International Journal of Advanced and Applied Sciences

Int. j. adv. appl. sci.

EISSN: 2313-3724

Print ISSN: 2313-626X

Volume 4, Issue 6  (June 2017), Pages:  78-83


Title: An efficacious method of detecting DDoS using artificial neural networks

Author(s):  Abdullah Aljumah *

Affiliation(s):

College of Computer Engineering & Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia

https://doi.org/10.21833/ijaas.2017.06.011

Full Text - PDF          XML

Abstract:

DDoS has evolved as most common and devastating attack that has been confronted from previous years. Since hundreds and thousands of network replies, mostly RREP work together simultaneously to accomplish DDoS attack. Thus, no information system can tolerate and survive once they confront this ruthless attack and there are many existing intrusion detection systems to prevent and protect system as well as network from DDoS but still DDoS is still complex to detect and perplexing. In this research article, we have developed an IDS based on basics of latency and delays in neural networks. In order to form a multi-layer architecture, every node is kept on surveillance once the detectors are deployed in the network topology and the activities of every single node is tracked by their close hop nodes mutually to ensure their status of survival. Only after all of the information is collected in a table is forwarded for integrated analysis by their selected expert module. The nodes covered in first and second layer of firewall experience some suspected packets or streams as that of DDoS pattern and the core expert module that started right after the 2nd firewall will take some effective action and invoke the defense module to ensure the safety of the information system. And the nodes which didn't stood against defense module will be isolated first and rebooted later to ensure the normal functionality of the network. 

© 2017 The Authors. Published by IASE.

This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Keywords: DDoS, IDS, Security, Neural networks

Article History: Received 26 January 2017, Received in revised form 23 April 2017, Accepted 8 May 2017

Digital Object Identifier: 

https://doi.org/10.21833/ijaas.2017.06.011

Citation:

Aljumah A (2017). An efficacious method of detecting DDoS using artificial neural networks. International Journal of Advanced and Applied Sciences, 4(6): 78-83

http://www.science-gate.com/IJAAS/V4I6/Aljumah.html


References:

Ahamad T (2016). Detection and defense against packet drop attack in MANET. International Journal of Advanced Computer Science and Applications (IJACSA), 7(2): 328-331.


https://doi.org/10.14569/IJACSA.2016.070246
Ahamad T and Aljumah A (2014). Hybrid Approach using intrusion Detection System. International Journal of Computer Networks and Communications Security, 2(2): 87-92.
Ahamad T and Aljumah A (2015). Detection and defense mechanism against DDoS in MANET. Indian Journal of Science and Technology, 8(33): 1-4.
https://doi.org/10.17485/ijst/2015/v8i33/80152
Akyildiz IF and Kasimoglu IH (2004). Wireless sensor and actor networks: research challenges. Ad Hoc Networks, 2(4): 351-367.
https://doi.org/10.1016/j.adhoc.2004.04.003
Aldaej A and Ahamad T (2016). AAODV (Aggrandized Ad Hoc on Demand Vector): A Detection and prevention technique for manets. International Journal of Advanced Computer Science and Applications, 1(7): 132-140.
https://doi.org/10.14569/ijacsa.2016.071018
Aljumah A and Ahamad T (2016). A novel approach for detecting DDoS using artificial neural networks. International Journal of Computer Science and Network Security, 16(12): 132-138.
Baadache A and Belmehdi A (2010). Avoiding black hole and cooper¬ative black hole attacks in Wireless Ad hoc Networks. International Journal of Computer Science and Information Security, 7(1): 10–16.
Bulusu N, Estrin D, Girod L, and Heidemann J (2001). Scalable coordination for wireless sensor networks: self-configuring localization systems. In the International Conference on Communication Theory and Applications (ISCTA'01), Ambleside, UK.
PMid:11719329 PMCid:PMC1719022
Chen Z and Qian P (2009). Application of PSO-RBF neural network in network intrusion detection. In the 3rd International Conference on Intelligent Information Technology Application, IEEE, Shanghai, China, 1: 362-364. https://doi.org/10.1109/IITA.2009.154
https://doi.org/10.1109/iita.2009.154
Del Pino MP, Báez PG, López PF, and Araújo CS (2010). Towards self-organizing maps based computational intelligent system for denial of service attacks detection. In the 14th International Conference on Intelligent Engineering Systems (INES), IEEE, Las Palmas, Spain: 151-157. https://doi.org/10.1109/INES.2010.5483858
Gupta KK, Nath B, and Kotagiri R (2010). Layered approach using conditional random fields for intrusion detection. IEEE Transactions on Dependable and Secure Computing, 7(1): 35-49.
https://doi.org/10.1109/TDSC.2008.20
Moradi Z, Teshnehlab M, and Rahmani AM (2011). Implementation of neural networks for intrusion detection in manet. In the International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT'11), IEEE, Nagercoil, India: 1102-1106. 
https://doi.org/10.1109/icetect.2011.5760283
Mukkamala S, Janoski G, and Sung A (2002). Intrusion detection: Support vector machines and neural networks. In the IEEE International Joint Conference on Neural Networks (ANNIE'02), IEEE, St. Louis, USA: 1702-1707.
Sheikhan M, Jadidi Z, and Farrokhi A (2012). Intrusion detection using reduced-size RNN based on feature grouping. Neural Computing and Applications, 21(6): 1185-1190.
https://doi.org/10.1007/s00521-010-0487-0
Shih E, Cho SH, Ickes N, Min R, Sinha A, Wang A, and Chandrakasan A (2001). Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In the 7th Annual International Conference on Mobile Computing and Networking, ACM, New York, USA: 272-287.
https://doi.org/10.1145/381677.381703
Tong X, Wang Z, and Yu H (2009). A research using hybrid RBF/Elman neural networks for intrusion detection system secure model. Computer Physics Communications, 180(10): 1795-1801.
https://doi.org/10.1016/j.cpc.2009.05.004
Tsou PC, Chang JM, Lin YH, Chao HC, and Chen JL (2011). Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. In the 13th International Conference on Advanced Communication Technology, IEEE, Phoenix Park, Republic of Korea: 755–760.
Wang G, Hao J, Ma J, and Huang L (2010). A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Systems with Applications, 37(9):6225-6232.
https://doi.org/10.1016/j.eswa.2010.02.102
Wang W, Bhargava B, and Linderman M (2009). Defending against collaborative packet drop attacks on MANETs. In the 2nd International Workshop on Dependable Network Computing and Mobile Systems (DNCMS'09), IEEE SRDS, New York, USA: 27: 1–6.
Wei Z, Yu-xin Z, Hao-yu W, Xu Z, and Ai-guo W (2010). Intrusive detection systems design based on BP neural network. In the 9th International Conference on Distributed Computing and Applications to Business Engineering and Science (DCABES'10), IEEE, Hong Kong, China: 462-465. 
https://doi.org/10.1109/dcabes.2010.158
Wood AD and Stankovic JA (2002). Denial of service in sensor networks. Computer, 35(10): 54-62.
https://doi.org/10.1109/MC.2002.1039518
Wu HC and Huang SHS (2010). Neural networks-based detection of stepping-stone intrusion. Expert Systems with Applications, 37(2):1431-1437.
https://doi.org/10.1016/j.eswa.2009.06.059