Neural Network Implementation for Detection of Denial of Service Attacks

被引:0
|
作者
Topalova, Irina [1 ]
Radoyska, Pavlinka [1 ]
Sokolov, Strahil [1 ]
机构
[1] University of Telecommunications and Posts, Department IT, Sofia, Bulgaria
关键词
Automation - Denial-of-service attack - Network layers - Multilayer neural networks;
D O I
暂无
中图分类号
学科分类号
摘要
Denial of Service attacks are considered a major risk because they can easily interrupt a service, a business or educational process. These attacks are relatively simple to conduct, even by an unskilled attacker and cause significant loss. For this reason, it is particularly important that these attacks are detected, recognized and blocked in time. Most of the advanced methods and tools to protect against such attacks are based on monitoring and constant tracking in order to detect suspicious IP traffic. The application of these methods is associated with additional computational resources and expertise, which leads to subjectivity in the threat assessment. Therefore, it is necessary to propose methods for automated adaptive detection and recognition of Distributed Denial of Service attacks. This study presents a method for automated detection and recognition of some of the Distributed Denial of Service attacks, by means of an automated adaptive system, based on a multilayer neural network. It is trained both normal and with signals reflecting different traffic conditions when Distributed Denial of Service attacks occur. The neural network is tested to recognize baseline signals, representing different normal traffic conditions and to detect the abnormal traffic situations. The research is conducted for different kinds of internal Distributed Denial of Service attacks on a real Local Area Network. The obtained recognition accuracy results are represented and the achieved benefits are discussed. © 2020 School of Science, IHU. All Rights Reserved.
引用
收藏
页码:98 / 102
相关论文
共 50 条
  • [41] Central Aggregator Intrusion Detection System for Denial of Service Attacks
    Ahmad, Sajjad
    Raza, Imran
    Jamal, M. Hasan
    Djuraev, Sirojiddin
    Hur, Soojung
    Ashraf, Imran
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 2363 - 2377
  • [42] A novel mechanism for detection and prevention of Distributed Denial of Service attacks
    Lin Pingping
    Zhang Xiaosong
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 289 - 292
  • [43] Fast detection of denial-of-service attacks on IP telephony
    Sengar, Hemant
    Wang, Haining
    Wijesekera, Duminda
    Jajodia, Sushil
    2006 14TH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, PROCEEDINGS, 2006, : 199 - +
  • [44] Efficient Denial of Service Attacks Detection in Wireless Sensor Networks
    Almomani, Iman
    Alenezi, Mamdouh
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (04) : 977 - 1000
  • [45] Application of entropy formulas in detection of denial-of-service attacks
    Basicevic, Ilija
    Ocovaj, Stanislav
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (15)
  • [46] A Statistical Approach for Detection of Denial of Service Attacks in Computer Networks
    Amma, N. G. Bhuvaneswari
    Selvakumar, S.
    Velusamy, R. Leela
    IEEE Transactions on Network and Service Management, 2020, 17 (04): : 2511 - 2522
  • [47] An inline detection and prevention framework for distributed denial of service attacks
    Chen, Zhongqiang
    Chen, Zhongrong
    Delis, Alex
    COMPUTER JOURNAL, 2007, 50 (01): : 7 - 40
  • [48] An integrated approach explaining the detection of distributed denial of service attacks
    Batchu, Raj Kumar
    Seetha, Hari
    COMPUTER NETWORKS, 2022, 216
  • [49] An inline detection and prevention framework for distributed denial of service attacks
    Chen, Zhongqiang
    Chen, Zhongrong
    Delis, Alex
    Computer Journal, 2007, 50 (01): : 7 - 40
  • [50] Detection of denial of service attacks using an artificial immune system
    Nino, F
    Vejar, RA
    Gómez, DJ
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 223 - 228