• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Qureshi, Sirajuddin (Qureshi, Sirajuddin.) | He, Jingsha (He, Jingsha.) | Tunio, Saima (Tunio, Saima.) | Zhu, Nafei (Zhu, Nafei.) | Ullah, Faheem (Ullah, Faheem.) | Nazir, Ahsan (Nazir, Ahsan.) | Wajahat, Ahsan (Wajahat, Ahsan.)

Indexed by:

EI

Abstract:

Network devices are essential to connect nodes and users on any given network. Network devices perform the additional task of protecting services and users from known and unknown attacks. This feature of network devices to stop or minimize network attacks to secure the nodes and all attached devices needs further research studies and experimentation to confirm their resilience against potential known attacks. Denial-of-Service (DoS) Attack is one of the deadliest attacks that make network services and devices unavailable. One of these attacks, which is growing significantly, is the Distributed Denial of Service (DDoS) attack. DDoS attack has a high impact on crashing the network resources, making the target servers unable to support valid users. The current methods use the standard datasets to deploy the Deep Learning (DL) Model for intrusion detection against DDoS attacks in the network. However, these methods suffer several drawbacks, and the used datasets do not contain the most recent attack patterns – henceforward, lacking in attack variety. In this paper, we proposed an interruption detection model system and, against DDoS attacks is based on DL technique, the combination of the Recurrent Neural Network (RNN) and Deep Neural Network (DNN) algorithms are compared with an autoencoder. We evaluated our DL model system using the newly released dataset CIC DDoS2020, which contains a comprehensive variety of DDoS attacks and addresses the gaps of the existing current datasets (CIC DDoS2020). We obtained a significant improvement in attack detection compared to other benchmarking methods. Hence, our model provides excellent confidence in securing these networks. © (2023). All Rights Reserved.

Keyword:

Deep neural networks Network security Learning algorithms Learning systems Intrusion detection Denial-of-service attack Recurrent neural networks

Author Community:

  • [ 1 ] [Qureshi, Sirajuddin]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [He, Jingsha]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [Tunio, Saima]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 4 ] [Zhu, Nafei]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 5 ] [Ullah, Faheem]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 6 ] [Nazir, Ahsan]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 7 ] [Wajahat, Ahsan]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Source :

International Journal of Network Security

ISSN: 1816-353X

Year: 2023

Issue: 5

Volume: 25

Page: 745-757

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 6

Affiliated Colleges:

Online/Total:890/10521111
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.