TY - CHAP
T1 - Reliable Mechanism to Detect Traditional Cyber Attack Using Artificial Neural Networks
AU - Ahanger, Tariq Ahamed
AU - Aljumah, Abdullah
N1 - Publisher Copyright:
© 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
PY - 2021
Y1 - 2021
N2 - DDoS has evolved as the most common and devastating attack that has been confronted from previous years. As many networks reply simultaneously, mostly RREP will work together to accomplish a DDoS attack. Thus, no information system can tolerate and survive once they confront this ruthless attack. There are many existing intrusion detection systems to prevent and protect the system as well as network from DDoS, but still DDoS is complex to perform detection and perplexing. In this research article, an IDS has been developed based on the basics of latency and delays in neural networks. To form a multi-layer architecture, every node is kept on surveillance once the detectors are deployed in the network topology, and the activities of every single node are tracked by their close hop nodes mutually to ensure their status of survival. Only after all of the information is collected in a table, it is forwarded for integrated analysis by their selected expert module. The nodes covered in the first and second layer of firewall experience some suspected packets or streams as that of DDoS pattern and the core expert module that started right after the second firewall will take some effective action and invoke the defense module to ensure the safety of the information system. And the nodes which did not stand against defense module will be isolated first and rebooted later to ensure the normal functionality of the network.
AB - DDoS has evolved as the most common and devastating attack that has been confronted from previous years. As many networks reply simultaneously, mostly RREP will work together to accomplish a DDoS attack. Thus, no information system can tolerate and survive once they confront this ruthless attack. There are many existing intrusion detection systems to prevent and protect the system as well as network from DDoS, but still DDoS is complex to perform detection and perplexing. In this research article, an IDS has been developed based on the basics of latency and delays in neural networks. To form a multi-layer architecture, every node is kept on surveillance once the detectors are deployed in the network topology, and the activities of every single node are tracked by their close hop nodes mutually to ensure their status of survival. Only after all of the information is collected in a table, it is forwarded for integrated analysis by their selected expert module. The nodes covered in the first and second layer of firewall experience some suspected packets or streams as that of DDoS pattern and the core expert module that started right after the second firewall will take some effective action and invoke the defense module to ensure the safety of the information system. And the nodes which did not stand against defense module will be isolated first and rebooted later to ensure the normal functionality of the network.
KW - ANN
KW - Cyber security security
KW - DDoS
KW - IDS
UR - http://www.scopus.com/inward/record.url?scp=85107423146&partnerID=8YFLogxK
U2 - 10.1007/978-981-15-9647-6_91
DO - 10.1007/978-981-15-9647-6_91
M3 - Chapter
AN - SCOPUS:85107423146
T3 - Lecture Notes on Data Engineering and Communications Technologies
SP - 1147
EP - 1156
BT - Lecture Notes on Data Engineering and Communications Technologies
PB - Springer Science and Business Media Deutschland GmbH
ER -