Show simple item record

dc.contributor.authorWanjau, Stephen K.
dc.contributor.authorWambugu, Geoffrey M
dc.contributor.authorKamau, Gabriel N.
dc.date.accessioned2021-01-19T06:39:43Z
dc.date.available2021-01-19T06:39:43Z
dc.date.issued2021-01
dc.identifier.citationInternational Journal of Computer Applications Technology and Research Volume 10–Issue 01, 42-50, 2021, ISSN:-2319–8656en_US
dc.identifier.issn2319–8656
dc.identifier.urihttp://hdl.handle.net/123456789/4504
dc.description.abstractThe rising number of malicious threats on computer networks and Internet services owing to a large number of attacks makes the network security be at incessant risk. One of the predominant network attacks that poses distressing threats to networks security are the brute force attacks. A brute force attack uses a trial and error algorithm to decode encrypted data such as passwords or Data Encryption Standard keys, through exhaustive effort (using brute force) rather than using intellectual strategies. Brute force attacks resemble legitimate network traffic, making it difficult to defend an organization that rely mainly on perimeter-based security solutions a major challenge. For stopping the occurrence of such attacks, several curable steps must be taken. This paper proposes an efficient mechanism for SSH-Brute force network attacks detection based on a supervised deep learning algorithm, Convolutional Neural Network. The model performance was compared with experimental results from 5 classical machine learning algorithms including Naive Bayes, Logistic Regression, Decision Tree, k-Nearest Neighbour, and Support Vector Machine. Four standard metrics namely, Accuracy, Precision, Recall, and the F-measure were used. Results show that the CNN-based model is superior to the traditional machine learning methods with 94.3% accuracy, a precision rate of 92.5%, recall rate of 97.8% and F1-score of 91.8% in terms of the ability to detect SSH-Brute force attacks..en_US
dc.language.isoenen_US
dc.subjectConvolutional Neural Networken_US
dc.subjectDeep Learningen_US
dc.subjectFeature Selectionen_US
dc.subjectNetwork Securityen_US
dc.subjectOccam’s razor principleen_US
dc.subjectSSH Brute forceen_US
dc.titleSSH-Brute Force Attack Detection Model based on Deep Learningen_US
dc.typeArticleen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record