ENCRYPTED COMMUNICATION WITH INTELLIGENT THREAT DETECTION: A SECURE CHAT FRAMEWORK
DOI:
https://doi.org/10.29121/granthaalayah.v12.i7.2024.6102Keywords:
Intelligent Threat Detection, Secure Chat Framework, Encrypted Messaging, Security, Lstm NetworkAbstract [English]
The Secure Chat Application is a web-based encrypted messaging platform designed to facilitate confidential communication within enterprises. To further enhance the reliability and security of the system, this work integrates advanced machine learning and signal processing techniques, specifically Long Short-Term Memory (LSTM) networks and the Kalman Filter. The LSTM network is utilized to model and predict user behavior and message patterns over time, allowing the system to detect anomalies such as unauthorized access attempts, message injection, or abnormal activity sequences. These predictions enable proactive security responses and reinforce system integrity. Complementing this, the Kalman Filter is employed to smooth real-time data streams—such as authentication logs, message timestamps, and user actions—thereby filtering out noise and improving the accuracy of anomaly detection and user session monitoring.
This hybrid approach not only fortifies the chat environment against evolving security threats but also optimizes performance by enabling real-time synchronization and responsive data validation. Combined with Firebase’s secure backend for identity management and message storage, and a React-based frontend for cross-platform accessibility, the application offers a robust, scalable, and intelligent communication solution for modern enterprises. The incorporation of LSTM and Kalman filtering positions the platform as a proactive system capable of learning from and adapting to user behavior, thereby elevating both the user experience and security posture in organizational communication frameworks.
Downloads
References
A. Graves, A. Mohamed, and G. Hinton, "Speech Recognition with Deep Recurrent Neural Networks," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2013, pp. 6645-6649. https://doi.org/10.1109/ICASSP.2013.6638947 DOI: https://doi.org/10.1109/ICASSP.2013.6638947
A. Roy, M. Chowdhury, and S. Bandyopadhyay, "LSTM Based Human Behavior Prediction Model Using Smartphone Sensor Data," in IEEE International Conference on Smart Technologies and Systems for Next Generation Computing, 2020.
D. Puthal, B. S. P. Mishra, S. P. Mohanty, E. Kougianos, and C. Yang, "A Secure and Sustainable IoT Communication Framework: Integrating LSTM and Blockchain for Threat Detection," IEEE Consumer Electronics Magazine, vol. 9, no. 5, pp. 22-29, 2020.
D. R. Ferreira, T. C. Silva, and D. Sadok, "Kalman Filter-Based Monitoring for Smart Grids," Sensors, vol. 20, no. 4, pp. 1-17, 2020.
Google Firebase, "Firebase Documentation," [Online]. Available:
H. Kim, Y. Kim, and H. Lee, "A Real-Time Intrusion Detection System Using Machine Learning," International Journal of Engineering & Technology, vol. 7, no. 2.26, pp. 62-65, 2018.
J. G. Ward, "Time Series Anomaly Detection Using LSTM Networks," Cornell University Library, arXiv:2004.00433 [cs.LG], 2020.
M. A. Ferrag, M. N. Belouadha, L. Maglaras, and A. Derhab, "Security and Privacy for Cloud-Based IoT: Challenges and Solutions," IEEE Access, vol. 9, pp. 39630-39652, 2021.
M. A. Hasan, M. Islam, and M. M. Rahman, "Machine Learning Algorithms for Early Detection of Cyber Attacks in E-Health Applications," Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 8, pp. 5236-5247, 2022.
M. Alazab, A. Awajan, J. Abawajy, K. R. Choo, M. Alauthman, and A. Alazab, "Cybersecurity in the Era of COVID-19: A Survey," IEEE Access, vol. 8, pp. 123025-123042, 2020.
M. D. McIlroy, "Real-Time Anomaly Detection for Streaming Analytics," in Proc. of the ACM SIGMOD International Conference on Management of Data, 2018, pp. 1571-1586.
M. S. Ahmed, A. N. Mahmood, and J. Hu, "A Survey of Network Anomaly Detection Techniques," Journal of Network and Computer Applications, vol. 60, pp. 19-31, 2016. https://doi.org/10.1016/j.jnca.2015.11.016 DOI: https://doi.org/10.1016/j.jnca.2015.11.016
N. Chandran, R. Kumar, and A. P. Ramesh, "LSTM-Based Real-Time Chat Anomaly Detection for Secure Messaging," in 2021 6th International Conference on Inventive Computation Technologies (ICICT), pp. 231-236.
N. Hubballi and V. Suryanarayanan, "Layer-Wise Anomaly Detection in Encrypted Network Traffic," in IEEE ICC, 2020, pp. 1-6.
P. Laskov, C. Schäfer, I. Kotenko, and K. Rieck, "Intrusion Detection in Encrypted Web Traffic with Adaptive Binning and Random Forests," in International Workshop on Recent Advances in Intrusion Detection (RAID), 2016.
R. E. Kalman, "A New Approach to Linear Filtering and Prediction Problems," Transactions of the ASME-Journal of Basic Engineering, vol. 82, no. 1, pp. 35-45, 1960. https://doi.org/10.1115/1.3662552 DOI: https://doi.org/10.1115/1.3662552
S. Hochreiter and J. Schmidhuber, "Long Short-Term Memory," Neural Computation, vol. 9, no. 8, pp. 1735-1780, 1997. https://doi.org/10.1162/neco.1997.9.8.1735 DOI: https://doi.org/10.1162/neco.1997.9.8.1735
S. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, "Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection," Network and Distributed System Security Symposium (NDSS), 2018. https://doi.org/10.14722/ndss.2018.23204 DOI: https://doi.org/10.14722/ndss.2018.23204
T. Chen, M. Xu, and Y. Zhou, "Anomaly Detection using LSTM Networks in Cyber-Physical Systems," IEEE Transactions on Industrial Informatics, vol. 15, no. 11, pp. 6522-6531, 2019.
Z. Lin, Y. Zhang, and J. Xu, "Anomaly Detection of Network Traffic Based on Machine Learning," in IEEE Intl. Conference on Computer and Communications (ICCC), 2018, pp. 366-371.
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Pranay Kumar, Pahal Singh, Pankaj, Neha Singh, Dr. Vikesh Kumar

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.