scholarly journals Multi-Classifier of DDoS Attacks in Computer Networks Built on Neural Networks

2021 ◽  
Vol 11 (22) ◽  
pp. 10609
Author(s):  
Andrés Chartuni ◽  
José Márquez

The great commitment in different areas of computer science for the study of computer networks used to fulfill specific and major business tasks has generated a need for their maintenance and optimal operability. Distributed denial of service (DDoS) is a frequent threat to computer networks because of its disruption to the services they cause. This disruption results in the instability and/or inoperability of the network. There are different classes of DDoS attacks, each with a different mode of operation, so detecting them has become a difficult task for network monitoring and control systems. The objective of this work is based on the exploration and choice of a set of data that represents DDoS attack events, on their treatment in a preprocessing phase, and later, the generation of a model of sequential neural networks of multi-class classification. This is done to identify and classify the various types of DDoS attacks. The result was compared with previous works treating the same dataset used herein. We compared their classification method, against ours. During this research, the CIC DDoS2019 dataset was used. Previous works carried out with this dataset proposed a binary classification approach, our approach is based on multi-classification. Our proposed model was capable of achieving around 94% in metrics such as precision, accuracy, recall and F1 score. The added value of multiclass classification during this work is identified and compared with binary classifications using the models presented in the previous.

Author(s):  
Richard Heeks

Management information systems (MIS) are fundamental for public sector organizations seeking to support the work of managers. Yet they are often ignored in the rush to focus on ‘sexier’ applications. This chapter aims to redress the balance by providing a detailed analysis of public sector MIS. It first locates MIS within the broader management monitoring and control systems that they support. Understanding the broader systems and the relationship to public sector inputs, processes, outputs and outcomes is essential to understanding MIS. The chapter details the different types of reports that MIS produce, and uses this as the basis for an MIS model and a description of the decision-making benefits that computerized MIS can bring. Finally, the chapter describes generic public sector MIS that address internal government transactions, public administration/ regulation, and public service delivery. Real-world examples of all types are provided from the U.S., England, Africa, and Asia. <BR>


Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5875
Author(s):  
Waleed Nazih ◽  
Yasser Hifny ◽  
Wail S. Elkilani ◽  
Habib Dhahri ◽  
Tamer Abdelkader

Many companies have transformed their telephone systems into Voice over IP (VoIP) systems. Although implementation is simple, VoIP is vulnerable to different types of attacks. The Session Initiation Protocol (SIP) is a widely used protocol for handling VoIP signaling functions. SIP is unprotected against attacks because it is a text-based protocol and lacks defense against the growing security threats. The Distributed Denial of Service (DDoS) attack is a harmful attack, because it drains resources, and prevents legitimate users from using the available services. In this paper, we formulate detection of DDoS attacks as a classification problem and propose an approach using token embedding to enhance extracted features from SIP messages. We discuss a deep learning model based on Recurrent Neural Networks (RNNs) developed to detect DDoS attacks with low and high-rate intensity. For validation, a balanced real traffic dataset was built containing three attack scenarios with different attack durations and intensities. Experiments show that the system has a high detection accuracy and low detection time. The detection accuracy was higher for low-rate attacks than that of traditional machine learning.


Sign in / Sign up

Export Citation Format

Share Document