Skip to main content
Top

2021 | OriginalPaper | Chapter

Reliable Mechanism to Detect Traditional Cyber Attack Using Artificial Neural Networks

Authors : Tariq Ahamed Ahanger, Abdullah Aljumah

Published in: Computer Networks and Inventive Communication Technologies

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

DDoS has evolved as the most common and devastating attack that has been confronted from previous years. As many networks reply simultaneously, mostly RREP will work together to accomplish a DDoS attack. Thus, no information system can tolerate and survive once they confront this ruthless attack. There are many existing intrusion detection systems to prevent and protect the system as well as network from DDoS, but still DDoS is complex to perform detection and perplexing. In this research article, an IDS has been developed based on the basics of latency and delays in neural networks. To form a multi-layer architecture, every node is kept on surveillance once the detectors are deployed in the network topology, and the activities of every single node are tracked by their close hop nodes mutually to ensure their status of survival. Only after all of the information is collected in a table, it is forwarded for integrated analysis by their selected expert module. The nodes covered in the first and second layer of firewall experience some suspected packets or streams as that of DDoS pattern and the core expert module that started right after the second firewall will take some effective action and invoke the defense module to ensure the safety of the information system. And the nodes which did not stand against defense module will be isolated first and rebooted later to ensure the normal functionality of the network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ahamad T (2016) Detection and defense against packet drop attack in MANET. Int J Adv Comput Sci Appl 7(2) Ahamad T (2016) Detection and defense against packet drop attack in MANET. Int J Adv Comput Sci Appl 7(2)
2.
go back to reference Aljumah A, Ahamad T (2016) Black hole and mobile Ad Hoc network (MANET): a simple logical solution. In: 11th international conference on cyber warfare and security: ICCWS2016, p 9 Aljumah A, Ahamad T (2016) Black hole and mobile Ad Hoc network (MANET): a simple logical solution. In: 11th international conference on cyber warfare and security: ICCWS2016, p 9
3.
go back to reference Ahanger TA (2017) An effective approach of detecting DDoS using artificial neural networks. In: 2017 international conference on wireless communications, signal processing and networking (WiSPNET). IEEE, pp 707–711 Ahanger TA (2017) An effective approach of detecting DDoS using artificial neural networks. In: 2017 international conference on wireless communications, signal processing and networking (WiSPNET). IEEE, pp 707–711
4.
go back to reference Ahanger TA (2018) Defense scheme to protect internet of things (IoT) from cyber attacks using artificial intelligence principles. Int J Comput Commun Control 13(6) Ahanger TA (2018) Defense scheme to protect internet of things (IoT) from cyber attacks using artificial intelligence principles. Int J Comput Commun Control 13(6)
5.
go back to reference Yin Y, Gelenbe E (2017) Single-cell based random neural network for deep learning. In: 2017 international joint conference on neural networks (IJCNN), Anchorage, AK, pp 86–93 Yin Y, Gelenbe E (2017) Single-cell based random neural network for deep learning. In: 2017 international joint conference on neural networks (IJCNN), Anchorage, AK, pp 86–93
6.
go back to reference Ghalut T, Larijani H (2014) Non-intrusive method for video quality prediction over lte using random neural networks (rnn). In: 2014 9th International symposium on communication systems networks and digital signal processing (CSNDSP), pp 519–524 Ghalut T, Larijani H (2014) Non-intrusive method for video quality prediction over lte using random neural networks (rnn). In: 2014 9th International symposium on communication systems networks and digital signal processing (CSNDSP), pp 519–524
7.
go back to reference Tang J, Deng C, Huang G-B (2015) Extreme learning machine for multilayer perceptron. IEEE Trans Neurla Netw Learn Syst Show Context Google Scholar Tang J, Deng C, Huang G-B (2015) Extreme learning machine for multilayer perceptron. IEEE Trans Neurla Netw Learn Syst Show Context Google Scholar
8.
go back to reference Yin Y, Gelenbe E (2016) Deep learning in multi-layer architectures of dense Nuclei, Sept 2016 Yin Y, Gelenbe E (2016) Deep learning in multi-layer architectures of dense Nuclei, Sept 2016
9.
go back to reference Aldaej A, Ahamad T (2016) AAODV (aggrandized ad hoc on demand vector): a detection and prevention technique for manets. Int J Adv Comput Sci Appl (IJACSA) 7(10) Aldaej A, Ahamad T (2016) AAODV (aggrandized ad hoc on demand vector): a detection and prevention technique for manets. Int J Adv Comput Sci Appl (IJACSA) 7(10)
10.
go back to reference Aljumah A, Ahamad T (2016) A novel approach for detecting DDoS using artificial neural networks. Int J Comput Sci Netw Secur 16(12):132 Aljumah A, Ahamad T (2016) A novel approach for detecting DDoS using artificial neural networks. Int J Comput Sci Netw Secur 16(12):132
11.
go back to reference Ahanger TA, Aljumah A (2017) Detection and defense against distributed denial of service attack using packet filtration in wireless sensor networks. Int J Comput Netw Commun Secur 5(12):277–284 Ahanger TA, Aljumah A (2017) Detection and defense against distributed denial of service attack using packet filtration in wireless sensor networks. Int J Comput Netw Commun Secur 5(12):277–284
12.
go back to reference Aljumah A, Ahanger TA (2017) Futuristic method to detect and prevent blackhole attack in wireless sensor networks. Int J Comput Sci Netw Secur (IJCSNS) 17(2):194 Aljumah A, Ahanger TA (2017) Futuristic method to detect and prevent blackhole attack in wireless sensor networks. Int J Comput Sci Netw Secur (IJCSNS) 17(2):194
13.
go back to reference Mukkamala S, Janoski G, Sung A (2002) Intrusion detection: support vector machines and neural networks. In: Proceedings of the IEEE international joint conference on neural networks (ANNIE), pp 1702–1707 Mukkamala S, Janoski G, Sung A (2002) Intrusion detection: support vector machines and neural networks. In: Proceedings of the IEEE international joint conference on neural networks (ANNIE), pp 1702–1707
14.
go back to reference Wu H-C, Stephen Huang S-H (2010) Neural networks-based detection of stepping-stone intrusion. Expert Syst Appl 37(2):1431–1437 Wu H-C, Stephen Huang S-H (2010) Neural networks-based detection of stepping-stone intrusion. Expert Syst Appl 37(2):1431–1437
15.
go back to reference Wang G, Hao J, Ma J, Huang L (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37(9):6225–6232CrossRef Wang G, Hao J, Ma J, Huang L (2010) A new approach to intrusion detection using artificial neural networks and fuzzy clustering. Expert Syst Appl 37(9):6225–6232CrossRef
Metadata
Title
Reliable Mechanism to Detect Traditional Cyber Attack Using Artificial Neural Networks
Authors
Tariq Ahamed Ahanger
Abdullah Aljumah
Copyright Year
2021
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-15-9647-6_91