An Intelligence Technique for Denial of Service (DoS) Attack Detection

被引:0
|
作者
Manan, Wan Nurulsafawati Wan [1 ]
Safiuddin, Tuan Muhammad [1 ]
Dzolkhifli, Zarina [1 ]
Hassin, Mohd Hafiz Mohd [1 ]
机构
[1] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Gambang, Malaysia
关键词
DoS Attack; Intrusion Detection; Machine Learning;
D O I
10.1166/asl.2018.12956
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectivity on the Internet. Nowadays, attack detection strategies have become the most vital component in computer security despite the main preventive measure in detecting the attacks. The main issue with current detection systems is the inability to detect the malicious activity in certain circumstances. Most of the current intrusion detection systems implemented nowadays depend on expert systems where new attacks are not detectable. Therefore, this paper concern about Denial of Service (DoS) attack, detection using Neural Network. The data used in training and testing was KDD 99 data set based on the Defense Advanced Research Projects Agency (DARPA) intrusion detection programme, which is publicly accessible by Lincoln Labs. Special features of connection records have been acknowledged to be used in DoS attacks. The result from this experiment will show the effectiveness of Neural Network using the backpropagation learning algorithm for detecting DoS attack.
引用
收藏
页码:7446 / 7450
页数:5
相关论文
共 50 条
  • [31] Detection of Network Congestion and Denial of Service (DoS) Attacks in Cognitive Radio Networks
    Ejike, Chuku
    Kouvatsos, Demetres
    [J]. 2019 7TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2019), 2019, : 377 - 384
  • [32] Intelligent DoS Attack Detection with Congestion Control Technique for VANETs
    Gopi, R.
    Mathapati, Mahantesh
    Prasad, B.
    Ahmad, Sultan
    Al-Wesabi, Fahd N.
    Alohali, Manal Abdullah
    Hilal, Anwer Mustafa
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 141 - 156
  • [33] A detection scheme against Distributed Reflector Denial-of-Service attack
    Kim, YS
    Jeon, JC
    Jeon, JW
    Yoo, KY
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 44 - 48
  • [34] Denial of Service attack detection in case of Tennessee Eastman challenge process
    Kiss, Istvan
    Haller, Piroska
    Beres, Adela
    [J]. 8TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, INTER-ENG 2014, 2015, 19 : 835 - 841
  • [35] Detection of Denial of Service Attack in Cloud Based Kubernetes Using eBPF
    Sadiq, Amin
    Syed, Hassan Jamil
    Ansari, Asad Ahmed
    Ibrahim, Ashraf Osman
    Alohaly, Manar
    Elsadig, Muna
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [36] Distributed denial of service attack detection using an ensemble of neural classifier
    Kumar, P. Arun Raj
    Selvakumar, S.
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (11) : 1328 - 1341
  • [37] Research on Detection Scheme for Denial of Service Attack in Wireless Mesh Networks
    Fu, Yingfang
    Xiao, Peng
    Luang, Liangyu
    [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 181 - 184
  • [38] The Design of SDN based Detection for Distributed Denial of Service (DDoS) attack
    Oo, Myo Myint
    Kamolphiwong, Sinchai
    Kamolphiwong, Thossaporn
    [J]. 2017 21ST INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC 2017), 2017, : 258 - 263
  • [39] An effective Denial of Service Attack Detection Method in Wireless Mesh Networks
    Luan, Liangyu
    Fu, Yingfang
    Xiao, Peng
    [J]. 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 354 - 360
  • [40] Optimal Placement of Detection Nodes against Distributed Denial of Service Attack
    Islam, Muhammad Hasan
    Nadeem, Kamran
    Khan, Shoab A.
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 675 - 679