Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Advances in Network Security for a Resilient Digital Cyberspace Infrastructure


Affiliations
1 Department of Electronics and Communication Engineering, Vaageswari College of Engineering, India
2 School of Information Technology, Auro University, India
3 Department of Electronics and Communication Engineering, Christu Jyothi Institute of Technology and Science, India
4 Department of Information Technology, BVRIT Hyderabad College of Engineering for Women, India
     

   Subscribe/Renew Journal


In network security, safeguarding digital cyberspace infrastructure against malicious intrusions remains a paramount concern. This study addresses this imperative by proposing a novel approach that integrates digital watermarking, Huffman coding, and sophisticated attack classification techniques within the Controller Area Network (CAN) protocol framework. The proliferation of interconnected systems and the increasing sophistication of cyber threats necessitate novel strategies to fortify network defenses and ensure resilience in the face of adversarial activities. The research problem revolves around the need to develop an effective method for detecting and categorizing reconnaissance and violent attacks within cyberspace networks, particularly those utilizing the CAN protocol. Despite advancements in security protocols and intrusion detection systems, existing methodologies often fall short in accurately distinguishing between benign and malicious network activities, leaving critical infrastructure vulnerable to exploitation. This research uses digital watermarking to embed metadata within network packets, Huffman coding for efficient data compression, and advanced attack classification algorithms for real-time threat identification. The experimental results demonstrate the efficacy of the proposed approach in accurately differentiating between reconnaissance probes and violent attacks, thereby enabling timely and targeted responses to mitigate security threats.

Keywords

Network Security, Controller Area Network (CAN) Protocol, Digital Watermarking, Huffman Coding, Attack Classification.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Haibo Hu and Jianliang Xu, “2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services”, IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 10, pp. 1458-1472, 2010.
  • Ping Yi, Zhoulin Dai, Shiyong Zhang and Yiping Zhong, “A New Routing Attack in Mobile Ad Hoc Networks”, International Journal of Information Technology, Vol. 11, No. 2, pp. 83-94, 2005.
  • Zhiqiang Gao and Zhiqiang, “Differentiating Malicious DDoS Attack Traffic from Normal TCP Flows by Proactive Tests”, IEEE Communications Letters, Vol. 10, No. 11, pp. 793-795, 2006.
  • M. Zhou, L. Han, H. Lu and C. Fu, “Intrusion Detection System for IoT Heterogeneous Perceptual Network”, Mobile Networks and Applications, Vol. 33, No. 1, pp. 1-14, 2020.
  • L. Xiao, X. Wan, X. Lu and Y. Zhang, “IoT Security Techniques based on Machine Learning: How do IoT Devices use AI to Enhance Security?”, IEEE Signal Processing Magazine, Vol. 35, No. 5, pp. 41-49, 2018.
  • B. Gobinathan and V.P. Sundramurthy, “A Novel Method to Solve Real Time Security Issues in Software Industry using Advanced Cryptographic Techniques”, Scientific Programming, Vol. 2021, pp. 1-9, 2021.
  • Qi Liao, David A. Cieslak, Aaron D. Striegel and Nitesh V. Chawla, “Using Selective, Short-Term Memory to Improve Resilience against DDoS Exhaustion Attack”, Security and Communication Networks, Vol. 1, pp. 287-299, 2008.
  • J. Singh, R. Vikram and S. Sakthivel, “Energy-Efficient Clustering and Routing Algorithm using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks”, Security and Communication Networks, Vol. 2022, pp. 1-13, 2022.
  • V. Saravanan and A. Sumathi, “Handoff Mobiles with Low Latency in Heterogeneous Networks for Seamless Mobility: A Survey and Future Directions”, European Journal of Scientific Research, Vol. 81, No. 3, pp. 417-424, 2012.
  • J. Lloyd and R. Anane, “Implementation of A System for Cohesive and Secure Community Management”, Proceedings of International Conference on Computer Supported Cooperative Work in Design, pp. 133-138, 2021.
  • S.P. Yadav, F. Al Turjman and S.A. Kumar, “Quantum-Safe Cryptography Algorithms and Approaches: Impacts of Quantum Computing on Cybersecurity”, De Gruyter, 2023.
  • R.N. Shanmugasundaram, “Enhancements of Resource Management for Device to Device (D2D) Communication: A Review”, Proceedings of International Conference on IoT in Social, Mobile, Analytics and Cloud, pp. 51-55, 2019.

Abstract Views: 96

PDF Views: 0




  • Advances in Network Security for a Resilient Digital Cyberspace Infrastructure

Abstract Views: 96  |  PDF Views: 0

Authors

Rajender Udutha
Department of Electronics and Communication Engineering, Vaageswari College of Engineering, India
Sunil Kumar
School of Information Technology, Auro University, India
Allanki Sanyasi Rao
Department of Electronics and Communication Engineering, Christu Jyothi Institute of Technology and Science, India
Srinivasa Rao Dhanikonda
Department of Information Technology, BVRIT Hyderabad College of Engineering for Women, India

Abstract


In network security, safeguarding digital cyberspace infrastructure against malicious intrusions remains a paramount concern. This study addresses this imperative by proposing a novel approach that integrates digital watermarking, Huffman coding, and sophisticated attack classification techniques within the Controller Area Network (CAN) protocol framework. The proliferation of interconnected systems and the increasing sophistication of cyber threats necessitate novel strategies to fortify network defenses and ensure resilience in the face of adversarial activities. The research problem revolves around the need to develop an effective method for detecting and categorizing reconnaissance and violent attacks within cyberspace networks, particularly those utilizing the CAN protocol. Despite advancements in security protocols and intrusion detection systems, existing methodologies often fall short in accurately distinguishing between benign and malicious network activities, leaving critical infrastructure vulnerable to exploitation. This research uses digital watermarking to embed metadata within network packets, Huffman coding for efficient data compression, and advanced attack classification algorithms for real-time threat identification. The experimental results demonstrate the efficacy of the proposed approach in accurately differentiating between reconnaissance probes and violent attacks, thereby enabling timely and targeted responses to mitigate security threats.

Keywords


Network Security, Controller Area Network (CAN) Protocol, Digital Watermarking, Huffman Coding, Attack Classification.

References