Abstract

A distributed denial-of-service (DDoS) attack attempts to prevent people from accessing a server. A website may become inaccessible due to a DDoS attack because the server is inundated with fake requests and cannot handle real ones. A DDoS attack affects a large number of computers. Attackers employ a zombie network, which is a collection of infected machines on which the attacker has hidden the denial-of-service attacking application to carry out a DDoS attack. The MATLAB 2018a simulator was used in this study for training. Additionally, during design, the knowledge discovery dataset (KDD) was cleaned and the values of attacks were incorporated. A neural network model was subsequently developed, and the KDD was trained using a recursive artificial neural network. This network was developed using five distinct training algorithms: 1) Fletcher–Powell conjugate gradient, 2) Polak–Ribiére conjugate gradient of, 3) resilient backpropagation, 4) gradient conjugation with Powell/Beale restarts, and 5) gradient descent algorithm with variable learning rate. The artificial neural network toolset in MATLAB was used to investigate the detection of DDoS attacks. The conjugate gradient with Powell/Beale restart algorithm had a success rate of 99.9% and a training time of 00:53. This inquiry uses the KDD-CUP99 dataset. Has a better level of accuracy, according to the results

Highlights

  • Distributed denial of service (DDoS) attacks are designed to take down networks by denying them access to the resources they require to function

  • Attackers employ a zombie network, which is a collection of infected machines on which the attacker has hidden the denial-of-service attacking application to carry out a DDoS attack

  • The artificial neural network toolset in MATLAB was used to investigate the detection of DDoS attacks

Read more

Summary

INTRODUCTION

Distributed denial of service (DDoS) attacks are designed to take down networks by denying them access to the resources they require to function. A DDoS assault occurs when a denial of service (DoS) attack begins with many source addresses. A huge number of compromised systems assault a single target, resulting in a DoS for the target system’s users. Incoming message volume shuts down the target computer, preventing genuine users from accessing it. Decentralized DoS attacks have recently been developed in the realm of cyber-attacks. These attacks entail taking a server down and causing it to crash. Decentralized DoS attacks essentially shut down a server, forcing it to fail or preventing it from servicing genuine users.

ZOMBIES IN THE DDOS CONTEXT
DDOS AND ITS OPERATION
NEURAL NETWORKS
BENEFITS OF NEURAL NETWORKS 1
RECURSIVE NEURAL NETWORK
RELATED WORK
DESIGN OF PROPOSED ARCHITECTURE
SYSTEM PERFORMANCE MATLAB 2018a was used in this study
Resilient Backpropagation Training Algorithm Result
RESULTS AND CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.