Research Article
BibTex RIS Cite
Year 2025, Volume: 14 Issue: 1, 597 - 609, 26.03.2025
https://doi.org/10.17798/bitlisfen.1622548

Abstract

References

  • Aweya J. "IP router architectures: an overview." Int. J. Commun. Syst., vol. 14, no. 5, pp. 447–475, 2001..
  • G. Femenias, N. Lassoued, and F. Riera-Palou, “Access point switch ON/OFF strategies for green cell-free massive MIMO networking,” IEEE Access, vol. 8, pp. 21788–21803, 2020.
  • J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39–53, 2004.
  • B. Pingle, A. Mairaj, and A. Y. Javaid, “Real-world man-in-the-middle (MITM) attack implementation using open source tools for instructional use,” in Proc. 2018 IEEE Int. Conf. Electro/Information Technology (EIT), Rochester, MI, USA, 2018, pp. 192–197.
  • S. Gupta, A. Singhal, and A. Kapoor, “A literature survey on social engineering attacks: Phishing attack,” in 2016 international conference on computing, communication and automation (ICCCA), 2016, pp. 537–540.
  • R. Rawat and S. K. Shrivastav, “SQL injection attack detection using SVM,” Int. J. Comput. Appl., vol. 42, no. 13, pp. 1–4, 2012.
  • K. Lee, J. Kim, K. H. Kwon, Y. Han, and S. Kim, “DDoS attack detection method using cluster analysis,” Expert Syst. Appl., vol. 34, no. 3, pp. 1659–1665, 2008.
  • J. Ye, X. Cheng, J. Zhu, L. Feng, and L. Song, “A DDoS attack detection method based on SVM in software defined network,” Secur. Commun. Networks, vol. 2018, no. 1, p. 9804061, 2018.
  • U. Ince and G. Karaduman, “Classification of Distributed Denial of Service Attacks Using Machine Learning Methods,” NATURENGS, vol. 5, no. 1, pp. 15–20, 2024.
  • M. A. Al-Shareeda, S. Manickam, and M. A. Saare, “DDoS attacks detection using machine learning and deep learning techniques: Analysis and comparison,” Bull. Electr. Eng. Informatics, vol. 12, no. 2, pp. 930–939, 2023.
  • A. R. Shaaban, E. Abd-Elwanis, and M. Hussein, “DDoS attack detection and classification via Convolutional Neural Network (CNN),” in 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS), 2019, pp. 233–238.
  • A. A. Najar, M. N. Sugali, F. R. Lone, and A. Nazir, “A novel CNN-based approach for detection and classification of DDoS attacks,” Concurr. Comput. Pract. Exp., vol. 36, no. 19, p. e8157, 2024.
  • A. A. Najar and S. M. Naik, “Cyber-secure SDN: A CNN-based approach for efficient detection and mitigation of DDoS attacks,” Comput. \& Secur., vol. 139, p. 103716, 2024.
  • C. Padmavathy et al., “1D CNN Based Model for Detection of DDoS Attack,” in 2024 2nd International Conference on Device Intelligence, Computing and Communication Technologies (DICCT), 2024, pp. 1–6.
  • A. Kumar, I. Sharma, S. Mittal, and others, “Enhancing Security through a Machine Learning Approach to Mitigate Man-in-the-Middle Attacks,” in 2024 IEEE 9th International Conference for Convergence in Technology (I2CT), 2024, pp. 1–6.
  • K. V. Rao, B. R. Akshaya, G. G. Satvik, B. Rohith, and G. C. B. Lahari, “Machine Learning based Man-in-the-Middle Attack Prediction,” in 2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), 2024, pp. 1393–1399.
  • M. Iddrisu, K. Takyi, R.-M. O. M. Gyening, K. O. Peasah, L. A. Banning, and K. Owusu-Agyemang, “An improved man-in-the-middle (MITM) attack detections using convolutional neural networks,” Multidiscip. Sci. J., vol. 7, no. 3, p. 2025129, 2025.
  • E. S. Shombot, G. Dusserre, R. Bestak, and N. B. Ahmed, “An application for predicting phishing attacks: A case of implementing a support vector machine learning model,” Cyber Secur. Appl., vol. 2, p. 100036, 2024.
  • M. Irsan, F. Febriana, H. H. Nuha, and H. R. P. Sailellah, “Phishing Detection on URL Data Using K-Nearest Neighbors Method,” in 2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 2024, pp. 792–797.
  • P. R. Uyyala, “Phishing email detection using CNN,” J. Eng. Technol. Manag., vol. 72, pp. 1046–1051, 2024.
  • B. B. Gupta, A. Gaurav, R. W. Attar, and V. Arya, “A Novel Cuckoo Search-Based Optimized Deep CNN Model for Phishing Attack Detection in IoT Environment,” 2024.
  • R. D. N. Shakya, D. N. S. Dharmaratne, and M. Sandirigama, “Detection of SQL Injection Attacks Using Machine Learning Techniques,” in 2024 International Conference on Electrical, Communication and Computer Engineering (ICECCE), 2024, pp. 1–6.
  • H. C. Altunay, “Detection of SQL Injection Attacks Using Machine Learning Algorithms Based on NLP-Based Feature Extraction,” in 2024 9th International Conference on Computer Science and Engineering (UBMK), 2024, pp. 468–472.
  • M. Thilakraj, S. Anupriya, M. M. Cibi, and A. Divya, “Detection of SQL Injection Attacks,” in 2024 International Conference on Inventive Computation Technologies (ICICT), 2024, pp. 1515–1520.
  • W. Zhao, J. You, and Q. Chen, “SQL Injection Attack Detection Based on Text-CNN,” in Proceedings of the 2024 International Conference on Generative Artificial Intelligence and Information Security, 2024, pp. 292–296.
  • M. Shahbaz, G. Mumtaz, S. Zubair, and M. Rehman, “Evaluating CNN Effectiveness in SQL Injection Attack Detection,” J. Comput. \& Biomed. Informatics, vol. 7, no. 02, 2024.
  • M. S. Saadoon and S. F. Behadili, “Malicious network dataset,” 2024, Zenodo. doi: 10.5281/ZENODO.14559922.

