An Algorithm for Detecting Brute Force Attacks on FTP and SSH Services Utilizing Deep Learning with Probabilistic Neural Networks (PNN)
Authors/Creators
- 1. Department of Information Technology, College of Computer and Information Technology, Taif University, Saudi Arabia.
Contributors
Contact person:
Researcher (3):
- 1. Department of Information Technology, College of Computer and Information Technology, Taif University, Saudi Arabia.
- 2. Department of Computer Science and Computer Engineering, La Trobe University, Bundoora, Australia.
Description
Abstract: Brute force attacks remain one of the most prevalent and effective methods cybercriminals use to gain unauthorized access to networks and systems. These attacks involve systematically attempting various password or key combinations until the correct one is identified, often targeting critical services such as FTP (File Transfer Protocol) and SSH (Secure Shell). The consequences of these attacks can be severe, including data breaches, financial losses, and reputational damage. Intrusion Detection Systems (IDS) play a crucial role in mitigating these threats by monitoring network traffic and identifying malicious activities. However, traditional IDS methods - such as signaturebased detection and anomaly detection - struggle to detect emerging and evolving threats. To address these challenges, this study presents an advanced detection model utilizing deep learning techniques, specifically a Probabilistic Neural Network (PNN), to identify brute force attacks on FTP and SSH protocols. The model is trained and evaluated using the CICIDS2018 dataset, with the Bat Optimization Algorithm employed to fine-tune parameters and enhance performance. The proposed model achieves remarkable results, with an accuracy of 99.968%, precision of 99.949%, recall of 99.986%, and an F1-score of 99.968%. These findings highlight the model's potential as a highly effective tool for strengthening network security and preventing unauthorized access.
Files
E818713050125.pdf
Files
(710.5 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:50b854cfcfb55fb5a0edb1cdf7332be5
|
710.5 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.35940/ijrte.E8187.13060325
- EISSN
- 2277-3878
Dates
- Accepted
-
2025-03-15Manuscript received on 12 November 2024 | Revised Manuscript received on 28 December 2024 | Second Revised Manuscript received on 16 January 2025 | Manuscript Accepted on 15 March 2025 | Manuscript published on 30 March 2025.
References
- Kolekar, V. K., & Vaidya, M. B. (2016). Click and session based - Captcha as graphical password authentication schemes for smart phone and web. Proceedings - IEEE International Conference on Information Processing, ICIP 2015. https://doi.org/10.1109/INFOP.2015.7489467
- Liao, H. J., Richard Lin, C. H., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. In Journal of Network and Computer Applications (Vol. 36, Issue 1). https://doi.org/10.1016/j.jnca.2012.09.004
- Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1). https://doi.org/10.1002/ett.4150
- Aldallal, A., & Alisa, F. (2021). Effective intrusion detection system to secure data in the cloud using machine learning. Symmetry, 13(12). https://doi.org/10.3390/sym13122306
- Xu, C., Shen, J., Du, X., & Zhang, F. (2018). An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units. IEEE Access, 6. https://doi.org/10.1109/ACCESS.2018.2867564
- Elsherif, A. (2018). Automatic Intrusion Detection System Using Deep Recurrent Neural Network Paradigm. Journal of Information Security and Cybercrimes Research. https://doi.org/10.26735/16587790.2018.003.
