Электронный архив

Neural network model for detecting network scanning attacks

Показать сокращенную информацию

dc.contributor.author Panischev O.Y.
dc.contributor.author Makridin A.T.
dc.contributor.author Katasev A.S.
dc.contributor.author Akhmetvaleev A.M.
dc.contributor.author Kataseva D.V.
dc.date.accessioned 2021-02-25T20:36:08Z
dc.date.available 2021-02-25T20:36:08Z
dc.date.issued 2020
dc.identifier.issn 0974-3154
dc.identifier.uri https://dspace.kpfu.ru/xmlui/handle/net/161978
dc.description.abstract © International Research Publication House This paper discusses the concept and problem of detecting network scanning attacks and describes the targets of network scanning attacks. The main attack methods and approaches to scanning network ports are considered. Intrusion detection systems (IDS) are used to detect network scanning attacks. Based on the method of detecting attacks, such systems are divided into IDS, which detects attacks based on signatures, and IDS, which detects attacks based on anomalies. In practice, it is recommended that these IDS detection methods be used together. It is proposed to use a trained neural network as a tool for detecting network scanning attacks. The implementation of the neural network required to prepare the initial data for training, to determine the parameters of the network, to conduct training, and to evaluate the results of its testing. When developing a neural network model, data from the publicly available set "NSL-KDD" were used. During data processing, entries that were not related to network scanning attacks were removed from the original NSL-KDD set. After processing the initial data, the sample contained 5108 records, 3379 of which characterized normal connections, and 1729 connections were related to network scanning attacks. The Deductor modeling environment was used to build a neural network model. The structure of the constructed neural network was as follows: 11 input neurons, 1 output neuron, and one hidden layer consisting of 23 neurons. The neural network was trained using an error backpropagation algorithm. The quality of the neural network model was assessed using contingency tables with the calculation of the classification accuracy, as well as errors of the first and second kind. The values of these errors turned out to be insignificant. The constructed neural network model revealed most of the connections characterizing network scanning attacks. The neural network assessment confirmed its adequacy and the possibility of effective practical use for detecting network scanning attacks.
dc.relation.ispartofseries International Journal of Engineering Research and Technology
dc.subject Data mining
dc.subject Information security
dc.subject Network scanning attack
dc.subject Neural network
dc.subject Neural network model
dc.title Neural network model for detecting network scanning attacks
dc.type Article
dc.relation.ispartofseries-issue 11
dc.relation.ispartofseries-volume 13
dc.collection Публикации сотрудников КФУ
dc.relation.startpage 3596
dc.source.id SCOPUS09743154-2020-13-11-SID85097875293


Файлы в этом документе

Данный элемент включен в следующие коллекции

  • Публикации сотрудников КФУ Scopus [24551]
    Коллекция содержит публикации сотрудников Казанского федерального (до 2010 года Казанского государственного) университета, проиндексированные в БД Scopus, начиная с 1970г.

Показать сокращенную информацию

Поиск в электронном архиве


Расширенный поиск

Просмотр

Моя учетная запись

Статистика