Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 13 , Issue 2 , PP: 96-108, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Link-Based Xcorr Normalization and Attention Mechanism for Predicting the Threats over the Network Model

V. Jemmy Joyce 1 , K. Rebecca Jebaseeli Edna 2 , P. Sherubha 3 * , Arivazhagi 4

  • 1 Department of Mathematics, Karunya Institute of Technology and Sciences, Coimbatore, India - (jemmy@karunya.edu)
  • 2 Department of Mathematics, Karunya Institute of Technology and Sciences, Coimbatore, India - ( edna@karunya.edu)
  • 3 Department of Information Technology, Karpagam College of Engineering, Coimbatore, India - (sherubha.p@kce.ac.in)
  • 4 Department of Computer Science and Engineering, University college of Engineering, Ariyalu, India - (arivupra@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.130208

    Received: January 09, 2024 Revised: Mrach 02, 2024 Accepted: May 01, 2024
    Abstract

    Sensor Networks (SNs) play an essential role in upcoming technologies like the Internet of Things (IoT), where technical services are highly prone to crucial vulnerability due to attacks. This research motivates to provide a mechanism to identify the link reliability of connected sensor nodes. The privacy-preserving keys are distributed among the corresponding network nodes. When the nodes suffer from an attack, it damages the linking nodes' community. It has the nature of healing itself when the attacks are identified over the network. The self-healing nature is not so complex, and it is termed a lightweight process. A novel link-based intrusion prediction mechanism uses attention-based Deep Neural Networks (-DNN) for lightweight linkage identification and labelling. This model helps predict basic network patterns using topological analysis with better generalization. The simulation is done with Python where the proposed -DNN model outperforms the five different conventional approaches with the adoption of a benchmark dataset (network traffic) for extensive analysis. The AUC is improved in an average manner with the adoption of -DNN. This model enhances the linkage connectivity to make different connectivity processes more efficient and reach the target non-convincing. It is sensed that the proposed -DNN outperforms the existing approaches by improving the network resilience by maintaining higher energy efficiency.

    Keywords :

    Sensor Network , link-based prediction , topological analysis , linkage identification , labelling , generalization , Kernel-based Deep Neural Networks

    References

    [1] Alsarhan, A., Al-Dubai, A. Y., Min, G., Zomaya, A. Y., & Bsoul, M. (2018). A new spectrum management scheme for road safety in smart cities. IEEE Transactions on Intelligent Transportation Systems, 19(11), 3496–3506.

    [2] Bitam, S., Mellouk, A., & Zeadally, S. (2015). Vanet-cloud: A generic cloud computing model for vehicular ad hoc networks. IEEE Wireless Communications, 22(1), 96–102.

    [3] Huang, Z., Ruj, S., Cavenaghi, M. A., Stojmenovic, M., & Nayak, A. (2014). A social network approach to trust management in vanets. Peer-to-Peer Networking and Applications, 7(3), 229–242

    [4] Kang, M. J., & Kang, J. W. (2016). Intrusion detection system using deep neural network for in-vehicle network security. PloS ONE, 11(6), e0155781.

    [5] Sedjelmaci, H., Senouci, S. M., & Abu-Rghef, M. A. (2014). An efficient and lightweight intrusion detection mechanism for service-oriented vehicular networks. IEEE Internet of Things Journal, 1(6), 570–577.

    [6] Shone, N., Ngoc, T. N., Phai, V. D., & Shi, Q. (2018). A deep learning approach to network intrusion detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41–50.

    [7] Sathya Preiya V, Kumar VDA. Deep Learning-Based Classification and Feature Extraction for Predicting Pathogenesis of Foot Ulcers in Patients with Diabetes. Diagnostics. 2023; 13(12):1983. https://doi.org/10.3390/diagnostics13121983.

    [8] Balakrishnan C, Ambeth Kumar VD. IoT-Enabled Classification of Echocardiogram Images for Cardiovascular Disease Risk Prediction with Pre-Trained Recurrent Convolutional Neural Networks. Diagnostics (Basel). 2023 Feb 18;13(4):775. doi: 10.3390/diagnostics13040775. PMID: 36832263; PMCID: PMC9955174.

    [9] Sun, G., Sun, S., Sun, J., Yu, H., Du, X., & Guizani, M. (2019). Security and privacy preservation in fog-based crowdsensing on the Internet of vehicles. Journal of Network and Computer Applications, 134, 89–99.