Classification of Malicious Network Dataset With Residual CNN

Year 2025, Volume: 14 Issue: 1, 597 - 609, 26.03.2025
https://doi.org/10.17798/bitlisfen.1622548

Abstract

In this study, a model on network security is proposed and a method is suggested for data protection, integrity, and communication continuity. Network security is becoming more and more important every day as the digital world develops. It is aimed at classifying the data labeled as good and bad in the ready dataset. In the proposed model, first of all, all the information in the dataset is digitized. Then, it is normalized to the range of 0-1 and made ready as an input to the proposed architecture. It is aimed to classify the information in this two-class dataset with the proposed Residual CNN architecture. The accuracy rate obtained after the training and testing stages of the model is 94.9%. This accuracy rate shows that the proposed model successfully results in the detection of malicious packets in network attacks and can be used for network security.

Ethical Statement

The study is complied with research and publication ethics.

References

  • Aweya J. "IP router architectures: an overview." Int. J. Commun. Syst., vol. 14, no. 5, pp. 447–475, 2001..
  • G. Femenias, N. Lassoued, and F. Riera-Palou, “Access point switch ON/OFF strategies for green cell-free massive MIMO networking,” IEEE Access, vol. 8, pp. 21788–21803, 2020.
  • J. Mirkovic and P. Reiher, “A taxonomy of DDoS attack and DDoS defense mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39–53, 2004.
  • B. Pingle, A. Mairaj, and A. Y. Javaid, “Real-world man-in-the-middle (MITM) attack implementation using open source tools for instructional use,” in Proc. 2018 IEEE Int. Conf. Electro/Information Technology (EIT), Rochester, MI, USA, 2018, pp. 192–197.
  • S. Gupta, A. Singhal, and A. Kapoor, “A literature survey on social engineering attacks: Phishing attack,” in 2016 international conference on computing, communication and automation (ICCCA), 2016, pp. 537–540.
  • R. Rawat and S. K. Shrivastav, “SQL injection attack detection using SVM,” Int. J. Comput. Appl., vol. 42, no. 13, pp. 1–4, 2012.
  • K. Lee, J. Kim, K. H. Kwon, Y. Han, and S. Kim, “DDoS attack detection method using cluster analysis,” Expert Syst. Appl., vol. 34, no. 3, pp. 1659–1665, 2008.
  • J. Ye, X. Cheng, J. Zhu, L. Feng, and L. Song, “A DDoS attack detection method based on SVM in software defined network,” Secur. Commun. Networks, vol. 2018, no. 1, p. 9804061, 2018.
  • U. Ince and G. Karaduman, “Classification of Distributed Denial of Service Attacks Using Machine Learning Methods,” NATURENGS, vol. 5, no. 1, pp. 15–20, 2024.
  • M. A. Al-Shareeda, S. Manickam, and M. A. Saare, “DDoS attacks detection using machine learning and deep learning techniques: Analysis and comparison,” Bull. Electr. Eng. Informatics, vol. 12, no. 2, pp. 930–939, 2023.
  • A. R. Shaaban, E. Abd-Elwanis, and M. Hussein, “DDoS attack detection and classification via Convolutional Neural Network (CNN),” in 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS), 2019, pp. 233–238.
  • A. A. Najar, M. N. Sugali, F. R. Lone, and A. Nazir, “A novel CNN-based approach for detection and classification of DDoS attacks,” Concurr. Comput. Pract. Exp., vol. 36, no. 19, p. e8157, 2024.
  • A. A. Najar and S. M. Naik, “Cyber-secure SDN: A CNN-based approach for efficient detection and mitigation of DDoS attacks,” Comput. \& Secur., vol. 139, p. 103716, 2024.
