2017
DOI: 10.14569/ijacsa.2017.080461
|View full text |Cite
|
Sign up to set email alerts
|

DoS Detection Method based on Artificial Neural Networks

Abstract: Abstract-DoS attack tools have become increasingly sophisticated challenging the existing detection systems to continually improve their performances. In this paper we present a victimend DoS detection method based on Artificial Neural Networks (ANN). In the proposed method a Feed-forward Neural Network (FNN) is optimized to accurately detect DoS attack with minimum resources usage. The proposed method consists of the following three major steps: (1) Collection of the incoming network traffic, (2) selection of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 31 publications
(25 citation statements)
references
References 21 publications
0
25
0
Order By: Relevance
“…In this case, however, the workload of the ANN in [11] with a 6-7-1 configuration is significantly smaller compared to the proposed ANN's configuration. Taking into account the number of multiplications and additions in each layer, as those are the most computationally intensive operations, we estimate 49 multiplications and 57 additions for the ANN in [11]. Meanwhile for our work, a total of 651 multiplications and 674 additions are required.…”
Section: Results and Evaluationmentioning
confidence: 84%
See 4 more Smart Citations
“…In this case, however, the workload of the ANN in [11] with a 6-7-1 configuration is significantly smaller compared to the proposed ANN's configuration. Taking into account the number of multiplications and additions in each layer, as those are the most computationally intensive operations, we estimate 49 multiplications and 57 additions for the ANN in [11]. Meanwhile for our work, a total of 651 multiplications and 674 additions are required.…”
Section: Results and Evaluationmentioning
confidence: 84%
“…To demonstrate and evaluate the benefits of utilizing the Look-Up-Table mechanism, we also provide the execution time of the unoptimized software implementation on the Arm core. This version of the ANN uses 110 inputs at the input layer and goes through a number of redundant multiplications as described in the Section IV-D. We also compare our work with the test time of the ANN used in [11]. Although the authors use a different dataset and detect only DoS attacks, we only focus on the execution time and corresponding workload in this section.…”
Section: Results and Evaluationmentioning
confidence: 99%
See 3 more Smart Citations