Published January 30, 2025 | Version CC BY-NC-ND 4.0
Journal Open

A Robust Framework for Detecting Brute-Force Attacks through Deep Learning Techniques

  • 1. College of Computers and Information Technology, Taif University, Taif, SA.

Contributors

Contact person:

  • 1. College of Computers and Information Technology, Taif University, Taif, SA.
  • 2. Department of Information Technology, College of Computer and Information Technology, Taif University, Taif, SA.

Description

Abstract: A considerable concern arises with the precise identification of brute-force threats within a networked environment. It emphasizes the need for new methods, as existing ones often lead to many false alarms, as well as delays in real-time threat detection. To tackle these issues, this study proposes a novel intrusion detection framework that utilizes deep learning models for more accurate and efficient detection of brute-force attacks. The framework’s structure includes data collection and preprocessing components performed at the outset of the study using the CSE-CICIDS2018 dataset. The design architecture includes data collection and preprocessing steps. Feature extraction and selection techniques are employed to optimize data for model training. Further, after building the model, various attributes are extracted from the data from feature selection to be used in the training. Then, the construction of multiple architectures of deep learning algorithms, which include Artificial Neural Networks (ANN), Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), and Long Short-Term Memory (LSTM) models. Evaluation results show CNN and LSTM achieved the highest accuracy of 99.995% and 99.99% respectively. It showcases its ability to detect complex attack patterns in network traffic. It indicates that the CNN network got the best optimum results with a test time of 9.94 seconds. This establishes CNN as an effective method, achieving high accuracy quickly. In comparison, we have surpassed the accuracy of current methods while addressing their weaknesses. The findings are consistent with the effectiveness of CNN in brute-force attack detection frameworks as a more accurate and faster alternative, increasing the capability of detecting intrusions on a network in real-time.

Files

E818213050125.pdf

Files (992.7 kB)

Name Size Download all
md5:f846dbf3798dfb6247cbb02b91dba3a3
992.7 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2025-01-15
Manuscript received on 31 October 2024 | First Revised Manuscript received on 10 December 2024 | Second Revised Manuscript received on 17 December 2024 | Manuscript Accepted on 15 January 2025 | Manuscript published on 30 January 2025

References

  • J. Li, M. S. Herdem, J. Nathwani, and J. Z. Wen, 'Methods and applications for Artificial Intelligence, Big Data, Internet of Things, and Blockchain in smart energy management', Energy AI, vol. 11, p. 100208, 2023. DOI: https://doi.org/10.1016/j.egyai.2022.100208
  • W. S. Admass, Y. Y. Munaye, and A. Diro, 'Cyber security: State of the art, challenges, and future directions', Cyber Secur. Appl., p. 100031, 2023. DOI: https://doi.org/10.1016/j.csa.2023.100031
  • M. F. K. Shah, M. Md-Arshad, A. A. Samad, and F. A. Ghaleb, 'Comparing ftp and ssh password brute force attack detection using k-nearest neighbor (k-nn) and decision tree in cloud computing', Int. J. Innov. Comput., vol. 13, no. 1, pp. 29–35, 2023. DOI: https://doi.org/10.11113/ijic.v13n1.386
  • P. K. Sadhu, V. P. Yanambaka, and A. Abdelgawad, 'Internet of things: Security and solutions survey', Sensors, vol. 22, no. 19, p. 7433, 2022. DOI: https://doi.org/10.3390/s22197433
  • S. Kumar, S. Gupta, and S. Arora, 'Research trends in network-based intrusion detection systems: A review', Ieee Access, vol. 9, pp. 157761–157779, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3129775
  • Z. Azam, M. M. Islam, and M. N. Huda, 'Comparative analysis of intrusion detection systems and machine learning based model analysis through decision tree', IEEE Access, 2023, Accessed: Sep. 29, 2024. DOI: https://doi.org/10.1109/ACCESS.2023.3296444