DoS Detection Method based on Artificial Neural Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 4
Abstract
DoS attack tools have become increasingly sophis-ticated challenging the existing detection systems to continually improve their performances. In this paper we present a victim-end DoS detection method based on Artificial Neural Networks (ANN). In the proposed method a Feed-forward Neural Network (FNN) is optimized to accurately detect DoS attack with minimum resources usage. The proposed method consists of the following three major steps: (1) Collection of the incoming network traffic,(2) selection of relevant features for DoS detection using an unsupervised Correlation-based Feature Selection (CFS) method,(3) classification of the incoming network traffic into DoS traffic or normal traffic. Various experiments were conducted to evaluate the performance of the proposed method using two public datasets namely UNSW-NB15 and NSL-KDD. The obtained results are satisfactory when compared to the state-of-the-art DoS detection methods.
Authors and Affiliations
Mohamed Idhammad, Karim Afdel, Mustapha Belouch
Throughput Analysis of Ieee802.11b Wireless Lan With One Access Point Using Opnet Simulator
This paper analyzes the throughput performance of IEEE 802.11b Wireless Local Area Network (WLAN) with one access point. The IEEE 802.11b is a wireless protocol standard. In this paper, a wireless network was estab...
E-Learning Methodologies and Tools
E-learning is among the most important explosion propelled by the internet transformation. This allows users to fruitfully gather knowledge and education both by synchronous and asynchronous methodologies to effectively...
The Proposal of a Distributed Algorithm for Solving the Multiple Constraints Parking Problem
The parking problem in big cities has become one of the key causes of the city traffic congestion, driver frustration and air pollution.So to avoid these problems, parking monitoring is an important solution. Recently ma...
Crowd-Generated Data Mining for Continuous Requirements Elicitation
In software development projects, the process of requirements engineering (RE) is one in which requirements are elicited, analyzed, documented, and managed. Requirements are traditionally collected using manual approache...
Towards Adaptive user Interfaces for Mobile-Phone in Smart World
All applications are developed for context adaptation and provide communication with users through their interfaces. These applications offer new opportunities for developers as well as users by collecting context data a...