Loading…
Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA
Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Hen...
Saved in:
Published in: | Studies in Informatics and Control 2022, Vol.31 (2), p.95-104 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c304t-2cc6642e34c0b6f37b53eaaf2fbec79eae50ccd93d80931bf79ce7fd23f096173 |
---|---|
cites | |
container_end_page | 104 |
container_issue | 2 |
container_start_page | 95 |
container_title | Studies in Informatics and Control |
container_volume | 31 |
creator | NAMAKKAL PONNUSAMY, Ponnuviji MONICKARAJ, Vigilson Prem PERIYATHAMBI, Ezhumalai |
description | Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers. |
doi_str_mv | 10.24846/v31i2y202209 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_24846_v31i2y202209</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2691436890</sourcerecordid><originalsourceid>FETCH-LOGICAL-c304t-2cc6642e34c0b6f37b53eaaf2fbec79eae50ccd93d80931bf79ce7fd23f096173</originalsourceid><addsrcrecordid>eNpNUMtqAjEUDaWFinXZfaDrtHmZTJYytVVQWlChu2EmD0nRxCYzgn_fUbvo6p57HvfCAeCR4GfKCy5ejox4eqKYUqxuwIAUnCBO1ddtj3sOESnEPRjl7Bs8lopyytkAVFPnvPY2tHAe2tRlHwN8ta3V7RnVwcDPZI-9fl6X0dgd9AGWu9gZOA1Hn2LYn9Ob7MMWrrYGLVbr5SVY0tnkAdy5epft6G8OweZtui5naPHxPi8nC6QZ5i2iWgvBqWVc40Y4Jpsxs3XtqGuslsrWdoy1NoqZAitGGieVttIZyhxWgkg2BE_Xu4cUfzqb2-o7din0LysqFOFMFAr3LnR16RRzTtZVh-T3dTpVBFeXGqv_NbJfjkdlfQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2691436890</pqid></control><display><type>article</type><title>Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA</title><source>Publicly Available Content Database</source><creator>NAMAKKAL PONNUSAMY, Ponnuviji ; MONICKARAJ, Vigilson Prem ; PERIYATHAMBI, Ezhumalai</creator><creatorcontrib>NAMAKKAL PONNUSAMY, Ponnuviji ; MONICKARAJ, Vigilson Prem ; PERIYATHAMBI, Ezhumalai</creatorcontrib><description>Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.</description><identifier>ISSN: 1220-1766</identifier><identifier>EISSN: 1841-429X</identifier><identifier>DOI: 10.24846/v31i2y202209</identifier><language>eng</language><publisher>Bucharest: National Institute for Research and Development in Informatics</publisher><subject>Access control ; Prevention ; Service introduction</subject><ispartof>Studies in Informatics and Control, 2022, Vol.31 (2), p.95-104</ispartof><rights>2022. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the associated terms available at https://sic.ici.ro/open-access-statement</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c304t-2cc6642e34c0b6f37b53eaaf2fbec79eae50ccd93d80931bf79ce7fd23f096173</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4009,27902,27903,27904</link.rule.ids></links><search><creatorcontrib>NAMAKKAL PONNUSAMY, Ponnuviji</creatorcontrib><creatorcontrib>MONICKARAJ, Vigilson Prem</creatorcontrib><creatorcontrib>PERIYATHAMBI, Ezhumalai</creatorcontrib><title>Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA</title><title>Studies in Informatics and Control</title><description>Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.</description><subject>Access control</subject><subject>Prevention</subject><subject>Service introduction</subject><issn>1220-1766</issn><issn>1841-429X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNpNUMtqAjEUDaWFinXZfaDrtHmZTJYytVVQWlChu2EmD0nRxCYzgn_fUbvo6p57HvfCAeCR4GfKCy5ejox4eqKYUqxuwIAUnCBO1ddtj3sOESnEPRjl7Bs8lopyytkAVFPnvPY2tHAe2tRlHwN8ta3V7RnVwcDPZI-9fl6X0dgd9AGWu9gZOA1Hn2LYn9Ob7MMWrrYGLVbr5SVY0tnkAdy5epft6G8OweZtui5naPHxPi8nC6QZ5i2iWgvBqWVc40Y4Jpsxs3XtqGuslsrWdoy1NoqZAitGGieVttIZyhxWgkg2BE_Xu4cUfzqb2-o7din0LysqFOFMFAr3LnR16RRzTtZVh-T3dTpVBFeXGqv_NbJfjkdlfQ</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>NAMAKKAL PONNUSAMY, Ponnuviji</creator><creator>MONICKARAJ, Vigilson Prem</creator><creator>PERIYATHAMBI, Ezhumalai</creator><general>National Institute for Research and Development in Informatics</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>2022</creationdate><title>Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA</title><author>NAMAKKAL