In network security, safeguarding digital cyberspace infrastructure
against malicious intrusions remains a paramount concern. This study
addresses this imperative by proposing a novel approach that integrates
digital watermarking, Huffman coding, and sophisticated attack
classification techniques within the Controller Area Network (CAN)
protocol framework. The proliferation of interconnected systems and
the increasing sophistication of cyber threats necessitate novel
strategies to fortify network defenses and ensure resilience in the face
of adversarial activities. The research problem revolves around the
need to develop an effective method for detecting and categorizing
reconnaissance and violent attacks within cyberspace networks,
particularly those utilizing the CAN protocol. Despite advancements in
security protocols and intrusion detection systems, existing
methodologies often fall short in accurately distinguishing between
benign and malicious network activities, leaving critical infrastructure
vulnerable to exploitation. This research uses digital watermarking to
embed metadata within network packets, Huffman coding for efficient
data compression, and advanced attack classification algorithms for
real-time threat identification. The experimental results demonstrate
the efficacy of the proposed approach in accurately differentiating
between reconnaissance probes and violent attacks, thereby enabling
timely and targeted responses to mitigate security threats.
Rajender Udutha1, Sunil Kumar2, Allanki Sanyasi Rao3, Srinivasa Rao Dhanikonda4 Vaageswari College of Engineering, India1, Auro University, India2, Christu Jyothi Institute of Technology and Science, India3, BVRIT Hyderabad College of Engineering for Women, India4
Network Security, Controller Area Network (CAN) Protocol, Digital Watermarking, Huffman Coding, Attack Classification
January | February | March | April | May | June | July | August | September | October | November | December |
0 | 0 | 2 | 30 | 16 | 14 | 5 | 1 | 2 | 2 | 0 | 0 |
| Published By : ICTACT
Published In :
ICTACT Journal on Communication Technology ( Volume: 15 , Issue: 1 , Pages: 3153 - 3158 )
Date of Publication :
March 2024
Page Views :
331
Full Text Views :
72
|