DDOS is a type of DOS attack where multiple compromised systems -- which are usually infected with a Trojan -- are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack. This work proposes a Back Propagation Neural Network (BPNN) prevention engine to flag known and unknown attacks from genuine traffic. We have intensively trained the algorithm with real life cases and attacking scenarios (patterns) based on the existing DDoS tools. The more we train the algorithm with up-to-date patterns (latest known attacks), the further we increase the chances of detecting unknown attacks, considering that over training is avoided. This is because BPNN algorithm learns from scenarios and detects zero-day patterns that are similar to what it was trained with. This design is implemented in the MATLAB environment.
W. Lu, I. Traore,“Detecting new forms of network intrusion using genetic programming”, Computational Intelligence Vol.20, Issue 3, 2004, pp. 475-494.
Selvakani S, R.S. Rajesh,” Genetic Algorithm for framing rules for Intrusion Detection”, IJCSNS, Vol.7, No.11, 2007.
W. Li, “Using Genetic Algorithm for Network Intrusion Detection”. “A Genetic Algorithm Approach to Network Intrusion Detection”. SANS Institute, USA, 2004.
Bridges, Susan, Rayford B. Vaughn,“ Intrusion Detection via Fuzzy Data Mining”, In Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp. 109-122, Ottawa, Canada, 2000.
Crosbie, Mark, Gene Spafford,“Applying Genetic Programming to Intrusion Detection”, In Proceeding of 1995 AAAI Fall Symposium on Genetic Programming, pp. 1-8, Cambridge, Massachusetts, 1995.
T. Xiao, G. Qu, S. Hariri, and M. Yousif, “An Efficient Network Intrusion Detection Method Based on Information Theory and Genetic Algorithm”, Proceedings of the 24th IEEE International Performance Computing and Communications Conference (IPCCC „05), Phoenix, AZ, USA. 2005. Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Net.
Sudhakar Parate, S. M Nirkhi, R.V Dharaskar, “Application of Neural Forensics for detection of Web Attack using Neural Network”, National Conference on Innovative Paradigms in Engineering and Technology(NCIPET-2013).
Afrah Nazir, “ A Comparative Study of different Artficial Neural Networks based Intrusion Detection Systems” International Journal of Scientific and Research Publications, Volume 3, Issue 7, July 2013.
S. Devaraju, S. Ramakrishnan, “ Detection of Accuracy for Intrusion Detection System using Neural Network Classifier”, International Journal of Emerging Technology and Advanced Engineering (IJETAE).
V.Sivakumar1,T.Yoganandh,R.Mohan Das, “Preventing Network From Intrusive Attack Using Artificial Neural Networks”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 2,Mar-Apr 2012, pp.370-373.
Samaneh Rastegari, M. Iqbal Saripan and Mohd Fadlee A. Rasid, “Detection of Denial of Service Attacks against Domain Name System Using Neural Networks”, IJCSI International Journal of Computer Science Issues, Vol. 6, No. 1, 2009.
M. Dondo and J. Treurniet, “Investigation of a Neural Network Implementation of a TCP packet Anomaly Detection System”, Defence Research and Development Canada, May 2004.
Przemysław Kukiełka, Zbigniew Kotulski, “Adaptation of the neural network- based IDS to new attacks detection”.
Mehdi MORADI and Mohammad ZULKERNINE, “A Neural Network Based Ssytem for Intrusion Detection and Classification of Attacks”.
Zahra Moradi1, Mohammad Teshnehlab , “Intrusion Detection Model in MANETs using ANNs and ANFIS”, 2011 International Conference on Telecommunication Technology and Applications, Singapore
Manoranjan Pradhan, Sateesh Kumar Pradhan, Sudhir Kumar Sahu, “Anomaly Detection using Artificial Neural Network”,“International Journal of Engineering Sciences & Emerging Technologies, April 2012”.
Bhavin Shah, Bhushan H Trivedi, “Artificial Neural Network based Intrusion Detection System”, International Journal of Computer Applications” Volume 39– No.6, February 2012.
DDOS Attack, Neural Network, Genetic Algorithm.