2016 International Joint Conference on Neural Networks (IJCNN) 2016
DOI: 10.1109/ijcnn.2016.7727577
|View full text |Cite
|
Sign up to set email alerts
|

A neural network model for detecting DDoS attacks using darknet traffic features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Detection of DDoS attacks by utilizing ANN methods other than based on DARPA and KDDCUP99 datasets, which uses darknet packet flow data has been carried out by research [9]. In the study [10], UDP/53 and TCP/80/8080 packet flow used as ANN training inputs that have been previously extracted by the Local Sensitive Hashing (LSH) method. As compared to research [10], which only detects UDP/53 and TC /80/8080 packet data flow, the study [11] includes ICMP packet flow as ANN training input to detect illegal flows in the network.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Detection of DDoS attacks by utilizing ANN methods other than based on DARPA and KDDCUP99 datasets, which uses darknet packet flow data has been carried out by research [9]. In the study [10], UDP/53 and TCP/80/8080 packet flow used as ANN training inputs that have been previously extracted by the Local Sensitive Hashing (LSH) method. As compared to research [10], which only detects UDP/53 and TC /80/8080 packet data flow, the study [11] includes ICMP packet flow as ANN training input to detect illegal flows in the network.…”
Section: Introductionmentioning
confidence: 99%
“…In the study [10], UDP/53 and TCP/80/8080 packet flow used as ANN training inputs that have been previously extracted by the Local Sensitive Hashing (LSH) method. As compared to research [10], which only detects UDP/53 and TC /80/8080 packet data flow, the study [11] includes ICMP packet flow as ANN training input to detect illegal flows in the network. ANN in research [11] trained by utilizing the backpropagation function.…”
Section: Introductionmentioning
confidence: 99%
“…The number of space partitions/clusters does not change over time, and these algorithms adapt just the parameters of the membership functions and the local models. Category II is represented by the incremental algorithms, which are applied in this paper, with examples referred to as the widely applied algorithms RAN [12,13], SONFIN [14,15], NeuroFAST [16,17], DENFIS [18,19], SCFNN [20,21], eTS [22], [23], FLEXFIS [24,25], and PANFIS [26]. These algorithms implement just adding mechanisms.…”
Section: Introductionmentioning
confidence: 99%
“…DDoS packet stream with a large volume causes the target system cannot handle and end up with a loss of resources such as system shutdown, loss of data, moreover, the system loses the overall of owned services [2], [3]. Network packet classification is one of network defense system in order to avoid DDoS attacks [4].…”
Section: Introductionmentioning
confidence: 99%
“…ANN used in [6] with ResilientBackpropagation function combined with the ensemble of classifier outputs method and Neyman-Pearson cost minimization strategy for detection of DDoS attack based on DARPA and KDDCUP datasets. Research [7] adopted the ANN method to detect DDoS attacks based on darknet traffic. TCP/80 and UDP/53 packets used as input and optimized by Locally Sensitive Hashing methods.…”
Section: Introductionmentioning
confidence: 99%