Open Access iconOpen Access

ARTICLE

An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN

Nouf Saeed Alotaibi*

Department of Computer Science, College of Science and Humanities Al Dawadmi, Shaqra University, Shaqra, 11961, Saudi Arabia

* Corresponding Author: Nouf Saeed Alotaibi. Email: email

(This article belongs to the Special Issue: Advances in Information Security Application)

Computers, Materials & Continua 2023, 76(2), 2061-2078. https://doi.org/10.32604/cmc.2023.039446

Abstract

Intrusion Detection System (IDS) is a network security mechanism that analyses all users’ and applications’ traffic and detects malicious activities in real-time. The existing IDS methods suffer from lower accuracy and lack the required level of security to prevent sophisticated attacks. This problem can result in the system being vulnerable to attacks, which can lead to the loss of sensitive data and potential system failure. Therefore, this paper proposes an Intrusion Detection System using Logistic Tanh-based Convolutional Neural Network Classification (LTH-CNN). Here, the Correlation Coefficient based Mayfly Optimization (CC-MA) algorithm is used to extract the input characteristics for the IDS from the input data. Then, the optimized features are utilized by the LTH-CNN, which returns the attacked and non-attacked data. After that, the attacked data is stored in the log file and non-attacked data is mapped to the cyber security and data security phases. To prevent the system from cyber-attack, the Source and Destination IP address is converted into a complex binary format named 1’s Complement Reverse Shift Right (CRSR), where, in the data security phase the sensed data is converted into an encrypted format using Senders Public key Exclusive OR Receivers Public Key-Elliptic Curve Cryptography (PXORP-ECC) Algorithm to improve the data security. The Network Security Laboratory–Knowledge Discovery in Databases (NSL-KDD) dataset and real-time sensor are used to train and evaluate the proposed LTH-CNN. The suggested model is evaluated based on accuracy, sensitivity, and specificity, which outperformed the existing IDS methods, according to the results of the experiments.

Keywords


Cite This Article

APA Style
Alotaibi, N.S. (2023). An efficient cyber security and intrusion detection system using CRSR with PXORP-ECC and LTH-CNN. Computers, Materials & Continua, 76(2), 2061-2078. https://doi.org/10.32604/cmc.2023.039446
Vancouver Style
Alotaibi NS. An efficient cyber security and intrusion detection system using CRSR with PXORP-ECC and LTH-CNN. Comput Mater Contin. 2023;76(2):2061-2078 https://doi.org/10.32604/cmc.2023.039446
IEEE Style
N.S. Alotaibi, “An Efficient Cyber Security and Intrusion Detection System Using CRSR with PXORP-ECC and LTH-CNN,” Comput. Mater. Contin., vol. 76, no. 2, pp. 2061-2078, 2023. https://doi.org/10.32604/cmc.2023.039446



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 687

    View

  • 419

    Download

  • 0

    Like

Share Link