Open Access
Subscription Access
Open Access
Subscription Access
Advances in Network Security for a Resilient Digital Cyberspace Infrastructure
Subscribe/Renew Journal
In network security, safeguarding digital cyberspace infrastructure against malicious intrusions remains a paramount concern. This study addresses this imperative by proposing a novel approach that integrates digital watermarking, Huffman coding, and sophisticated attack classification techniques within the Controller Area Network (CAN) protocol framework. The proliferation of interconnected systems and the increasing sophistication of cyber threats necessitate novel strategies to fortify network defenses and ensure resilience in the face of adversarial activities. The research problem revolves around the need to develop an effective method for detecting and categorizing reconnaissance and violent attacks within cyberspace networks, particularly those utilizing the CAN protocol. Despite advancements in security protocols and intrusion detection systems, existing methodologies often fall short in accurately distinguishing between benign and malicious network activities, leaving critical infrastructure vulnerable to exploitation. This research uses digital watermarking to embed metadata within network packets, Huffman coding for efficient data compression, and advanced attack classification algorithms for real-time threat identification. The experimental results demonstrate the efficacy of the proposed approach in accurately differentiating between reconnaissance probes and violent attacks, thereby enabling timely and targeted responses to mitigate security threats.
Keywords
Network Security, Controller Area Network (CAN) Protocol, Digital Watermarking, Huffman Coding, Attack Classification.
Subscription
Login to verify subscription
User
Font Size
Information
- Haibo Hu and Jianliang Xu, “2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services”, IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 10, pp. 1458-1472, 2010.
- Ping Yi, Zhoulin Dai, Shiyong Zhang and Yiping Zhong, “A New Routing Attack in Mobile Ad Hoc Networks”, International Journal of Information Technology, Vol. 11, No. 2, pp. 83-94, 2005.
- Zhiqiang Gao and Zhiqiang, “Differentiating Malicious DDoS Attack Traffic from Normal TCP Flows by Proactive Tests”, IEEE Communications Letters, Vol. 10, No. 11, pp. 793-795, 2006.
- M. Zhou, L. Han, H. Lu and C. Fu, “Intrusion Detection System for IoT Heterogeneous Perceptual Network”, Mobile Networks and Applications, Vol. 33, No. 1, pp. 1-14, 2020.
- L. Xiao, X. Wan, X. Lu and Y. Zhang, “IoT Security Techniques based on Machine Learning: How do IoT Devices use AI to Enhance Security?”, IEEE Signal Processing Magazine, Vol. 35, No. 5, pp. 41-49, 2018.
- B. Gobinathan and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-9, 2021.
- Qi Liao, David A. Cieslak, Aaron D. Striegel and Nitesh V. Chawla, “Using Selective, Short-Term Memory to Improve Resilience against DDoS Exhaustion Attack”, Security and Communication Networks, Vol. 1, pp. 287-299, 2008.
- J. Singh, R. Vikram and S. Sakthivel, “Energy-Efficient Clustering and Routing Algorithm using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks”, Security and Communication Networks, Vol. 2022, pp. 1-13, 2022.
- V. Saravanan and A. Sumathi, “Handoff Mobiles with Low Latency in Heterogeneous Networks for Seamless Mobility: A Survey and Future Directions”, European Journal of Scientific Research, Vol. 81, No. 3, pp. 417-424, 2012.
- J. Lloyd and R. Anane, “Implementation of A System for Cohesive and Secure Community Management”, Proceedings of International Conference on Computer Supported Cooperative Work in Design, pp. 133-138, 2021.
- S.P. Yadav, F. Al Turjman and S.A. Kumar, “Quantum-Safe Cryptography Algorithms and Approaches: Impacts of Quantum Computing on Cybersecurity”, De Gruyter, 2023.
- R.N. Shanmugasundaram, “Enhancements of Resource Management for Device to Device (D2D) Communication: A Review”, Proceedings of International Conference on IoT in Social, Mobile, Analytics and Cloud, pp. 51-55, 2019.
Abstract Views: 106
PDF Views: 0