PONNUSAMY, Ponnuviji ; MONICKARAJ, Vigilson Prem ; PERIYATHAMBI, Ezhumalai</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c304t-2cc6642e34c0b6f37b53eaaf2fbec79eae50ccd93d80931bf79ce7fd23f096173</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Access control</topic><topic>Prevention</topic><topic>Service introduction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>NAMAKKAL PONNUSAMY, Ponnuviji</creatorcontrib><creatorcontrib>MONICKARAJ, Vigilson Prem</creatorcontrib><creatorcontrib>PERIYATHAMBI, Ezhumalai</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Studies in Informatics and Control</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>NAMAKKAL PONNUSAMY, Ponnuviji</au><au>MONICKARAJ, Vigilson Prem</au><au>PERIYATHAMBI, Ezhumalai</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA</atitle><jtitle>Studies in Informatics and Control</jtitle><date>2022</date><risdate>2022</risdate><volume>31</volume><issue>2</issue><spage>95</spage><epage>104</epage><pages>95-104</pages><issn>1220-1766</issn><eissn>1841-429X</eissn><abstract>Cloud computing is an attractive technology paradigm that has been widely used as a tool for storing and analyzing the data of different users. Since access to the cloud is achieved through the Internet, data stored in clouds is susceptible to attacks from external as well as internal intruders. Henceforth, cloud service providers (CSPs) need to take action in order to provide a secure framework that would detect intrusion in the cloud and protect and secure customer information against hackers and intruders. This paper proposes a Sgd-LSTM and signature-based access control policy based Intrusion Detection and Prevention System (IDPS) model which is meant to detect and prevent various intrusions in the cloud. The proposed system includes three phases: the user registration phase, intrusion detection phase, and intrusion prevention phase. Initially, user registration is performed based on a unique ID and password, and then, the password is converted into hashcode by using the C2HA algorithm and then stored in the cloud for authentication purposes. In the intrusion detection phase, the status of cloud data is predicted by employing the Sgd-LSTM classifier in order to discard the intruder data packets from the cloud. At last, in the intrusion prevention phase, data access to the cloud environment is controlled by using signature-based user authentication in order to authenticate the legitimate user. The proposed classifier can effectively detect the intruders, which was experimentally proved by comparing it with the existing classifiers.</abstract><cop>Bucharest</cop><pub>National Institute for Research and Development in Informatics</pub><doi>10.24846/v31i2y202209</doi><tpages>10</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1220-1766 |
ispartof | Studies in Informatics and Control, 2022, Vol.31 (2), p.95-104 |
issn | 1220-1766 1841-429X |
language | eng |
recordid | cdi_crossref_primary_10_24846_v31i2y202209 |
source | Publicly Available Content Database |
subjects | Access control Prevention Service introduction |
title | Efficient Intrusion Detection and Prevention Model in Cloud Environment Using Sgd-LSTM and C2HA |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T02%3A29%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20Intrusion%20Detection%20and%20Prevention%20Model%20in%20Cloud%20Environment%20Using%20Sgd-LSTM%20and%20C2HA&rft.jtitle=Studies%20in%20Informatics%20and%20Control&rft.au=NAMAKKAL%20PONNUSAMY,%20Ponnuviji&rft.date=2022&rft.volume=31&rft.issue=2&rft.spage=95&rft.epage=104&rft.pages=95-104&rft.issn=1220-1766&rft.eissn=1841-429X&rft_id=info:doi/10.24846/v31i2y202209&rft_dat=%3Cproquest_cross%3E2691436890%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c304t-2cc6642e34c0b6f37b53eaaf2fbec79eae50ccd93d80931bf79ce7fd23f096173%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2691436890&rft_id=info:pmid/&rfr_iscdi=true |