      面:2061-2078页

核心收录:

学科分类:12[管理学] 0808[工学-电气工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 0831[工学-生物医学工程(可授工学、理学、医学学位)] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 081104[工学-模式识别与智能系统] 0839[工学-网络空间安全] 0805[工学-材料科学与工程(可授工学、理学学位)] 0835[工学-软件工程] 0701[理学-数学] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 0801[工学-力学(可授工学、理学学位)] 

基  金:Deanship of Scientific Research and Department of Computer Science Shaqra University 

主  题:Intrusion detection system logistic tanh-based convolutional neural network classification(LTH-CNN) correlation coefficient based mayfly optimization(CC-MA) cyber security 

摘      要:Intrusion Detection System(IDS)is a network security mechanism that analyses all users’and applications’traffic and detectsmalicious activities in *** existing IDSmethods suffer fromlower accuracy and lack the required level of security to prevent sophisticated *** problem can result in the system being vulnerable to attacks,which can lead to the loss of sensitive data and potential system ***,this paper proposes an Intrusion Detection System using Logistic Tanh-based Convolutional Neural Network Classification(LTH-CNN).Here,the Correlation Coefficient based Mayfly Optimization(CC-MA)algorithm is used to extract the input characteristics for the IDS from the input ***,the optimized features are utilized by the LTH-CNN,which returns the attacked and non-attacked *** that,the attacked data is stored in the log file and non-attacked data is mapped to the cyber security and data security *** prevent the system from cyber-attack,the Source and Destination IP address is converted into a complex binary format named 1’s Complement Reverse Shift Right(CRSR),where,in the data security phase the sensed data is converted into an encrypted format using Senders Public key Exclusive OR Receivers Public Key-Elliptic Curve Cryptography(PXORP-ECC)Algorithm to improve the data *** Security Laboratory-Knowledge Discovery inDatabases(NSLKDD)dataset and real-time sensor are used to train and evaluate the proposed *** suggested model is evaluated based on accuracy,sensitivity,and specificity,which outperformed the existing IDS methods,according to the results of the experiments.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分