Detection of Denial of Service Attacks against Domain Name System Using Neural Networks

Along with the explosive growth of the Internet, the demand for efficient and secure Internet Infrastructure has been increasing. For the entire chain of Internet connectivity the Domain Name System (DNS) provides name to address mapping services. Hackers exploit this fact to damage different par...

Full description

Saved in:
Bibliographic Details
Main Author: Rastegari, Samaneh
Format: Thesis
Language:English
English
Published: 2009
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/7302/1/FK_2009_23a.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-upm-ir.7302
record_format uketd_dc
spelling my-upm-ir.73022013-05-27T07:34:32Z Detection of Denial of Service Attacks against Domain Name System Using Neural Networks 2009-08 Rastegari, Samaneh Along with the explosive growth of the Internet, the demand for efficient and secure Internet Infrastructure has been increasing. For the entire chain of Internet connectivity the Domain Name System (DNS) provides name to address mapping services. Hackers exploit this fact to damage different parts of Internet. In order to prevent this system from different types of attacks, we need to prepare a classification of possible security threats against DNS. This dissertation focuses on Denial of Service (DoS) attacks as the major security issue during last years, and gives an overview of techniques used to discover and analyze them. The process of detection and classification of DoS against DNS has been presented in two phases in our model. The proposed system architecture consists of a statistical pre-processor and a machine learning engine. The first step in our work was to generate the DNS traffic in normal and attack situations for using as the input of our intrusion detection system (IDS). With the prior knowledge of DoS attacks against DNS, we used a network simulator to model DNS traffic with high variability. Therefore, the difficulty of creating different scenarios of attacks in a real environment has been decreased. The pre-processor, processes the collected data statistically and derives the final variable values. These parameters are the inputs of the detector engine. In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. The performance of our system was measured in terms of detection rate, accuracy, and false alarm rate. The results indicated that the three layered back propagation neural network with a 3-7-3 structure provides a detection rate of 99.55% for direct DoS attacks and 97.82% for amplification DoS attacks. It can give us 99% accuracy and an acceptable false alarm rate of 0.28% comparing to other types of classifiers. 2009-08 Thesis http://psasir.upm.edu.my/id/eprint/7302/ http://psasir.upm.edu.my/id/eprint/7302/1/FK_2009_23a.pdf application/pdf en public masters Universiti Putra Malaysia Faculty of Engineering English
institution Universiti Putra Malaysia
collection PSAS Institutional Repository
language English
English
topic


spellingShingle


Rastegari, Samaneh
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
description Along with the explosive growth of the Internet, the demand for efficient and secure Internet Infrastructure has been increasing. For the entire chain of Internet connectivity the Domain Name System (DNS) provides name to address mapping services. Hackers exploit this fact to damage different parts of Internet. In order to prevent this system from different types of attacks, we need to prepare a classification of possible security threats against DNS. This dissertation focuses on Denial of Service (DoS) attacks as the major security issue during last years, and gives an overview of techniques used to discover and analyze them. The process of detection and classification of DoS against DNS has been presented in two phases in our model. The proposed system architecture consists of a statistical pre-processor and a machine learning engine. The first step in our work was to generate the DNS traffic in normal and attack situations for using as the input of our intrusion detection system (IDS). With the prior knowledge of DoS attacks against DNS, we used a network simulator to model DNS traffic with high variability. Therefore, the difficulty of creating different scenarios of attacks in a real environment has been decreased. The pre-processor, processes the collected data statistically and derives the final variable values. These parameters are the inputs of the detector engine. In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. The performance of our system was measured in terms of detection rate, accuracy, and false alarm rate. The results indicated that the three layered back propagation neural network with a 3-7-3 structure provides a detection rate of 99.55% for direct DoS attacks and 97.82% for amplification DoS attacks. It can give us 99% accuracy and an acceptable false alarm rate of 0.28% comparing to other types of classifiers.
format Thesis
qualification_level Master's degree
author Rastegari, Samaneh
author_facet Rastegari, Samaneh
author_sort Rastegari, Samaneh
title Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
title_short Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
title_full Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
title_fullStr Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
title_full_unstemmed Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
title_sort detection of denial of service attacks against domain name system using neural networks
granting_institution Universiti Putra Malaysia
granting_department Faculty of Engineering
publishDate 2009
url http://psasir.upm.edu.my/id/eprint/7302/1/FK_2009_23a.pdf
_version_ 1747810683754381312