Abstract
Nowadays, cloud computing has become a significant area for the business due to the high demand of people engaging in E-commerce. E-commerce applications are very popular for conducting business via the Internet which includes online banking, bill payment, and purchasing goods, etc. E-commerce is said to be more straightforward, easier to use, intuitive, and less threatening. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. One such powerful and harmful attack is the denial-of-service (DoS) attack, and hence, protecting the entities from such attacks is essential. Therefore, an effective DoS attack detection technique is required in the E-commerce transactions to offer security in this platform. Accordingly, in this paper, a technique is developed for DoS attack detection in the E-commerce transactions by proposing glowworm swarm optimization-based support vector neural network (GSO-SVNN)-based authorization. The security will be provided with elliptic-curve cryptography (ECC) and hashing function to show the strength of the security protocol against a DoS attacks. The performance of the proposed technique is evaluated using four metrics, like accuracy, precision, recall, and false positive rate (FPR).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yanpei C, Vern P, Randy HK (2010) What’s new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5, pp 2010-5
Jiuxin C, Bin Y, Fang D, Xiangying Z, Shuai X (2015) Entropy-based denial-of-service attack detection in cloud data center. Concurr Comput Pract Exp 27(18):5623–5639
Estrella G, Bertin M, Geomina T (2014) The drivers and impediments for cross-border E-commerce in the EU. Inf Econ Policy 28:83–96
Lars R, Sverker J (1996) Simulated social control for secure Internet commerce. In: Proceedings of the 1996 ACM workshop on new security paradigms, 18–25
TTW Group: The notorious nine: cloud computing top threats in 2013. Report Cloud Security Alliance (2013)
Jose B (2002) Protecting electronic commerce from distributed denial-of-service attacks. In: Proceedings of the 11th ACM international conference on World Wide Web, 553–561
Isaac P, Jordi S (2013) Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev 40(1):1–25
Audun J, Roslan I, Colin B (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644
Kevin H, David Z, Cristina N (2007) A survey of attacks on reputation systems, 1–17
Ya-Fei Y, Qin-Yuan F, Yan LS, Ya-Fei D (2009) Dishonest behaviors in online rating systems: cyber competition, attack models, and attack generator. J Comput Sci Technol 24(5):855–867
Eva Z, Denis T (2017) QADE: a novel trust and reputation model for handling false trust values in e–commerce environments with subjectivity consideration. Technol Econ Dev Econ 23(1):81–110
Al-Haidari F, Sqalli M, Salah K (2015) Evaluation of the impact of EDoS attacks against cloud computing services. Arab J Sci Eng 40(3):773–785
Gaik-Yee C, Chien-Sing L, Swee-Huay H (2014) Defending against XML-related attacks in E-commerce applications with predictive fuzzy associative rules. Appl Soft Comput 24:142–157
Prasad KM, Reddy ARM, Rao KV (2017) BARTD: bio-inspired anomaly based real time detection of under rated App-DDoS attack on web. J King Saud Univ Comput Inf Sci, 1–15
Guojun W, Felix M, Song G, Muhammad BA (2015) Neighbor similarity trust against sybil attack in P2P E-commerce. IEEE Trans Parallel Distrib Syst 26(3):824–833
Mukhopadhyay A, Chatterjee S, Bagchi KK, Kirs PJ, Shukla GK (2017) Cyber risk assessment and mitigation (CRAM) framework using logit and probit models for cyber insurance. Inf Syst Front, 1–22
Karoui K (2016) Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E-commerce web server. Int J Netk Manag 26(6):553–578
Kaipa KN, Ghose D (2017) Glowworm swarm optimization: algorithm development. Glowworm swarm optimization. Springer International Publishing, 21–56
Seroussi G (1999) Elliptic curve cryptography. In: Information theory and networking workshop (Cat. No. 99EX371), Metsovo, 41
Hankerson D, Alfred JM, Scott V (2006) Guide to elliptic curve cryptography. Springer Science & Business Media
Oswaldo L, Urbano N, Rui A (2014) Eigen value decay: a new method for neural network regularization. Neurocomputing 124:33–42
Samal S, Bandopdhaya S, Dora S, Poulkov V (2017) Coverage analysis of heterogeneous wireless network with n-interacted transmission nodes. Int J Interdiscip Telecommun Netw (IJITN) 9(4):49–58
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shaikh, J.R., Beniwal, R., Iliev, G. (2019). Cryptography and Optimization-Driven Support Vector Neural Network to Mitigate DoS Attacks in E-Commerce. In: Mishra, S., Sood, Y., Tomar, A. (eds) Applications of Computing, Automation and Wireless Systems in Electrical Engineering. Lecture Notes in Electrical Engineering, vol 553. Springer, Singapore. https://doi.org/10.1007/978-981-13-6772-4_48
Download citation
DOI: https://doi.org/10.1007/978-981-13-6772-4_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6771-7
Online ISBN: 978-981-13-6772-4
eBook Packages: EngineeringEngineering (R0)