    [10] Zaidi, K., Milojevic, M. B., Rakocevic, V., Nallanathan, A., & Rajarajan, M. (2015). Host-based intrusion detection for vanets: A statistical approach to rogue node detection. IEEE Transactions on Vehicular Technology, 65(8), 6703–6714.

    [11] Zhang, C., Chen, K., Zeng, X., & Xue, X. (2018). Misbehaviour detection based on support vector machine and dempster-Shafer theory of evidence in vanets. IEEE Access, 6, 59860–59870.

    [12] Hemamalini, Selvamani, and Visvam Devadoss Ambeth Kumar. 2022. "Outlier Based Skimpy Regularization Fuzzy Clustering Algorithm for Diabetic Retinopathy Image Segmentation" Symmetry 14, no. 12: 2512. https://doi.org/10.3390/sym14122512.

    [13] Kumar, V.D.A., Sharmila, S., Kumar, A. et al. A novel solution for finding postpartum haemorrhage using fuzzy neural techniques. Neural Comput & Applic 35, 23683–23696 (2023). https://doi.org/10.1007/s00521-020-05683-z

    [14] V. D. A. Kumar, M. Raghuraman, A. Kumar, M. Rashid, S. Hakak and M. P. K. Reddy, "Green-Tech CAV: Next Generation Computing for Traffic Sign and Obstacle Detection in Connected and Autonomous Vehicles," in IEEE Transactions on Green Communications and Networking, vol. 6, no. 3, pp. 1307-1315, Sept. 2022, doi: 10.1109/TGCN.2022.3162698.

    [15] Soleymani, S. A., Abdullah, A. H., Zareei, M., Anisi, M. H., Vargas-Rosales, C., Khan, M. K., et al. (2017). A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access, 5, 15619–15629.

    [16] Zhou H et al. (2020) Evolutionary V2X technologies toward the Internet of vehicles: Challenges and opportunities. Proceedings of the IEEE 108(2):308–323

    [17] Awais Javed Muhammad, Zeadally Sherali, Hamida Elyes Ben (2019) Data analytics for cooperative intelligent transport systems. Vehicular Commun 15:63–72

    [18] Afzal Z, Kumar M (2020) Security of vehicular Ad-Hoc networks (VANET): a survey. In: Journal of Physics: Conference Series. Vol. 1427. 1. IOP Publishing

    [19] Tang F et al. (2019) Future intelligent and secure vehicular network toward 6G: Machine-learning approaches. Proceedings of the IEEE 108(2):292–307

    [20] Ahmad T, Anwar MA, Haque M (2020) Machine learning techniques for intrusion detection. In: Handbook of research on intrusion detection systems. IGI Global, pp 47–65

    [21] Agarwal Y, Jain K, Karabasoglu O (2018) Smart vehicle monitoring and assistance using cloud computing in vehicular Ad Hoc networks. Int J Transport Sci Technol 7(1):60–73

    [22] Abhishek Kumar, Kamred Udham Singh, Visvam Devadoss Ambeth Kumar, Tapan Kant, Abdul Khader Jilani Saudagar,     Abdullah Al Tameem, Mohammed Al Khathami, Muhammad Badruddin Khan,  Mozaherul Hoque Abul Hasanat, Khalid     Mahmood Malik, " Robust Watermarking Scheme for NIfTI Medical Images", Vol.71, No.2, 2022, pp.3107-3125, doi:10.32604/cmc.2022.022817

    [23]V.D.Ambeth Kumar and M.Ramakrishan (2013), “Temple and Maternity Ward Security using FPRS” in the month of May for the  Journal of  Electrical Engineering & Technology (JEET) ,Vol. 8, No. 3, PP: 633-637.

