DoS Attack Detection using Machine Learning and Neural Network

被引:0
作者
Wankhede, Shreekhand [1 ]
Kshirsagar, Deepak [1 ]
机构
[1] Coll Engn Pune, Dept Comp Engn & IT, Pune, Maharashtra, India
来源
2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA) | 2018年
关键词
Denial of Service (DoS); Machine learning(ML); Neural Network(NN); Intrusion Detection System (IDS);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current digital world is using the internet almost everywhere. The usage of internet has been increasing, however, threats are also increasing in numbers. One such threat is DoS attack which uses reasonable service requests to gain excessive computing and network resources and results in an inability to access them by legitimate users. The DoS attack can happen at different layers of OSI model such as network, transport and application layers. The aim of this paper is to detect DoS attack effectively using Machine learning (ML) and Neural Network (NN) algorithms. The detection is specifically focused on application layer DoS attack detection rather than at transport and network DoS attack detection. The latest DoS attack dataset CIC IDS 2017 dataset is used in the experiment. The experimentation has divided the dataset into different splits and the best split is found for each algorithm i.e. RF and MLP. Results of RF and MLP are compared and it is shown that RF provides better results than MLP.
引用
收藏
页数:5
相关论文
共 19 条
[1]  
Alkasassbeh Mouhammd, 2016, INT J ADV COMPUTER S, V7
[2]  
[Anonymous], 2017, DISTRIBUTED DENIAL S
[3]  
[Anonymous], 2011, J MACH LEARN TECHNOL
[4]  
[Anonymous], 2000, Neural and adaptive systems: Fundamentals through simulations
[5]  
Apale S., 2014, INT J RES ENG TECHNO, V3, P291, DOI DOI 10.15623/ijret.2014.0310045
[6]  
Araar A., 2014, J THEORETICAL APPL I, V64
[7]   Intrusion Detection Based on One-class SVM and SNMP MIB data [J].
Bao Cui-Mei .
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, :346-349
[8]  
KHAN SA, 2014, J INTELLIGENT LEARNI, V6
[9]  
Khandelwal M, 2016, 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1064, DOI 10.1109/ICACCI.2016.7732185
[10]  
Kshirsagar D. D., 2011, 2011 3rd International Conference on Electronics Computer Technology (ICECT 2011), P283, DOI 10.1109/ICECTECH.2011.5942003