- Panwar, S. S., Negi, P. S., Panwar, L. S., & Raiwani, Y. P. (2019). Implementation of machine learning algorithms on the cicids-2017 dataset for intrusion detection using WEKA. International Journal of Recent Technology and Engineering, 8(3), 2195–2207. https://doi.org/10.35940/ijrte.C4587.098319
- Kasongo, S. M., & Sun, Y. (2019). A deep learning method with filterbased feature engineering for wireless intrusion detection system. IEEE Access, 7. https://doi.org/10.1109/ACCESS.2019.2905633
- Al-Emadi, S., Al-Mohannadi, A., & Al-Senaid, F. (2020). Using Deep Learning Techniques for Network Intrusion Detection. 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020. https://doi.org/10.1109/ICIoT48696.2020.9089524
- Saraeian, S., & Golchi, M. M. (2020). Application of Deep Learning Technique in an Intrusion Detection System. International Journal of Computational Intelligence and Applications, 19(2). https://doi.org/10.1142/S1469026820500169
- Liu, C., Gu, Z., & Wang, J. (2021). A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3082147
- Aldallal, A. (2022). Toward Efficient Intrusion Detection System Using Hybrid Deep Learning Approach. Symmetry, 14(9). https://doi.org/10.3390/sym14091916
- Ahmad, T., Truscan, D., Vain, J., & Porres, I. (2022). Early Detection of Network Attacks Using Deep Learning. Proceedings - 2022 IEEE 14th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2022. https://doi.org/10.1109/ICSTW55395.2022.00020
- Kasongo, S. M. (2023). A deep learning technique for intrusion detection system using a Recurrent Neural Networks-based framework. Computer Communications, 199. https://doi.org/10.1016/j.comcom.2022.12.010
- Henry, A., Gautam, S., Khanna, S., Rabie, K., Shongwe, T., Bhattacharya, P., Sharma, B., & Chowdhury, S. (2023). Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System. Sensors, 23(2). https://doi.org/10.3390/s23020890
- Alotibi, N., & Alshammari, M. (2023). Deep Learning-based Intrusion Detection: A Novel Approach for Identifying Brute-Force Attacks on FTP and SSH Protocol. International Journal of Advanced Computer Science and Applications, 14(6). https://doi.org/10.14569/IJACSA.2023.0140612
- Hamza, A. A., & Al-Janabi, R. J. surayh. (2024). Detecting Brute Force Attacks Using Machine Learning. BIO Web of Conferences, 97. https://doi.org/10.1051/bioconf/20249700045
- Hanif, A. Al, & Ilyas, M. (2024). Enhance the Detection of DoS and Brute Force Attacks within the MQTT Environment Through Feature Engineering and Employing an Ensemble Technique. International Journal of Artificial Intelligence & Applications, 15(4), 01–19. https://doi.org/10.5121/ijaia.2024.15401
- Chang, D. T. (2021). Probabilistic Deep Learning with Probabilistic Neural Networks and Deep Probabilistic Models. https://doi.org/10.48550/arXiv.2106.00120
- Alarfaj, F. K., & Khan, N. A. (2023). Enhancing the Performance of SQL Injection Attack Detection through Probabilistic Neural Networks. Applied Sciences (Switzerland), 13(7). https://doi.org/10.3390/app13074365
- Zhao, G., Zhang, C., & Zheng, L. (2017). Intrusion detection using deep belief network and probabilistic neural network. Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017, 1. https://doi.org/10.1109/CSE-EUC.2017.119
- Yang, X. S. (2010). A new metaheuristic Bat-inspired Algorithm. Studies in Computational Intelligence, 284. https://doi.org/10.1007/978- 3-642-12538-6_6
- Mezina, A., Burget, R., & Travieso-Gonzalez, C. M. (2021). Network Anomaly Detection with Temporal Convolutional Network and U-Net Model. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3121998
- S, K., N, Dr. U. M., & R, Dr. V. (2020). An Intrusion Detection System Techniques and Algorithms of Machine and Deep L earning. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 10, pp. 370–376). DOI: https://doi.org/10.35940/ijitee.J7541.0891020
- Bai, Dr. A., Devi, Dr. R. D. H., & Mohana, Dr. R. M. (2019). High Performance Network Intrusion Detection System. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 3749–3753). DOI: https://doi.org/10.35940/ijeat.A1975.129219
- Rathore, R., & Shrivastava, Dr. N. (2023). Network Anomaly Detection System using Deep Learning with Feature Selection Through PSO. In International Journal of Emerging Science and Engineering (Vol. 11, Issue 5, pp. 1–6). DOI: https://doi.org/10.35940/ijese.F2531.0411523
- Latha, S., & Prakash, Dr. V. S. J. (2019). Optimization of Rules for Intrusion Detection System (Org-Ids). In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 1356–1361). DOI: https://doi.org/10.35940/ijrte.B3373.098319