Neural Network Model for Detecting Network Scanning Attacks

Oleg Yuryevich Panischev, Artur Tagirovich Makridin, A. Katasev, A. M. Akhmetvaleev, D. V. Kataseva
{"title":"Neural Network Model for Detecting Network Scanning Attacks","authors":"Oleg Yuryevich Panischev, Artur Tagirovich Makridin, A. Katasev, A. M. Akhmetvaleev, D. V. Kataseva","doi":"10.37624/IJERT/13.11.2020.3596-3600","DOIUrl":null,"url":null,"abstract":"This paper discusses the concept and problem of detecting network scanning attacks and describes the targets of network scanning attacks. The main attack methods and approaches to scanning network ports are considered. Intrusion detection systems (IDS) are used to detect network scanning attacks. Based on the method of detecting attacks, such systems are divided into IDS, which detects attacks based on signatures, and IDS, which detects attacks based on anomalies. In practice, it is recommended that these IDS detection methods be used together. It is proposed to use a trained neural network as a tool for detecting network scanning attacks. The implementation of the neural network required to prepare the initial data for training, to determine the parameters of the network, to conduct training, and to evaluate the results of its testing. When developing a neural network model, data from the publicly available set \"NSLKDD\" were used. During data processing, entries that were not related to network scanning attacks were removed from the original NSL-KDD set. After processing the initial data, the sample contained 5108 records, 3379 of which characterized normal connections, and 1729 connections were related to network scanning attacks. The Deductor modeling environment was used to build a neural network model. The structure of the constructed neural network was as follows: 11 input neurons, 1 output neuron, and one hidden layer consisting of 23 neurons. The neural network was trained using an error backpropagation algorithm. The quality of the neural network model was assessed using contingency tables with the calculation of the classification accuracy, as well as errors of the first and second kind. The values of these errors turned out to be insignificant. The constructed neural network model revealed most of the connections characterizing network scanning attacks. The neural network assessment confirmed its adequacy and the possibility of effective practical use for detecting network scanning attacks. Keywordsnetwork scanning attack, information security, data mining, neural network, neural network model.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of engineering research and technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.37624/IJERT/13.11.2020.3596-3600","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper discusses the concept and problem of detecting network scanning attacks and describes the targets of network scanning attacks. The main attack methods and approaches to scanning network ports are considered. Intrusion detection systems (IDS) are used to detect network scanning attacks. Based on the method of detecting attacks, such systems are divided into IDS, which detects attacks based on signatures, and IDS, which detects attacks based on anomalies. In practice, it is recommended that these IDS detection methods be used together. It is proposed to use a trained neural network as a tool for detecting network scanning attacks. The implementation of the neural network required to prepare the initial data for training, to determine the parameters of the network, to conduct training, and to evaluate the results of its testing. When developing a neural network model, data from the publicly available set "NSLKDD" were used. During data processing, entries that were not related to network scanning attacks were removed from the original NSL-KDD set. After processing the initial data, the sample contained 5108 records, 3379 of which characterized normal connections, and 1729 connections were related to network scanning attacks. The Deductor modeling environment was used to build a neural network model. The structure of the constructed neural network was as follows: 11 input neurons, 1 output neuron, and one hidden layer consisting of 23 neurons. The neural network was trained using an error backpropagation algorithm. The quality of the neural network model was assessed using contingency tables with the calculation of the classification accuracy, as well as errors of the first and second kind. The values of these errors turned out to be insignificant. The constructed neural network model revealed most of the connections characterizing network scanning attacks. The neural network assessment confirmed its adequacy and the possibility of effective practical use for detecting network scanning attacks. Keywordsnetwork scanning attack, information security, data mining, neural network, neural network model.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
检测网络扫描攻击的神经网络模型
讨论了网络扫描攻击检测的概念和问题,描述了网络扫描攻击的目标。分析了扫描网络端口的主要攻击方法和途径。入侵检测系统(IDS)主要用于检测网络扫描攻击。根据检测攻击的方式,可以分为基于特征检测攻击的IDS和基于异常检测攻击的IDS。在实践中,建议这些IDS检测方法一起使用。提出利用训练好的神经网络作为检测网络扫描攻击的工具。神经网络的实现需要准备训练的初始数据,确定网络的参数,进行训练,并评估其测试的结果。在开发神经网络模型时,使用了来自公开可用集“NSLKDD”的数据。在数据处理过程中,将与网络扫描攻击无关的表项从原NSL-KDD集中删除。对初始数据进行处理后,样本包含5108条记录,其中3379条为正常连接,1729条为网络扫描攻击。利用演绎器建模环境建立神经网络模型。所构建的神经网络结构如下:11个输入神经元,1个输出神经元,1个隐含层由23个神经元组成。神经网络采用误差反向传播算法进行训练。利用列联表对神经网络模型的质量进行了评价,并计算了分类精度以及第一类和第二类误差。这些误差的值被证明是微不足道的。构建的神经网络模型揭示了网络扫描攻击的大部分特征连接。神经网络评估证实了该方法在检测网络扫描攻击方面的充分性和可行性。关键词网络扫描攻击,信息安全,数据挖掘,神经网络,神经网络模型
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
New Equations for Rate of Energy Dissipation of a Stepped Spillway with Slope less than Critical and Specific Step Height Blockchain-Based Secure Smart Health IoT solution Using RBAC Architecture Fatigue life assessment of high-speed train’s bogie frame due to dynamic loads under the influence of wheel flat Luenberger Observer-Based Speed Sensor Fault Detection: real time implementation to DC Motors Ultra-High-Performance Concrete (UHPC) - Applications Worldwide: A State-of-the-Art Review
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1