IPFS based storage Authentication and access control model with optimization enabled deep learning for intrusion detection

被引:7
|
作者
Saviour, Mariya Princy Antony [1 ]
Samiappan, Dhandapani [2 ]
机构
[1] St Joseph Coll Engn, Dept Elect & Commun Engn, Chennai 602117, India
[2] Saveetha Engn Coll, Dept Elect & Commun Engn, Chennai 602105, India
关键词
Deep belief network; Deep residual network; Chronological concept; Anti coronavirus optimization; Intrusion detection; NETWORK;
D O I
10.1016/j.advengsoft.2022.103369
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network security has benefited from intrusion detection, which may spot unexpected threats from network traffic. Modern methods for detecting network anomalies typically rely on conventional machine learning models. The human construction of traffic features that these systems mainly rely on, which is no longer relevant in the age of big data, results in relatively low accuracy and certain exceptional features. A storage authentication and access control model based on Interplanetary File System (IPFS) and a network intrusion detection system based on Chronological Anticorona Virus Optimization are hence the main goals of this research (CACVO-based DRN).The setup, user registration, initialization, data encryption and storage, authentication, testing, access control, and decryption stages are used here to perform the blockchain authentication and access control. After then, DRN is used to perform network intrusion detection. To do this, the recorded data log file is initially sent to the feature fusion module, which uses Deep Belief Network and hybrid correlation factors (DBN). After the feature fusion is complete, the proposed optimization technique, CACVO, which was recently developed by fusing the Chronological Concept with Anti Corona virus Optimization (ACVO) algorithm, is used to perform intrusion detection utilizing DRN. The experimental outcome shows that, based on the f-measure value of 0.939 and 0.938, respectively, the developed model achieved greater performance.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment
    Romany F. Mansour
    Scientific Reports, 12
  • [2] Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment
    Mansour, Romany F.
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [3] IPFS based file storage access control and authentication model for secure data transfer using block chain technique
    Saviour, Mariyaprincy Antony
    Samiappan, Dhandapani
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (02):
  • [4] Intelligent Intrusion Detection Using Arithmetic Optimization Enabled Density Based Clustering with Deep Learning
    Alrowais, Fadwa
    Marzouk, Radwa
    Nour, Mohamed K.
    Mohsen, Heba
    Hilal, Anwer Mustafa
    Yaseen, Ishfaq
    Alsaid, Mohamed Ibrahim
    Mohammed, Gouse Pasha
    ELECTRONICS, 2022, 11 (21)
  • [5] Deep learning-enabled energy optimization and intrusion detection for wireless sensor networks
    Srivastava, Jyoti
    Prakash, Jay
    OPSEARCH, 2025, 62 (01) : 368 - 405
  • [6] Hybrid optimization enabled deep learning technique for multi-level intrusion detection
    Selvan, G. S. R. Emil
    Azees, M.
    Vinodkumar, CH. Rayala
    Parthasarathy, G.
    ADVANCES IN ENGINEERING SOFTWARE, 2022, 173
  • [7] Hybrid optimization and deep learning based intrusion detection system
    Gupta, Subham Kumar
    Tripathi, Meenakshi
    Grover, Jyoti
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [8] A Deep Learning-Based Intrusion Detection System for MQTT Enabled IoT
    Khan, Muhammad Almas
    Khan, Muazzam A.
    Jan, Sana Ullah
    Ahmad, Jawad
    Jamal, Sajjad Shaukat
    Shah, Awais Aziz
    Pitropakis, Nikolaos
    Buchanan, William J.
    SENSORS, 2021, 21 (21)
  • [9] Intrusion Detection Model of Internet of Things Based on Deep Learning
    Wang, Yan
    Han, Dezhi
    Cui, Mingming
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2023, 20 (04) : 1519 - 1540
  • [10] Intrusion detection methods based on integrated deep learning model
    Wang, Zhendong
    Liu, Yaodi
    He, Daojing
    Chan, Sammy
    COMPUTERS & SECURITY, 2021, 103