Application of artificial neural network in detection of DOS attacks

A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, very inevitable. Precise detection is very important to prevent such losses. Such detection is a pivotal part of any security tools like intrusion detection system, intrusion prevention system, and firewalls etc. Therefore, an approach is provided in this paper to analyze denial of service attack by using a supervised neural network. The methodology used sampled data from Kddcup99 dataset, an attack database that is a standard for judgment of attack detection tools. The system uses multiple layered perceptron architecture and resilient backpropagation for its training and testing. The developed system is then applied to denial of service attacks. Moreover, its performance is also compared to other neural network approaches which results more accuracy and precision in detection rate.

[1]  Elizabeth B. Lennon Testing Intrusion Detection Systems , 2003 .

[2]  Angel P. del Pobil,et al.  Multiple self-organizing maps: A hybrid learning scheme , 1997, Neurocomputing.

[3]  Sergio M. Savaresi,et al.  Unsupervised learning techniques for an intrusion detection system , 2004, SAC '04.

[4]  Laurene V. Fausett,et al.  Fundamentals Of Neural Networks , 1994 .

[5]  Iftikhar Ahmad,et al.  Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems , 2008 .

[6]  Morteza Amini,et al.  RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..

[7]  Azween Abdullah,et al.  Artificial neural network approaches to intrusion detection: a review , 2009, IEEE ICT 2009.

[8]  W.L.A. Neves,et al.  Comparison between backpropagation and RPROP algorithms applied to fault classification in transmission lines , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).

[9]  Laurene V. Fausett,et al.  Fundamentals Of Neural Networks , 1993 .

[10]  Adeel Akram,et al.  A comparative analysis of artificial neural network technologies in intrusion detection systems , 2006 .

[11]  C. Douligeris,et al.  Detecting denial of service attacks using emergent self-organizing maps , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[12]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[13]  Julie Greensmith,et al.  Immune System Approaches to Intrusion Detection - A Review , 2004, ICARIS.

[14]  Yang Wei,et al.  Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network , 2006, Sixth International Conference on Intelligent Systems Design and Applications.

[15]  Gürsel Serpen,et al.  Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context , 2003, MLMTA.

[16]  Electronics Letters , 1965, Nature.

[17]  Dorothy E. Denning,et al.  An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.

[18]  James A. Mahaffey,et al.  Multiple Self-Organizing Maps for Intrusion Detection , 2000 .

[19]  Y. Tanabe,et al.  Local Positioning with Artificial Neural Network and Time of Arrival Technique , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.