  • C. Padmavathy et al., “1D CNN Based Model for Detection of DDoS Attack,” in 2024 2nd International Conference on Device Intelligence, Computing and Communication Technologies (DICCT), 2024, pp. 1–6.
  • A. Kumar, I. Sharma, S. Mittal, and others, “Enhancing Security through a Machine Learning Approach to Mitigate Man-in-the-Middle Attacks,” in 2024 IEEE 9th International Conference for Convergence in Technology (I2CT), 2024, pp. 1–6.
  • K. V. Rao, B. R. Akshaya, G. G. Satvik, B. Rohith, and G. C. B. Lahari, “Machine Learning based Man-in-the-Middle Attack Prediction,” in 2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), 2024, pp. 1393–1399.
  • M. Iddrisu, K. Takyi, R.-M. O. M. Gyening, K. O. Peasah, L. A. Banning, and K. Owusu-Agyemang, “An improved man-in-the-middle (MITM) attack detections using convolutional neural networks,” Multidiscip. Sci. J., vol. 7, no. 3, p. 2025129, 2025.
  • E. S. Shombot, G. Dusserre, R. Bestak, and N. B. Ahmed, “An application for predicting phishing attacks: A case of implementing a support vector machine learning model,” Cyber Secur. Appl., vol. 2, p. 100036, 2024.
  • M. Irsan, F. Febriana, H. H. Nuha, and H. R. P. Sailellah, “Phishing Detection on URL Data Using K-Nearest Neighbors Method,” in 2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 2024, pp. 792–797.
  • P. R. Uyyala, “Phishing email detection using CNN,” J. Eng. Technol. Manag., vol. 72, pp. 1046–1051, 2024.
  • B. B. Gupta, A. Gaurav, R. W. Attar, and V. Arya, “A Novel Cuckoo Search-Based Optimized Deep CNN Model for Phishing Attack Detection in IoT Environment,” 2024.
  • R. D. N. Shakya, D. N. S. Dharmaratne, and M. Sandirigama, “Detection of SQL Injection Attacks Using Machine Learning Techniques,” in 2024 International Conference on Electrical, Communication and Computer Engineering (ICECCE), 2024, pp. 1–6.
  • H. C. Altunay, “Detection of SQL Injection Attacks Using Machine Learning Algorithms Based on NLP-Based Feature Extraction,” in 2024 9th International Conference on Computer Science and Engineering (UBMK), 2024, pp. 468–472.
  • M. Thilakraj, S. Anupriya, M. M. Cibi, and A. Divya, “Detection of SQL Injection Attacks,” in 2024 International Conference on Inventive Computation Technologies (ICICT), 2024, pp. 1515–1520.
  • W. Zhao, J. You, and Q. Chen, “SQL Injection Attack Detection Based on Text-CNN,” in Proceedings of the 2024 International Conference on Generative Artificial Intelligence and Information Security, 2024, pp. 292–296.
  • M. Shahbaz, G. Mumtaz, S. Zubair, and M. Rehman, “Evaluating CNN Effectiveness in SQL Injection Attack Detection,” J. Comput. \& Biomed. Informatics, vol. 7, no. 02, 2024.
  • M. S. Saadoon and S. F. Behadili, “Malicious network dataset,” 2024, Zenodo. doi: 10.5281/ZENODO.14559922.
There are 27 citations in total.

Details

Primary Language English
Subjects Artificial Intelligence (Other), Network Engineering
Journal Section Research Article
Authors

Mücahit Karaduman 0000-0002-8087-4044

Sercan Yalçın 0000-0003-1420-2490

Muhammed Yıldırım 0000-0003-1866-4721

Publication Date March 26, 2025
Submission Date January 18, 2025
Acceptance Date March 10, 2025
Published in Issue Year 2025 Volume: 14 Issue: 1

Cite

IEEE M. Karaduman, S. Yalçın, and M. Yıldırım, “Classification of Malicious Network Dataset With Residual CNN”, Bitlis Eren Üniversitesi Fen Bilimleri Dergisi, vol. 14, no. 1, pp. 597–609, 2025, doi: 10.17798/bitlisfen.1622548.

Bitlis Eren University
Journal of Science Editor
Bitlis Eren University Graduate Institute
Bes Minare Mah. Ahmet Eren Bulvari, Merkez Kampus, 13000 BITLIS