Simulation of Denial of Service (DoS) Attack using Matlab and Xilinx

As the Internet is growing – so is the vulnerability of the network. Companies now days are spending huge amount of money to protect their sensitive data from different attacks that they face. DoS or Denial Of Service attacks are one of such kind of attacks. In this paper, we at first recognize different kinds of DoS attacks and then propose a new methodology to simulate those.

[1]  Hervé Debar,et al.  An application of a recurrent network to an intrusion detection system , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.

[2]  James Cannady,et al.  Artificial Neural Networks for Misuse Detection , 1998 .

[3]  Lambert Schomaker,et al.  Indoor localization by denoising autoencoders and semi-supervised learning in 3D simulated environment , 2015, 2015 International Joint Conference on Neural Networks (IJCNN).

[4]  Igor V. Kotenko,et al.  Simulation of Internet DDoS Attacks and Defense , 2006, ISC.

[5]  Risto Miikkulainen,et al.  Intrusion Detection with Neural Networks , 1997, NIPS.

[6]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[7]  M. Chakraborty,et al.  Back propagation neural network approach to Intrusion Detection System , 2011, 2011 International Conference on Recent Trends in Information Systems.

[8]  Igor V. Kotenko,et al.  Formal framework for modeling and simulation of DDoS attacks based on teamwork of hackers-agents , 2003, IEEE/WIC International Conference on Intelligent Agent Technology, 2003. IAT 2003..

[9]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[10]  Zheng Zhang,et al.  HIDE : a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .

[11]  Gyungho Lee,et al.  DDoS Attack Detection and Wavelets , 2005, Telecommun. Syst..

[12]  Hervé Debar,et al.  A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[13]  Don Holden A Rule-based Intrusion Detection System , 1992, SEC.

[14]  Robert K. Cunningham,et al.  Improving Intrusion Detection Performance using Keyword Selection and Neural Networks , 2000, Recent Advances in Intrusion Detection.