    [24] Sharma Sachin, Mohan Seshadri (2020) Cloud-Based Secured VANET with Advanced Resource Management and IoV Applications. In: Connected Vehicles in the Internet of Things. Springer, 2020, pp. 309–325

    [25] Wang W, Wu L, Qu W, Liu Z, Wang H (2021) Privacy-preserving cloud-fog–based traceable road condition monitoring in VANET. Int J Netw Manag 31(2):e2096

    [26] Lovén L et al. (2019) EdgeAI: a vision for distributed, degenerative artificial intelligence in future 6G networks. In: The 1st 6G Wireless Summit (2019), pp 1–2

    [27] Pitropakis Nikolaos et al. (2019) A taxonomy and survey of attacks against machine learning. Computer Sci Rev 34:100199

    [28] Singh T, Kumar N (2020) WITHDRAWN: Machine learning models for intrusion detection in IoT environment: a comprehensive review. In: Computer Communications, Elsevier. https://doi.org/10. 1016/j.comcom.2020.02.001

    [29] Ferran Mohamed Amine et al. (2020) Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Information Secure Appl 50:102419

    [30] Bangui H, Ge M, Buhnova B (2018) Exploring big data clustering algorithms for Internet of things applications. In: IoTBDS, pp 269–276

    [31] Osanaiye O, Alfa A, Hancke G (2018) A statistical approach to detect jamming attacks in wireless sensor networks. Sensors 18(6):1691

    [32] Chonka Ashley et al. (2011) Cloud security defence protects cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Computer Appl 34(4):1097–1107

    [33] Belenko V, Krundyshev V, Kalinin M (2018) Synthetic datasets generation for intrusion detection in VANET. In: Proceedings of the 11th international conference on security of information and networks. pp 1–6

    [34] Bangui Hind et al. (2017) Multi-criteria decision analysis methods in the mobile cloud offloading paradigm. J Sensor Actuator Netw 6(4):25

    [35] Grover J, Laxmi V, Gaur MS (2011) Misbehavior detection based on ensemble learning in vanet. In: International Conference on Advanced Computing, Networking and Security. Springer, pp 602–611

    [36] Mehdi MM, Raza I, Hussain SA (2017) A game theory-based trust model for vehicular Ad hoc networks (VANETs). Computer Netw 121:152–172

    [37] Liang J et al. (2019) A filter model for intrusion detection system in vehicle Ad Hoc networks: a hidden Markov methodology. Knowl-Based Syst 163:611–623.

    [38] P. Sherubha, P Amudhavalli, SP Sasirekha, “Clone attack detection using random forest and multi-objective cuckoo search classification”, International Conference on Communication and Signal Processing (ICCSP), pp. 0450-0454, 2019.

    [39] S. Dinesh, K. Maheswari, B. Arthi, P. Sherubha, A. Vijay, S. Sridhar, T. Rajendran, and Yosef Asrat Waji, “Investigations on Brain Tumor Classification Using Hybrid Machine Learning Algorithms”, Hindawi Journal of Healthcare Engineering, Volume 2022.

    Cite This Article As :
    Jemmy, V.. , Rebecca, K.. , Sherubha, P.. , , Arivazhagi. Link-Based Xcorr Normalization and Attention Mechanism for Predicting the Threats over the Network Model. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 96-108. DOI: https://doi.org/10.54216/JCIM.130208
    Jemmy, V. Rebecca, K. Sherubha, P. , A. (2024). Link-Based Xcorr Normalization and Attention Mechanism for Predicting the Threats over the Network Model. Journal of Cybersecurity and Information Management, (), 96-108. DOI: https://doi.org/10.54216/JCIM.130208
    Jemmy, V.. Rebecca, K.. Sherubha, P.. , Arivazhagi. Link-Based Xcorr Normalization and Attention Mechanism for Predicting the Threats over the Network Model. Journal of Cybersecurity and Information Management , no. (2024): 96-108. DOI: https://doi.org/10.54216/JCIM.130208
    Jemmy, V. , Rebecca, K. , Sherubha, P. , , A. (2024) . Link-Based Xcorr Normalization and Attention Mechanism for Predicting the Threats over the Network Model. Journal of Cybersecurity and Information Management , () , 96-108 . DOI: https://doi.org/10.54216/JCIM.130208
    Jemmy V. , Rebecca K. , Sherubha P. , A. [2024]. Link-Based Xcorr Normalization and Attention Mechanism for Predicting the Threats over the Network Model. Journal of Cybersecurity and Information Management. (): 96-108. DOI: https://doi.org/10.54216/JCIM.130208
    Jemmy, V. Rebecca, K. Sherubha, P. , A. "Link-Based Xcorr Normalization and Attention Mechanism for Predicting the Threats over the Network Model," Journal of Cybersecurity and Information Management, vol. , no. , pp. 96-108, 2024. DOI: https://doi.org/10.54216/JCIM.130208