Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing

View through CrossRef
In order to improve the communication security of wireless mobile network, a collaborative intrusion detection method based on cloud computing is studied. The mobile terminal and the cloud computing platform are connected by the wireless mobile network. The cloud computing platform authentication server adopts a dual server and multifactor authentication scheme for mobile cloud computing to provide authentication services for mobile terminal users. The web server of the cloud computing platform uses the intrusion node detection protocol of the neighbor classification mechanism to provide a communication security protocol for users; Using the HMM algorithm, the intrusion detection module of the computing platform realizes the intrusion detection of wireless mobile network. Finally, using authentication service, security protocol, and intrusion detection module completes the cooperative detection of mobile network intrusion. The experimental results show that this method can realize the cooperative detection of wireless mobile network intrusion, and the detection accuracy is as high as 98%, which ensures the communication security of wireless mobile network.
Title: A Collaborative Detection Method of Wireless Mobile Network Intrusion Based on Cloud Computing
Description:
In order to improve the communication security of wireless mobile network, a collaborative intrusion detection method based on cloud computing is studied.
The mobile terminal and the cloud computing platform are connected by the wireless mobile network.
The cloud computing platform authentication server adopts a dual server and multifactor authentication scheme for mobile cloud computing to provide authentication services for mobile terminal users.
The web server of the cloud computing platform uses the intrusion node detection protocol of the neighbor classification mechanism to provide a communication security protocol for users; Using the HMM algorithm, the intrusion detection module of the computing platform realizes the intrusion detection of wireless mobile network.
Finally, using authentication service, security protocol, and intrusion detection module completes the cooperative detection of mobile network intrusion.
The experimental results show that this method can realize the cooperative detection of wireless mobile network intrusion, and the detection accuracy is as high as 98%, which ensures the communication security of wireless mobile network.

Related Results

Transportation mobility management
Transportation mobility management
Today, the world has observed a remarkable growth in the use of transportation mobile communications for road safety. While a user in a vehicle moves to a new communication cell, a...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
INTELLIGENT INTRUSION DETECTION FOR ENHANCED SECURITY IN CLOUD COMPUTING
Advancements of cloud computing called for the storage of big data through the use of clouds but this came with a lot of risk. Thus, this thesis is aimed to manage these risks by p...
Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
Is cloud computing a game-changer for SME financial performance? Unveiling the mediating role of organizational agility through PLS-SEM
Is cloud computing a game-changer for SME financial performance? Unveiling the mediating role of organizational agility through PLS-SEM
PurposeCloud computing services are game-changing in empowering organizations to drive innovation and unlock new growth opportunities. Accordingly, this study aims to examine the d...
Energy‐aware cross‐layer resource allocation in mobile cloud
Energy‐aware cross‐layer resource allocation in mobile cloud
SummaryThis paper proposed an energy‐aware cross‐layer mobile cloud resource allocation approach. In this paper, a hybrid cloud architecture is adopted for provisioning mobile serv...
A Survey Non-Terrestrial Networks in 6G/ 7G Smart Network for 2035+ and Beyond
A Survey Non-Terrestrial Networks in 6G/ 7G Smart Network for 2035+ and Beyond
3GPP TR 38.821, “Solutions for NR to support non-terrestrial networks (NTN),” Release 16, Jan. 2020. [Online]. Available: https://www.3gpp.org/. P. K. Chowdhury, M. Atiquzzaman, W....
Intelligent Time Allocation for Wireless Power Transfer in Wireless‐Powered Mobile Edge Computing
Intelligent Time Allocation for Wireless Power Transfer in Wireless‐Powered Mobile Edge Computing
Wireless‐powered mobile edge computing is a new network computing paradigm that combines with the advantages of wireless power transfer and mobile edge computing. When the harvest‐...

Back to Top