A Fussy Based Neural Genetic Algorithm for Securing Data in Cyber Security

Main Article Content

S.R. Rahman

Abstract

Businesses are using cyber security technologies more and more to upgrade their operations. These businesses are prone to hazards and cyber security breaches because to the very specialized characteristics of such settings, including their sensitive exchange of cyber security data and the weak design of connected devices. Our main goal is to develop a cyber security system that can take into account all potential forms of assaults while staying within the allocated budget. To achieve this, a financial strategy based on portfolio management is utilized by enabling the selection of a portfolio of security controls that maximizes security level control while minimizing direct expenses. To solve this problem we proposed Fussy Based Neural Genetic Algorithm for authenticity, reliability and confidentiality of cyber security data and it decreases the danger of cyber security data integrity. Using a complex key, the plaintext is first transformed into a complex cipher text. The key is created using logical operators and is randomly chosen from the cyber security data. By applying principles of proposed algorithm, the cipher text acquired in the first step is rendered even more unreadable in the second phase. Feature Extraction of cyber security data is done by Principle Component Analysis (PCA).The data is encrypted by using Data Encryption Standard (DES). The data is decrypted using the proposed Fussy Based Neural Genetic Algorithm with Particle Swarm Optimization (FNGA-PSO).The suggested model's metrics are examined and compared to various traditional algorithms. This model solves the lack of difference in the authenticity of cyber security information, as well as it will give real and effective information to the organizational companies.

Article Details

How to Cite
Rahman, S. . (2022). A Fussy Based Neural Genetic Algorithm for Securing Data in Cyber Security. International Journal on Future Revolution in Computer Science &Amp; Communication Engineering, 8(2), 79–85. https://doi.org/10.17762/ijfrcsce.v8i2.2081
Section
Articles

References

H. Yin, D. Guo, K. Wang, Z. Jiang, Y. Lyu, and J. Xing, ‘‘Hyperconnected network: A decentralized trusted computing and networking paradigm,’’ IEEE Netw., vol. 32, no. 1, pp. 112–117, Jan./Feb. 2018.

X. Zheng, Z. Cai, and Y. Li, ‘‘Data linkage in smart Internet of Things systems: A consideration from a privacy perspective,’’ IEEE Commun. Mag., vol. 56, no. 9, pp. 55–61, Sep. 2018.

Odumesi John Olayemi, “A socio-technological analysis of cybercrime and cyber security in Nigeria”, Academic Journals International Journal of Sociology and Anthropology Vol. 6(3), Odumesi John Olayemi, March, 2014, pp. 116-125

Bhatia, D., 2022. A Comprehensive Review on the Cyber Security Methods in Indian Organisation. Int. J. Advance Soft Compu. Appl, 14(1).

Wang, K., Dong, J., Wang, Y. and Yin, H., 2019. Securing data with blockchain and AI. Ieee Access, 7, pp.77981-77989.

Sule, M.J., Zennaro, M. and Thomas, G., 2021. Cybersecurity through the lens of digital identity and data protection: issues and trends. Technology in Society, 67, p.101734.

Nguyen, G.N., Le Viet, N.H., Elhoseny, M., Shankar, K., Gupta, B.B. and Abd El-Latif, A.A., 2021. Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. Journal of parallel and distributed computing, 153, pp.150-160.

Faragallah, O.S., El-Shafai, W., Sallam, A.I., Elashry, I., EL-Rabaie, E.S.M., Afifi, A., AlZain, M.A., Al-Amri, J.F., El-Samie, F.E.A. and El-sayed, H.S., 2022. Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication. Journal of Ambient Intelligence and Humanized Computing, 13(2), pp.1215-1239.

Abd El-Latif, A.A., Abd-El-Atty, B., Mehmood, I., Muhammad, K., Venegas-Andraca, S.E. and Peng, J., 2021. Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in IoT-based smart cities. Information Processing & Management, 58(4), p.102549.

Mubina Malik, Trisha Patel, “Database security –attacks and control methods”, International Journal of Information Sciences and Techniques (IJIST) Vol.6, No.1/2, March 2016.

R. Mehla and H. Kaur, “Different reviews and variants of advance encryption standard,” International Journal of Science and Research (IJSR), ISSN (Online), pp. 2319–7064, 2014.

Mirsky, Y., Shabtai, A., Rokach, L., Shapira, B. and Elovici, Y., 2016, October. Sherlock vs moriarty: A smartphone dataset for cybersecurity research. In Proceedings of the 2016 ACM workshop on Artificial intelligence and security (pp. 1-12).

Vengatesan, K., Kumar, A., Subandh, T.S., Vincent, R., Sayyad, S., Singhal, A. and Wani, S.M., 2019, March. Secure Data Transmission Through Steganography with Blowfish Algorithm. In International Conference on Emerging Current Trends in Computing and Expert Technology (pp. 568-575). Springer, Cham.

Mojisola, F.O., Misra, S., Febisola, C.F., Abayomi-Alli, O. and Sengul, G., 2022. An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA). Egyptian Informatics Journal.

Dhinakaran, D. and Prathap, P.M., 2022. Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining. The Journal of Supercomputing, pp.1-35.

Pancholi, V.R. and Patel, B.P., 2016. Enhancement of cloud computing security with secure data storage using AES. International Journal for Innovative Research in Science and Technology, 2(9), pp.18-21.