ENCRYPTED COMMUNICATION WITH INTELLIGENT THREAT DETECTION: A SECURE CHAT FRAMEWORK

Authors

  • Pranay Kumar Department Of Computer Science & Engineering, Echelon Institute of Technology, Faridabad
  • Pahal Singh Department Of Computer Science & Engineering, Echelon Institute of Technology, Faridabad
  • Pankaj Department Of Computer Science & Engineering, Echelon Institute of Technology, Faridabad
  • Neha Singh Department Of Computer Science & Engineering, Echelon Institute of Technology, Faridabad
  • Dr. Vikesh Kumar Department Of Computer Science & Engineering, Echelon Institute of Technology, Faridabad

DOI:

https://doi.org/10.29121/granthaalayah.v12.i7.2024.6102

Keywords:

Intelligent Threat Detection, Secure Chat Framework, Encrypted Messaging, Security, Lstm Network

Abstract [English]

The Secure Chat Application is a web-based encrypted messaging platform designed to facilitate confidential communication within enterprises. To further enhance the reliability and security of the system, this work integrates advanced machine learning and signal processing techniques, specifically Long Short-Term Memory (LSTM) networks and the Kalman Filter. The LSTM network is utilized to model and predict user behavior and message patterns over time, allowing the system to detect anomalies such as unauthorized access attempts, message injection, or abnormal activity sequences. These predictions enable proactive security responses and reinforce system integrity. Complementing this, the Kalman Filter is employed to smooth real-time data streams—such as authentication logs, message timestamps, and user actions—thereby filtering out noise and improving the accuracy of anomaly detection and user session monitoring.
This hybrid approach not only fortifies the chat environment against evolving security threats but also optimizes performance by enabling real-time synchronization and responsive data validation. Combined with Firebase’s secure backend for identity management and message storage, and a React-based frontend for cross-platform accessibility, the application offers a robust, scalable, and intelligent communication solution for modern enterprises. The incorporation of LSTM and Kalman filtering positions the platform as a proactive system capable of learning from and adapting to user behavior, thereby elevating both the user experience and security posture in organizational communication frameworks.

Downloads

Download data is not yet available.

References

A. Graves, A. Mohamed, and G. Hinton, "Speech Recognition with Deep Recurrent Neural Networks," in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2013, pp. 6645-6649. https://doi.org/10.1109/ICASSP.2013.6638947 DOI: https://doi.org/10.1109/ICASSP.2013.6638947

A. Roy, M. Chowdhury, and S. Bandyopadhyay, "LSTM Based Human Behavior Prediction Model Using Smartphone Sensor Data," in IEEE International Conference on Smart Technologies and Systems for Next Generation Computing, 2020.

D. Puthal, B. S. P. Mishra, S. P. Mohanty, E. Kougianos, and C. Yang, "A Secure and Sustainable IoT Communication Framework: Integrating LSTM and Blockchain for Threat Detection," IEEE Consumer Electronics Magazine, vol. 9, no. 5, pp. 22-29, 2020.

D. R. Ferreira, T. C. Silva, and D. Sadok, "Kalman Filter-Based Monitoring for Smart Grids," Sensors, vol. 20, no. 4, pp. 1-17, 2020.

Google Firebase, "Firebase Documentation," [Online]. Available:

H. Kim, Y. Kim, and H. Lee, "A Real-Time Intrusion Detection System Using Machine Learning," International Journal of Engineering & Technology, vol. 7, no. 2.26, pp. 62-65, 2018.

J. G. Ward, "Time Series Anomaly Detection Using LSTM Networks," Cornell University Library, arXiv:2004.00433 [cs.LG], 2020.

M. A. Ferrag, M. N. Belouadha, L. Maglaras, and A. Derhab, "Security and Privacy for Cloud-Based IoT: Challenges and Solutions," IEEE Access, vol. 9, pp. 39630-39652, 2021.

M. A. Hasan, M. Islam, and M. M. Rahman, "Machine Learning Algorithms for Early Detection of Cyber Attacks in E-Health Applications," Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 8, pp. 5236-5247, 2022.

M. Alazab, A. Awajan, J. Abawajy, K. R. Choo, M. Alauthman, and A. Alazab, "Cybersecurity in the Era of COVID-19: A Survey," IEEE Access, vol. 8, pp. 123025-123042, 2020.

M. D. McIlroy, "Real-Time Anomaly Detection for Streaming Analytics," in Proc. of the ACM SIGMOD International Conference on Management of Data, 2018, pp. 1571-1586.

M. S. Ahmed, A. N. Mahmood, and J. Hu, "A Survey of Network Anomaly Detection Techniques," Journal of Network and Computer Applications, vol. 60, pp. 19-31, 2016. https://doi.org/10.1016/j.jnca.2015.11.016 DOI: https://doi.org/10.1016/j.jnca.2015.11.016

N. Chandran, R. Kumar, and A. P. Ramesh, "LSTM-Based Real-Time Chat Anomaly Detection for Secure Messaging," in 2021 6th International Conference on Inventive Computation Technologies (ICICT), pp. 231-236.

N. Hubballi and V. Suryanarayanan, "Layer-Wise Anomaly Detection in Encrypted Network Traffic," in IEEE ICC, 2020, pp. 1-6.

P. Laskov, C. Schäfer, I. Kotenko, and K. Rieck, "Intrusion Detection in Encrypted Web Traffic with Adaptive Binning and Random Forests," in International Workshop on Recent Advances in Intrusion Detection (RAID), 2016.

R. E. Kalman, "A New Approach to Linear Filtering and Prediction Problems," Transactions of the ASME-Journal of Basic Engineering, vol. 82, no. 1, pp. 35-45, 1960. https://doi.org/10.1115/1.3662552 DOI: https://doi.org/10.1115/1.3662552

S. Hochreiter and J. Schmidhuber, "Long Short-Term Memory," Neural Computation, vol. 9, no. 8, pp. 1735-1780, 1997. https://doi.org/10.1162/neco.1997.9.8.1735 DOI: https://doi.org/10.1162/neco.1997.9.8.1735

S. Mirsky, T. Doitshman, Y. Elovici, and A. Shabtai, "Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection," Network and Distributed System Security Symposium (NDSS), 2018. https://doi.org/10.14722/ndss.2018.23204 DOI: https://doi.org/10.14722/ndss.2018.23204

T. Chen, M. Xu, and Y. Zhou, "Anomaly Detection using LSTM Networks in Cyber-Physical Systems," IEEE Transactions on Industrial Informatics, vol. 15, no. 11, pp. 6522-6531, 2019.

Z. Lin, Y. Zhang, and J. Xu, "Anomaly Detection of Network Traffic Based on Machine Learning," in IEEE Intl. Conference on Computer and Communications (ICCC), 2018, pp. 366-371.

Downloads

Published

2024-07-31

How to Cite

Kumar, P., Singh, P., Pankaj, Singh, N., & Kumar, V. (2024). ENCRYPTED COMMUNICATION WITH INTELLIGENT THREAT DETECTION: A SECURE CHAT FRAMEWORK. International Journal of Research -GRANTHAALAYAH, 12(7), 211–220. https://doi.org/10.29121/granthaalayah.v12.i7.2024.6102