DoS Attacks Intelligent Detection using Neural Networks

被引:0
|
作者
Alfantookh, Abdulkader A. [1 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Sci, POB 51178, Riyadh 11543, Saudi Arabia
关键词
Intrusion detection; Neural Network; anomaly detection; Network-Based detection; Denial-of-Service;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The potential damage to computer networks keeps increasing due to a growing reliance on the Internet and more extensive connectivity. Intrusion detection systems (IDSs) have become an essential component of computer security to detect attacks that occur despite the best preventative measures. A problem with current intrusion detection systems is that they have many false positive and false negative events. Most of the existing Intrusion detection systems implemented nowadays depend on rule-based expert systems where new attacks are not detectable. In this paper, a possible application of Neural Networks is presented as a component of an intrusion detection system. An intrusion detection system called Denial of Service Intelligent Detection (DoSID) is developed. The type of Neural Network used to implement DoSID is feed forward which uses the backpropagation learning algorithm. The data used in training and testing is the data collected by Lincoln Labs at MIT for an intrusion detection system evaluation sponsored by the U.S. Defense Advanced Research Projects Agency (DARPA). Special features of connection records have been identified to be used in DoS (Denial-of-Service) attacks. Several experiments have been conducted to test the ability of the neural network to distinguish known and unknown attacks from normal traffic. Results show that normal traffic and know attacks are discovered 91% and 100% respectively. Also it has been shown in the final experiment that the false negative of the system has been reduced considerably.
引用
收藏
页码:27 / +
页数:20
相关论文
共 50 条
  • [41] A Scrutinized study on DoS attacks in Wireless Sensor Networks and need of SDN in Mitigating DoS attacks
    Sarkunavathi, A.
    Srinivasan, V
    2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
  • [42] Intelligent control using neural networks
    Narendra, Kumpati S.
    Mukhopadhyay, Snehasis
    IEEE Control Systems Magazine, 1992, 12 (02): : 11 - 18
  • [43] Recurrent neural networks approach to the detection of SQL attacks
    Skaruz, Jaroslaw
    Seredynski, Franciszek
    Bouvry, Pascal
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2007, : 191 - 197
  • [44] Efficient Detection of Phishing Attacks with Hybrid Neural Networks
    Zhang, Xiaoqing
    Shi, Dongge
    Zhang, Hongpo
    Liu, Wei
    Li, Runzhi
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 844 - 848
  • [45] Denial of Service (DoS) Attacks Detection in MANETs Using Bayesian Classifiers
    Rmayti, M.
    Begriche, Y.
    Khatoun, R.
    Khoukhi, L.
    Gaiti, D.
    2014 IEEE 21ST SYMPOSIUM ON COMMUNICATIONS AND VEHICULAR TECHNOLOGY IN THE BENELUX (SCVT), 2014, : 7 - 12
  • [46] Detection of DoS and DDoS Attacks in NGMN Using Frequency Domain Analysis
    Hashim, Fazirulhisyam
    Kibria, M. Rubaiyat
    Jamalipour, Abbas
    2008 14TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS, (APCC), VOLS 1 AND 2, 2008, : 547 - 551
  • [47] Analysis and Detection of DoS Attacks in Cloud Computing by Using QSE Algorithm
    Reddy, Pallavali Radha Krishna
    Bouzefrane, Samia
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1089 - 1096
  • [48] The detection of low-rate DoS attacks using the SADBSCAN algorithm
    Tang, Dan
    Zhang, Siqi
    Chen, Jingwen
    Wang, Xiyin
    INFORMATION SCIENCES, 2021, 565 : 229 - 247
  • [49] Detecting Attacks Using Artificial Neural Networks
    I. A. Sikarev
    T. M. Tatarnikova
    Automatic Control and Computer Sciences, 2024, 58 (8) : 1218 - 1225
  • [50] Detailed DoS attacks in wireless networks and countermeasures
    Mohammed, Lawan A.
    Issac, Biju
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2007, 2 (03) : 157 - 166