Loading…

Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA

Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Hen...

Full description

Saved in:
Bibliographic Details
Published in:Studies in Informatics and Control 2022, Vol.31 (2), p.95-104
Main Authors: NAMAKKAL PONNUSAMY, Ponnuviji, MONICKARAJ, Vigilson Prem, PERIYATHAMBI, Ezhumalai
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c304t-2cc6642e34c0b6f37b53eaaf2fbec79eae50ccd93d80931bf79ce7fd23f096173
cites
container_end_page 104
container_issue 2
container_start_page 95
container_title Studies in Informatics and Control
container_volume 31
creator NAMAKKAL PONNUSAMY, Ponnuviji
MONICKARAJ, Vigilson Prem
PERIYATHAMBI, Ezhumalai
description Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.
doi_str_mv 10.24846/v31i2y202209
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_24846_v31i2y202209</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2691436890</sourcerecordid><originalsourceid>FETCH-LOGICAL-c304t-2cc6642e34c0b6f37b53eaaf2fbec79eae50ccd93d80931bf79ce7fd23f096173</originalsourceid><addsrcrecordid>eNpNUMtqAjEUDaWFinXZfaDrtHmZTJYytVVQWlChu2EmD0nRxCYzgn_fUbvo6p57HvfCAeCR4GfKCy5ejox4eqKYUqxuwIAUnCBO1ddtj3sOESnEPRjl7Bs8lopyytkAVFPnvPY2tHAe2tRlHwN8ta3V7RnVwcDPZI-9fl6X0dgd9AGWu9gZOA1Hn2LYn9Ob7MMWrrYGLVbr5SVY0tnkAdy5epft6G8OweZtui5naPHxPi8nC6QZ5i2iWgvBqWVc40Y4Jpsxs3XtqGuslsrWdoy1NoqZAitGGieVttIZyhxWgkg2BE_Xu4cUfzqb2-o7din0LysqFOFMFAr3LnR16RRzTtZVh-T3dTpVBFeXGqv_NbJfjkdlfQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2691436890</pqid></control><display><type>article</type><title>Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA</title><source>Publicly Available Content Database</source><creator>NAMAKKAL PONNUSAMY, Ponnuviji ; MONICKARAJ, Vigilson Prem ; PERIYATHAMBI, Ezhumalai</creator><creatorcontrib>NAMAKKAL PONNUSAMY, Ponnuviji ; MONICKARAJ, Vigilson Prem ; PERIYATHAMBI, Ezhumalai</creatorcontrib><description>Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.</description><identifier>ISSN: 1220-1766</identifier><identifier>EISSN: 1841-429X</identifier><identifier>DOI: 10.24846/v31i2y202209</identifier><language>eng</language><publisher>Bucharest: National Institute for Research and Development in Informatics</publisher><subject>Access control ; Prevention ; Service introduction</subject><ispartof>Studies in Informatics and Control, 2022, Vol.31 (2), p.95-104</ispartof><rights>2022. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the associated terms available at https://sic.ici.ro/open-access-statement</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c304t-2cc6642e34c0b6f37b53eaaf2fbec79eae50ccd93d80931bf79ce7fd23f096173</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4009,27902,27903,27904</link.rule.ids></links><search><creatorcontrib>NAMAKKAL PONNUSAMY, Ponnuviji</creatorcontrib><creatorcontrib>MONICKARAJ, Vigilson Prem</creatorcontrib><creatorcontrib>PERIYATHAMBI, Ezhumalai</creatorcontrib><title>Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA</title><title>Studies in Informatics and Control</title><description>Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.</description><subject>Access control</subject><subject>Prevention</subject><subject>Service introduction</subject><issn>1220-1766</issn><issn>1841-429X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNpNUMtqAjEUDaWFinXZfaDrtHmZTJYytVVQWlChu2EmD0nRxCYzgn_fUbvo6p57HvfCAeCR4GfKCy5ejox4eqKYUqxuwIAUnCBO1ddtj3sOESnEPRjl7Bs8lopyytkAVFPnvPY2tHAe2tRlHwN8ta3V7RnVwcDPZI-9fl6X0dgd9AGWu9gZOA1Hn2LYn9Ob7MMWrrYGLVbr5SVY0tnkAdy5epft6G8OweZtui5naPHxPi8nC6QZ5i2iWgvBqWVc40Y4Jpsxs3XtqGuslsrWdoy1NoqZAitGGieVttIZyhxWgkg2BE_Xu4cUfzqb2-o7din0LysqFOFMFAr3LnR16RRzTtZVh-T3dTpVBFeXGqv_NbJfjkdlfQ</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>NAMAKKAL PONNUSAMY, Ponnuviji</creator><creator>MONICKARAJ, Vigilson Prem</creator><creator>PERIYATHAMBI, Ezhumalai</creator><general>National Institute for Research and Development in Informatics</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>2022</creationdate><title>Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA</title><author>NAMAKKAL PONNUSAMY, Ponnuviji ; MONICKARAJ, Vigilson Prem ; PERIYATHAMBI, Ezhumalai</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c304t-2cc6642e34c0b6f37b53eaaf2fbec79eae50ccd93d80931bf79ce7fd23f096173</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Prevention</topic><topic>Service introduction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>NAMAKKAL PONNUSAMY, Ponnuviji</creatorcontrib><creatorcontrib>MONICKARAJ, Vigilson Prem</creatorcontrib><creatorcontrib>PERIYATHAMBI, Ezhumalai</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Studies in Informatics and Control</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>NAMAKKAL PONNUSAMY, Ponnuviji</au><au>MONICKARAJ, Vigilson Prem</au><au>PERIYATHAMBI, Ezhumalai</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA</atitle><jtitle>Studies in Informatics and Control</jtitle><date>2022</date><risdate>2022</risdate><volume>31</volume><issue>2</issue><spage>95</spage><epage>104</epage><pages>95-104</pages><issn>1220-1766</issn><eissn>1841-429X</eissn><abstract>Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.</abstract><cop>Bucharest</cop><pub>National Institute for Research and Development in Informatics</pub><doi>10.24846/v31i2y202209</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1220-1766
ispartof Studies in Informatics and Control, 2022, Vol.31 (2), p.95-104
issn 1220-1766
1841-429X
language eng
recordid cdi_crossref_primary_10_24846_v31i2y202209
source Publicly Available Content Database
subjects Access control
Prevention
Service introduction
title Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T02%3A29%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20Intrusion%20Detection%20and%20Prevention%20Model%20in%20Cloud%20Environment%20Using%20Sgd-LSTM%20and%20C2HA&rft.jtitle=Studies%20in%20Informatics%20and%20Control&rft.au=NAMAKKAL%20PONNUSAMY,%20Ponnuviji&rft.date=2022&rft.volume=31&rft.issue=2&rft.spage=95&rft.epage=104&rft.pages=95-104&rft.issn=1220-1766&rft.eissn=1841-429X&rft_id=info:doi/10.24846/v31i2y202209&rft_dat=%3Cproquest_cross%3E2691436890%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c304t-2cc6642e34c0b6f37b53eaaf2fbec79eae50ccd93d80931bf79ce7fd23f096173%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2691436890&rft_id=info:pmid/&rfr_iscdi=true