Git Product home page Git Product logo

ghostnwa / detecting-ip-spoofing-attacks-using-deep-learning--ml Goto Github PK

View Code? Open in Web Editor NEW

This project forked from shubhagrwl/detecting-ip-spoofing-attacks-using-deep-learning--ml

0.0 0.0 0.0 1.94 MB

Intrusion detection system is one of the most important parts of network security in competing against illegitimate network access. Intruder uses hijacking technique like host file hijack or IP spoofing, which is IP address forgery. There are different ways by which intrusion can take place, such as fake emailing and denial of service attack. In such kind of intrusion it is difficult to find the identity of the sender. Because of this, the system or the main server can crash from the overloading requests coming from an unauthorized source. Therefore, the system becomes unresponsive to the authorized requests. In the IP address spoofing, the attacker’s mimics as the legitimate user and access the network authorization. Further, it modifies the packet headers of the authorized users IP address. To mitigate this issue, in this thesis work, a new intrusion detection method has been introduced for preventing IP spoofing attack. The properties of nodes are optimized by using artificial bee colony optimization (ABC). Furthermore, the neural network model is trained using the optimized properties to predict the output in terms Packet delivery ratio (PDR), throughput and energy consumption.

detecting-ip-spoofing-attacks-using-deep-learning--ml's Introduction

Detecting-IP-Spoofing-Attacks-using-Deep-Learning--ML

Intrusion detection system is one of the most important parts of network security in competing against illegitimate network access. Intruder uses hijacking technique like host file hijack or IP spoofing, which is IP address forgery. There are different ways by which intrusion can take place, such as fake emailing and denial of service attack. In such kind of intrusion it is difficult to find the identity of the sender. Because of this, the system or the main server can crash from the overloading requests coming from an unauthorized source. Therefore, the system becomes unresponsive to the authorized requests. In the IP address spoofing, the attacker’s mimics as the legitimate user and access the network authorization. Further, it modifies the packet headers of the authorized users IP address. To mitigate this issue, in this thesis work, a new intrusion detection method has been introduced for preventing IP spoofing attack. The properties of nodes are optimized by using artificial bee colony optimization (ABC). Furthermore, the neural network model is trained using the optimized properties to predict the output in terms Packet delivery ratio (PDR), throughput and energy consumption.

What is IDS ?

  • Intrusion Detection System (IDS) is one of the crucial parts in the cyber security system because they are capable to

  • Identify threats and

  • It minimizes the potential damage or security breaches

  • Intruder uses hijacking technique like

  • IP spoofing or Host file hijack, which is also called IP address forgery.

Research Motivation

  • Day by Day new technology are developing, due to this new type of attacks are also coming to breach the security.
  • For the prevention of IP spoofing, various researchers has proposed their work but due to lack of proper knowledge about nodes, and consecutively new type of attacks are coming .
  • It is difficult to mitigate that issue. 

Problem Statement

  • A lot of research is already being done in the field of IP spoofing detection and prevention but due to the lack of tracing and proper classifier, the existing work is not effective as per requirements

  • Therefore, this research has shown the awareness regarding the problem and proposed a new system that includes optimization of property of nodes in the network for enhanced detection accuracy.

Proposed Method

  • We are using swarm intelligence technique named as Artificial Bee Colony (ABC) optimization for finding the best route and properties of node.
  • Then neural network is trained by the properties of ABC.
  • Thus whenever, spoofer comes into the network system, ANN (Artificial neural network) detects it by comparing their property with the properties stored.

Advantage of using ABC (Artificial Bee Colony)

  • It is Simple, Stable and Flexible.
  • It is very effective in exploring local solutions.
  • It is easy to implement.
  • It is very flexible in changing the adjustment.
  • Handling Cost is very low.
  • Easily give the solutions of populations

Implementation

detecting-ip-spoofing-attacks-using-deep-learning--ml's People

Contributors

shubhagrwl avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.