DoS Attacks Intelligent Detection using Neural Networks

被引:0
|
作者
Alfantookh, Abdulkader A. [1 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 51178, Riyadh 11543, Saudi Arabia
关键词
Intrusion detection; Neural Network; anomaly detection; Network-Based detection; Denial-of-Service;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The potential damage to computer networks keeps increasing due to a growing reliance on the Internet and more extensive connectivity. Intrusion detection systems (IDSs) have become an essential component of computer security to detect attacks that occur despite the best preventative measures. A problem with current intrusion detection systems is that they have many false positive and false negative events. Most of the existing Intrusion detection systems implemented nowadays depend on rule-based expert systems where new attacks are not detectable. In this paper, a possible application of Neural Networks is presented as a component of an intrusion detection system. An intrusion detection system called Denial of Service Intelligent Detection (DoSID) is developed. The type of Neural Network used to implement DoSID is feed forward which uses the backpropagation learning algorithm. The data used in training and testing is the data collected by Lincoln Labs at MIT for an intrusion detection system evaluation sponsored by the U.S. Defense Advanced Research Projects Agency (DARPA). Special features of connection records have been identified to be used in DoS (Denial-of-Service) attacks. Several experiments have been conducted to test the ability of the neural network to distinguish known and unknown attacks from normal traffic. Results show that normal traffic and know attacks are discovered 91% and 100% respectively. Also it has been shown in the final experiment that the false negative of the system has been reduced considerably.
引用
收藏
页码:27 / +
页数:20
相关论文
共 50 条
  • [1] Detection of DoS attacks in cloud networks using intelligent rule based classification system
    Rajendran, Rakesh
    Kumar, S. V. N. Santhosh
    Palanichamy, Yogesh
    Arputharaj, Kannan
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 423 - 434
  • [2] Detection of DoS attacks in cloud networks using intelligent rule based classification system
    Rakesh Rajendran
    S. V. N. Santhosh Kumar
    Yogesh Palanichamy
    Kannan Arputharaj
    [J]. Cluster Computing, 2019, 22 : 423 - 434
  • [3] Detection and Mitigation of DoS Attacks in Software Defined Networks
    Gao, Shang
    Peng, Zhe
    Xiao, Bin
    Hu, Aiqun
    Song, Yubo
    Ren, Kui
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (03) : 1419 - 1433
  • [4] Phishing Attacks Detection by Using Artificial Neural Networks
    Nabet, Majeed Jasim
    George, Loay E.
    [J]. Iraqi Journal for Computer Science and Mathematics, 2023, 4 (03): : 159 - 166
  • [5] Detection of smart card attacks using neural networks
    El Farissi, Authors Ilhame
    Azizi, Mostafa
    Moussaoui, Mimoun
    [J]. 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 949 - 954
  • [6] Detection of denial of service attacks using neural networks
    Bolanos, RF
    Cadena, CA
    Nino, F
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 84 - 87
  • [7] Detection of DoS attacks using intrusion detection sensors
    Ramakrishna, P
    Maarof, MA
    [J]. APOC 2002: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATIONS; NETWORK DESIGN AND MANAGEMENT, 2002, 4909 : 69 - 80
  • [8] A New and Quick Method to Detect DoS Attacks by Neural Networks
    Javidi, Mohammad Masoud
    Nattaj, Mohammad Hassan
    [J]. JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2013, 6 (02): : 85 - 96
  • [9] Forecast of Denial of Service (DoS) Attacks via neural networks
    不详
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2008, 9 (02): : 173 - 178
  • [10] Forecast of Denial of Service (DoS) attacks via neural networks
    [J]. J. Internet Technol, 2008, 2 (173-178):