Cyber-security trust model through adaptive cloud authentication protocol for web application

被引:0
|
作者
Alsuwat, Hatim [1 ]
机构
[1] Umm Al Qura Univ, Coll Comp & Informat Syst, Dept Comp Sci, Mecca, Saudi Arabia
关键词
cyber-security; structure learning; Bayesian network; machine learning; adaptive cloud authentication protocol; support vector machine and adaptive fuzzy-based genetic algorithm; CRYPTOGRAPHY;
D O I
10.1117/1.JEI.32.4.042109
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The development and growth of internet-based technologies brings challenges in cyber-security from cyberattack organizations. It is necessary to develop an appropriate cyber-security scheme through a structured machine learning algorithm implemented in the cloud architecture. The aim of our research is to design a cloud-based architecture using an adaptive cloud authentication protocol to develop the trust model for cyber-security systems. Here, the structure learning of Bayesian networks (SL_BN) is developed with an ensemble architecture of machine learning that is integrated with the support vector machine and adaptive fuzzy-based genetic algorithm (SVM_AFGA). The fuzzy logic sets rules for using web applications at the authorized web address. The experimental results show that parametric analysis based on the cyber-security authentication model is based on median delay, transmission level overhead, and security of the network. Moreover, the parameters based on the SL-BN ensemble architecture are average runtime, accuracy, and network efficiency. (c) 2023 SPIE and IS&T
引用
收藏
页数:19
相关论文
共 50 条
  • [1] A New Adaptive Cyber-security Capability Maturity Model
    Ghaffari, Fariba
    Arabsorkhi, Abouzar
    [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 298 - 304
  • [2] Cyber-Security and a Potential Role for the Maritime Cloud
    Wimpenny, G.
    Safar, J.
    Grant, A.
    Bransby, M.
    Ward, N.
    [J]. PROCEEDINGS OF THE 30TH INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2017), 2017, : 1800 - 1808
  • [3] Scalable Cyber-Security for Terabit Cloud Computing
    Ros-Giralt, Jordi
    Szilagyi, Peter
    Lethin, Richard
    [J]. 2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, : 1607 - 1616
  • [4] Trust Authentication Protocol on the Web
    GUO Ya-jun~ 1
    2. Department of Computer Science
    [J]. Wuhan University Journal of Natural Sciences, 2006, (01) : 253 - 255
  • [5] State-of-The-Art of Cloud Computing Cyber-Security
    Bennasar, Hanane
    Essaaidi, Mohammad
    Bendahmane, Ahmed
    Ben-othman, Jalel
    [J]. PROCEEDINGS OF 2015 THIRD IEEE WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2015,
  • [6] Quantifying the Significance and Relevance of Cyber-Security Text Through Textual Similarity and Cyber-Security Knowledge Graph
    Mendsaikhan, Otgonpurev
    Hasegawa, Hirokazu
    Yamaguchi, Yukiko
    Shimada, Hajime
    [J]. IEEE ACCESS, 2020, 8 : 177041 - 177052
  • [7] Beyond the Castle Model of cyber-risk and cyber-security
    Leuprecht, Christian
    Skillicorn, David B.
    Tait, Victoria E.
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2016, 33 (02) : 250 - 257
  • [8] An Overview of the State-of-the-Art of Cloud Computing Cyber-Security
    Bennasar, H.
    Bendahmane, A.
    Essaaidi, M.
    [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 56 - 67
  • [9] Cyber-Security for the Controller Area Network (CAN) Communication Protocol
    Lin, Chung-Wei
    Sangiovanni-Vincentelli, Alberto
    [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 1 - 7
  • [10] Arabic Twitter User Profiling: Application to Cyber-security
    Basti, Rahma
    Jamoussi, Salma
    Charfi, Anis
    Ben Hamadou, Abdelmajid
    [J]. WEBIST: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2019, : 110 - 117