Skip to main content

Cryptography and Optimization-Driven Support Vector Neural Network to Mitigate DoS Attacks in E-Commerce

  • Conference paper
  • First Online:
Applications of Computing, Automation and Wireless Systems in Electrical Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 553))

Abstract

Nowadays, cloud computing has become a significant area for the business due to the high demand of people engaging in E-commerce. E-commerce applications are very popular for conducting business via the Internet which includes online banking, bill payment, and purchasing goods, etc. E-commerce is said to be more straightforward, easier to use, intuitive, and less threatening. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. One such powerful and harmful attack is the denial-of-service (DoS) attack, and hence, protecting the entities from such attacks is essential. Therefore, an effective DoS attack detection technique is required in the E-commerce transactions to offer security in this platform. Accordingly, in this paper, a technique is developed for DoS attack detection in the E-commerce transactions by proposing glowworm swarm optimization-based support vector neural network (GSO-SVNN)-based authorization. The security will be provided with elliptic-curve cryptography (ECC) and hashing function to show the strength of the security protocol against a DoS attacks. The performance of the proposed technique is evaluated using four metrics, like accuracy, precision, recall, and false positive rate (FPR).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yanpei C, Vern P, Randy HK (2010) What’s new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5, pp 2010-5

    Google Scholar 

  2. Jiuxin C, Bin Y, Fang D, Xiangying Z, Shuai X (2015) Entropy-based denial-of-service attack detection in cloud data center. Concurr Comput Pract Exp 27(18):5623–5639

    Article  Google Scholar 

  3. Estrella G, Bertin M, Geomina T (2014) The drivers and impediments for cross-border E-commerce in the EU. Inf Econ Policy 28:83–96

    Article  Google Scholar 

  4. Lars R, Sverker J (1996) Simulated social control for secure Internet commerce. In: Proceedings of the 1996 ACM workshop on new security paradigms, 18–25

    Google Scholar 

  5. TTW Group: The notorious nine: cloud computing top threats in 2013. Report Cloud Security Alliance (2013)

    Google Scholar 

  6. Jose B (2002) Protecting electronic commerce from distributed denial-of-service attacks. In: Proceedings of the 11th ACM international conference on World Wide Web, 553–561

    Google Scholar 

  7. Isaac P, Jordi S (2013) Computational trust and reputation models for open multi-agent systems: a review. Artif Intell Rev 40(1):1–25

    Article  Google Scholar 

  8. Audun J, Roslan I, Colin B (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644

    Article  Google Scholar 

  9. Kevin H, David Z, Cristina N (2007) A survey of attacks on reputation systems, 1–17

    Google Scholar 

  10. Ya-Fei Y, Qin-Yuan F, Yan LS, Ya-Fei D (2009) Dishonest behaviors in online rating systems: cyber competition, attack models, and attack generator. J Comput Sci Technol 24(5):855–867

    Article  Google Scholar 

  11. Eva Z, Denis T (2017) QADE: a novel trust and reputation model for handling false trust values in e–commerce environments with subjectivity consideration. Technol Econ Dev Econ 23(1):81–110

    Google Scholar 

  12. Al-Haidari F, Sqalli M, Salah K (2015) Evaluation of the impact of EDoS attacks against cloud computing services. Arab J Sci Eng 40(3):773–785

    Article  Google Scholar 

  13. Gaik-Yee C, Chien-Sing L, Swee-Huay H (2014) Defending against XML-related attacks in E-commerce applications with predictive fuzzy associative rules. Appl Soft Comput 24:142–157

    Article  Google Scholar 

  14. Prasad KM, Reddy ARM, Rao KV (2017) BARTD: bio-inspired anomaly based real time detection of under rated App-DDoS attack on web. J King Saud Univ Comput Inf Sci, 1–15

    Google Scholar 

  15. Guojun W, Felix M, Song G, Muhammad BA (2015) Neighbor similarity trust against sybil attack in P2P E-commerce. IEEE Trans Parallel Distrib Syst 26(3):824–833

    Article  Google Scholar 

  16. Mukhopadhyay A, Chatterjee S, Bagchi KK, Kirs PJ, Shukla GK (2017) Cyber risk assessment and mitigation (CRAM) framework using logit and probit models for cyber insurance. Inf Syst Front, 1–22

    Google Scholar 

  17. Karoui K (2016) Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E-commerce web server. Int J Netk Manag 26(6):553–578

    Article  Google Scholar 

  18. Kaipa KN, Ghose D (2017) Glowworm swarm optimization: algorithm development. Glowworm swarm optimization. Springer International Publishing, 21–56

    Google Scholar 

  19. Seroussi G (1999) Elliptic curve cryptography. In: Information theory and networking workshop (Cat. No. 99EX371), Metsovo, 41

    Google Scholar 

  20. Hankerson D, Alfred JM, Scott V (2006) Guide to elliptic curve cryptography. Springer Science & Business Media

    Google Scholar 

  21. Oswaldo L, Urbano N, Rui A (2014) Eigen value decay: a new method for neural network regularization. Neurocomputing 124:33–42

    Article  Google Scholar 

  22. Samal S, Bandopdhaya S, Dora S, Poulkov V (2017) Coverage analysis of heterogeneous wireless network with n-interacted transmission nodes. Int J Interdiscip Telecommun Netw (IJITN) 9(4):49–58

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Javed R. Shaikh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shaikh, J.R., Beniwal, R., Iliev, G. (2019). Cryptography and Optimization-Driven Support Vector Neural Network to Mitigate DoS Attacks in E-Commerce. In: Mishra, S., Sood, Y., Tomar, A. (eds) Applications of Computing, Automation and Wireless Systems in Electrical Engineering. Lecture Notes in Electrical Engineering, vol 553. Springer, Singapore. https://doi.org/10.1007/978-981-13-6772-4_48

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-6772-4_48

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-6771-7

  • Online ISBN: 978-981-13-6772-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics