International Journal of Advanced and Applied Sciences
Int. j. adv. appl. sci.
EISSN: 2313-3724
Print ISSN: 2313-626X
Volume 4, Issue 6 (June 2017), Pages: 78-83
Title: An efficacious method of detecting DDoS using artificial neural networks
Author(s): Abdullah Aljumah *
Affiliation(s):
College of Computer Engineering & Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia
https://doi.org/10.21833/ijaas.2017.06.011
Abstract:
DDoS has evolved as most common and devastating attack that has been confronted from previous years. Since hundreds and thousands of network replies, mostly RREP work together simultaneously to accomplish DDoS attack. Thus, no information system can tolerate and survive once they confront this ruthless attack and there are many existing intrusion detection systems to prevent and protect system as well as network from DDoS but still DDoS is still complex to detect and perplexing. In this research article, we have developed an IDS based on basics of latency and delays in neural networks. In order to form a multi-layer architecture, every node is kept on surveillance once the detectors are deployed in the network topology and the activities of every single node is tracked by their close hop nodes mutually to ensure their status of survival. Only after all of the information is collected in a table is forwarded for integrated analysis by their selected expert module. The nodes covered in first and second layer of firewall experience some suspected packets or streams as that of DDoS pattern and the core expert module that started right after the 2nd firewall will take some effective action and invoke the defense module to ensure the safety of the information system. And the nodes which didn't stood against defense module will be isolated first and rebooted later to ensure the normal functionality of the network.
© 2017 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: DDoS, IDS, Security, Neural networks
Article History: Received 26 January 2017, Received in revised form 23 April 2017, Accepted 8 May 2017
Digital Object Identifier:
https://doi.org/10.21833/ijaas.2017.06.011
Citation:
Aljumah A (2017). An efficacious method of detecting DDoS using artificial neural networks. International Journal of Advanced and Applied Sciences, 4(6): 78-83
http://www.science-gate.com/IJAAS/V4I6/Aljumah.html
References:
Ahamad T (2016). Detection and defense against packet drop attack in MANET. International Journal of Advanced Computer Science and Applications (IJACSA), 7(2): 328-331.
https://doi.org/10.14569/IJACSA.2016.070246 |
||||
Ahamad T and Aljumah A (2014). Hybrid Approach using intrusion Detection System. International Journal of Computer Networks and Communications Security, 2(2): 87-92. | ||||
Ahamad T and Aljumah A (2015). Detection and defense mechanism against DDoS in MANET. Indian Journal of Science and Technology, 8(33): 1-4. https://doi.org/10.17485/ijst/2015/v8i33/80152 |
||||
Akyildiz IF and Kasimoglu IH (2004). Wireless sensor and actor networks: research challenges. Ad Hoc Networks, 2(4): 351-367. https://doi.org/10.1016/j.adhoc.2004.04.003 |
||||
Aldaej A and Ahamad T (2016). AAODV (Aggrandized Ad Hoc on Demand Vector): A Detection and prevention technique for manets. International Journal of Advanced Computer Science and Applications, 1(7): 132-140. https://doi.org/10.14569/ijacsa.2016.071018 |
||||
Aljumah A and Ahamad T (2016). A novel approach for detecting DDoS using artificial neural networks. International Journal of Computer Science and Network Security, 16(12): 132-138. | ||||
Baadache A and Belmehdi A (2010). Avoiding black hole and cooper¬ative black hole attacks in Wireless Ad hoc Networks. International Journal of Computer Science and Information Security, 7(1): 10–16. | ||||
Bulusu N, Estrin D, Girod L, and Heidemann J (2001). Scalable coordination for wireless sensor networks: self-configuring localization systems. In the International Conference on Communication Theory and Applications (ISCTA'01), Ambleside, UK. PMid:11719329 PMCid:PMC1719022 |
||||
Chen Z and Qian P (2009). Application of PSO-RBF neural network in network intrusion detection. In the 3rd International Conference on Intelligent Information Technology Application, IEEE, Shanghai, China, 1: 362-364. https://doi.org/10.1109/IITA.2009.154 https://doi.org/10.1109/iita.2009.154 |
||||
Del Pino MP, Báez PG, López PF, and Araújo CS (2010). Towards self-organizing maps based computational intelligent system for denial of service attacks detection. In the 14th International Conference on Intelligent Engineering Systems (INES), IEEE, Las Palmas, Spain: 151-157. https://doi.org/10.1109/INES.2010.5483858 | ||||
Gupta KK, Nath B, and Kotagiri R (2010). Layered approach using conditional random fields for intrusion detection. IEEE Transactions on Dependable and Secure Computing, 7(1): 35-49. https://doi.org/10.1109/TDSC.2008.20 |
||||
Moradi Z, Teshnehlab M, and Rahmani AM (2011). Implementation of neural networks for intrusion detection in manet. In the International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT'11), IEEE, Nagercoil, India: 1102-1106. https://doi.org/10.1109/icetect.2011.5760283 |
||||
Mukkamala S, Janoski G, and Sung A (2002). Intrusion detection: Support vector machines and neural networks. In the IEEE International Joint Conference on Neural Networks (ANNIE'02), IEEE, St. Louis, USA: 1702-1707. | ||||
Sheikhan M, Jadidi Z, and Farrokhi A (2012). Intrusion detection using reduced-size RNN based on feature grouping. Neural Computing and Applications, 21(6): 1185-1190. https://doi.org/10.1007/s00521-010-0487-0 |
||||
Shih E, Cho SH, Ickes N, Min R, Sinha A, Wang A, and Chandrakasan A (2001). Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In the 7th Annual International Conference on Mobile Computing and Networking, ACM, New York, USA: 272-287. https://doi.org/10.1145/381677.381703 |
||||
Tong X, Wang Z, and Yu H (2009). A research using hybrid RBF/Elman neural networks for intrusion detection system secure model. Computer Physics Communications, 180(10): 1795-1801. https://doi.org/10.1016/j.cpc.2009.05.004 |
||||
Tsou PC, Chang JM, Lin YH, Chao HC, and Chen JL (2011). Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. In the 13th International Conference on Advanced Communication Technology, IEEE, Phoenix Park, Republic of Korea: 755–760. | ||||
Wang G, Hao J, Ma J, and Huang L (2010). A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Systems with Applications, 37(9):6225-6232. https://doi.org/10.1016/j.eswa.2010.02.102 |
||||
Wang W, Bhargava B, and Linderman M (2009). Defending against collaborative packet drop attacks on MANETs. In the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS'09), IEEE SRDS, New York, USA: 27: 1–6. | ||||
Wei Z, Yu-xin Z, Hao-yu W, Xu Z, and Ai-guo W (2010). Intrusive detection systems design based on BP neural network. In the 9th International Conference on Distributed Computing and Applications to Business Engineering and Science (DCABES'10), IEEE, Hong Kong, China: 462-465. https://doi.org/10.1109/dcabes.2010.158 |
||||
Wood AD and Stankovic JA (2002). Denial of service in sensor networks. Computer, 35(10): 54-62. https://doi.org/10.1109/MC.2002.1039518 |
||||
Wu HC and Huang SHS (2010). Neural networks-based detection of stepping-stone intrusion. Expert Systems with Applications, 37(2):1431-1437. https://doi.org/10.1016/j.eswa.2009.06.059 |