Research on Detection and Defense Mechanisms of DoS Attacks Based on BP Neural Network and Game Theory

DoS (Denial of Service) attacks are becoming one of the most serious security threats to global networks. We analyze the existing DoS detection methods and defense mechanisms in depth. In this paper, BP (back propagation) neural networks and game theory are introduced to design detection methods and defense mechanisms for the DoS attacks. The BP neural network DoS attacks detection model uses KDDCUP99 as the dataset and selects multiple feature vectors from the dataset that can efficiently identify DoS attacks by large-scale training, which improves the accuracy of detecting DoS attacks to 99.977%. Furthermore, we use game theory to perform secondary analysis on DoS attacks that are not recognized by the neural network model, so that the detection rate of Dos attacks increases from 99.97% to 99.998%. Finally, we propose a DoS attacks defense strategy based on game theory. The simulation results show that the proposed detection method and defense strategy are effective for DoS attacks.

[1]  Goran Kvascev,et al.  Flow-based anomaly intrusion detection system using two neural network stages , 2014, Comput. Sci. Inf. Syst..

[2]  Zhu Wang,et al.  A research using hybrid RBF/Elman neural networks for intrusion detection system secure model , 2009, Comput. Phys. Commun..

[3]  Milos Manic,et al.  Toward Explainable Deep Neural Network Based Anomaly Detection , 2018, 2018 11th International Conference on Human System Interaction (HSI).

[4]  Wei Wang,et al.  A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems , 2018, IEEE Transactions on Information Forensics and Security.

[5]  Leon Reznik,et al.  Anomaly Detection Based Intrusion Detection , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[6]  Geoffrey E. Hinton,et al.  Learning representations by back-propagating errors , 1986, Nature.

[7]  Yizhong Ma,et al.  The intrusion detection method based on game theory in wireless sensor network , 2008, 2008 First IEEE International Conference on Ubi-Media Computing.

[8]  Vallipuram Muthukkumarasamy,et al.  An Intelligent Intrusion Detection System Based on Neural Network , 2004 .

[9]  Andrew H. Sung,et al.  Feature Selection for Intrusion Detection with Neural Networks and Support Vector Machines , 2003 .

[10]  Aleksey A. Titorenko,et al.  Influence of DoS attacks on intrusion detection systems , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[11]  Jamal Hussain,et al.  A two-stage hybrid classification technique for network intrusion detection system , 2016, Int. J. Comput. Intell. Syst..

[12]  K. Raghuveer,et al.  Confederation of FCM clustering, ANN and SVM techniques to implement hybrid NIDS using corrected KDD cup 99 dataset , 2014, 2014 International Conference on Communication and Signal Processing.

[13]  E OverillRichard,et al.  Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016 .

[14]  Richard E. Overill,et al.  Detection of known and unknown DDoS attacks using Artificial Neural Networks , 2016, Neurocomputing.

[15]  Deepak Kumar Gupta,et al.  DoS attack detection technique using back propagation neural network , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[16]  Boon-Hee Soong,et al.  Deception-Based Game Theoretical Approach to Mitigate DoS Attacks , 2016, GameSec.

[17]  Jindong Wang,et al.  Active defense strategy selection based on static Bayesian game , 2015 .

[18]  Syed Taqi Ali,et al.  Detecting DDoS attacks in cloud computing using ANN and black hole optimization , 2017, 2017 2nd International Conference on Telecommunication and Networks (TEL-NET).

[19]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[20]  Meenu Chawla,et al.  Analysis of feature selection techniques for denial of service (DoS) attacks , 2018, 2018 4th International Conference on Recent Advances in Information Technology (RAIT).

[21]  L. Ibrahim ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN) , 2010 .

[22]  Jianfeng Ma,et al.  Dynamic game model of botnet DDoS attack and defense , 2016, Secur. Commun. Networks.