Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and toPredictFuture Community Intrusions

Abstract

Purpose: Because of the apparent rapid advancement in the field of information and communication technology and its constant connection to the internet, customer and organizational data have become vulnerable to cyber-attacks, necessitating the explanation of solutions to ensure the security and protection of information throughout the industry. Today, it is critical for governments and major corporations to implement cybersecurity systems to ensure the confidentiality andsecurity of data in the face of cyber-attacks. As community-based fully systems have become more important in today's society, they've become targets for malicious actions, prompting both industry and the research community to place a greater emphasis on resolving community intrusion detection difficulties. In network intrusion detection challenges, gadget examining algorithms have proven to be a valuable tool.Design/Methodology/Approach: This research provided a fully unique architecture for attack node mitigation as a result of the use of a novel type and encryption mechanism. First, the UNSW-NB15 dataset is received and separated into training and testing data. Within the Training section, information is first and foremost pre-processed, and capabilities are extracted. The relevant features are then chosen using the Taxicab Woodpecker Mating algorithm (TWMA). The BRELU-ResNet classifier is then used to classify the attacked and non-attacked data. The typical statistics are encrypted using the ESHP-ECC method, which is then saved in the security log report. Following that, the shortest distance will be calculated using Euclidean distance. Finally, the information is decrypted utilizing a set of ideas known as DSHP-ECC. If the entry appears in the log record while testing, it is marked as attacked statistics and will not be communicated. The method of detecting cyber-assaults will continue if it is not detected.Findings/Result: The analysis is based on the UNSW-NB 15 dataset, which shows that the proposed approach achieves an excessive security level of 93.75 percent. Originality/Value: This experimental-based research article examines the malicious activities in the cyberspace and mitigated by using a SHP-ECC mechanism.Paper Type: Research Article

Authors and Affiliations

Sangeetha Prabhu, Nethravathi P. S

Keywords

Related Articles

Use of Natural Language Processing in Software Requirements Prioritization–A Systematic Literature Review

Purpose: Research involves the creation and implementation of new ideas by keeping the existing work as a foundation. The literature review done in this paper is to familiarise and to know about the domain o...

Job Safety Analysis during Tunnel Construction

Purpose: There are many tunnels under construction in Nepal as its mountainous country. Road, water supply, hydropower, and irrigation projects are under construction in Nepal through the tunnel. “Safety First” should...

Causes and Effects of Design Change of Construction Projects

Purpose:Design is the mother of all construction as it is not only technical but also strategic processfor competitiveness. In last decade, enormous bridge projects have been designed in Nepal but not all of them have be...

ICT Driven Smart Lighting Solution “iLIGHT” for Smart Cities: A Conceptual Framework

Purpose: Smart Cities offers enhanced quality and performance of urban services using various ICT and Digital Technologies. It is a fact that more and more people are migrating to Smart Cities for better ca...

A Custom Robotic ARM in CoppeliaSim

Purpose: For robotics research, we require the robot to test our functions, Logics, algorithms, tasks, etc. Generally, we do not experiment with the practical robot. The primary issue is Practical robots are costly. Th...

Download PDF file
  • EP ID EP714612
  • DOI https://doi.org/10.5281/zenodo.6350841
  • Views 77
  • Downloads 0

How To Cite

Sangeetha Prabhu, Nethravathi P. S (2022). Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and toPredictFuture Community Intrusions. INTERNATIONAL JOURNAL OF APPLIED ENGINEERING AND MANAGEMENT LETTERS (IJAEML), 6(1), -. https://europub.co.uk/articles/-A-714612