Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and toPredictFuture Community Intrusions

Abstract

Purpose: Because of the apparent rapid advancement in the field of information and communication technology and its constant connection to the internet, customer and organizational data have become vulnerable to cyber-attacks, necessitating the explanation of solutions to ensure the security and protection of information throughout the industry. Today, it is critical for governments and major corporations to implement cybersecurity systems to ensure the confidentiality andsecurity of data in the face of cyber-attacks. As community-based fully systems have become more important in today's society, they've become targets for malicious actions, prompting both industry and the research community to place a greater emphasis on resolving community intrusion detection difficulties. In network intrusion detection challenges, gadget examining algorithms have proven to be a valuable tool.Design/Methodology/Approach: This research provided a fully unique architecture for attack node mitigation as a result of the use of a novel type and encryption mechanism. First, the UNSW-NB15 dataset is received and separated into training and testing data. Within the Training section, information is first and foremost pre-processed, and capabilities are extracted. The relevant features are then chosen using the Taxicab Woodpecker Mating algorithm (TWMA). The BRELU-ResNet classifier is then used to classify the attacked and non-attacked data. The typical statistics are encrypted using the ESHP-ECC method, which is then saved in the security log report. Following that, the shortest distance will be calculated using Euclidean distance. Finally, the information is decrypted utilizing a set of ideas known as DSHP-ECC. If the entry appears in the log record while testing, it is marked as attacked statistics and will not be communicated. The method of detecting cyber-assaults will continue if it is not detected.Findings/Result: The analysis is based on the UNSW-NB 15 dataset, which shows that the proposed approach achieves an excessive security level of 93.75 percent. Originality/Value: This experimental-based research article examines the malicious activities in the cyberspace and mitigated by using a SHP-ECC mechanism.Paper Type: Research Article

Authors and Affiliations

Sangeetha Prabhu, Nethravathi P. S

Keywords

Related Articles

Demonstration of Modbus Protocol for Robot Communication Using C#

Purpose:The Modbus is the trusted name in the industrial automation communication domain. It is a pretty simple protocol to implement and so very popular to the industrial communication personnel. Nowadays, someindustri...

A Framework of Web Mining Algorithm-Based Hidden Pattern in India E-Government Application Using Blockchain Technology

Purpose: The Indian Government should be analyzing these problems and organized a special team who has responsibility for all inquiry and reduced these types of problem and India’s Government should be informed about n...

Traffic Flow Prediction using Machine Learning Techniques -A Systematic Literature Review

Purpose: Traffic control in large cities is extremely tough. To alleviate costs associated with traffic congestion, some nations of the world have implemented Intelligent Transportation Systems (ITS). This pa...

Job Safety Analysis during Tunnel Construction

Purpose: There are many tunnels under construction in Nepal as its mountainous country. Road, water supply, hydropower, and irrigation projects are under construction in Nepal through the tunnel. “Safety First” should...

Investors Behavioural Intention of Cryptocurrency Adoption–A Review based Research Agenda

Purpose: The current study investigates the behavioral intention to use cryptocurrencies.The study's major goal is to prioritize the key motivations behind it mainlyInvestment incry...

Download PDF file
  • EP ID EP714612
  • DOI https://doi.org/10.5281/zenodo.6350841
  • Views 27
  • Downloads 0

How To Cite

Sangeetha Prabhu, Nethravathi P. S (2022). Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and toPredictFuture Community Intrusions. INTERNATIONAL JOURNAL OF APPLIED ENGINEERING AND MANAGEMENT LETTERS (IJAEML), 6(1), -. https://europub.co.uk/articles/-A-714612