All facets of society's governance, economics, and culture have been impacted by networking. Network attacks have become more common as a result of the digital revolution, which has also facilitated major changes in worldwide communication and accelerated the development of human society. An unauthorized attempt to access a network with the goal of committing theft or other forms of damage is what we call a network attack. This article focuses on building a chain security model utilising the block chain concept in order to address the issue of inaccurate assessments of forged malicious behavioural methods for identification. It uses the NIK-256 hashing algorithm to identify valid users utilising time-dependent verification. Passwords and recorded times are maintained in a combined chain database, which combines blockchain technology and the Trusted Platform Module (TPM), improving data security and privacy. After that, we schedule users using the Whale optimisation algorithm (WOA), which decreases difficulty, and then a smart contract is developed that grants authorised users access control based on their level of trust and permission. The proposed approach, known as Hyb_chain_TPM, implements countermeasures in accordance with the attack risk level and stores the attack graph in a combined chain database for future attack forecasting. Utilising diverse attack datasets, extensive tests are run to validate this system. Additionally, the outcomes of privacy protection and AI processes are assessed independently and contrasted using a variety of current techniques.
CITATION STYLE
Hu, J., Wang, H., & Li, H. (2023). Network Attack Chain Security Model Construction Based On Attack Framework. Journal of Electrical Systems, 19(4), 116–127. https://doi.org/10.52783/jes.627
Mendeley helps you to discover research relevant for your work.