Combating TCP Port Scan Attacks Using Sequential Neural Networks
Combating TCP Port Scan Attacks Using Sequential Neural Networks
Problem Identification
Objectives
Domain Area
• Technology and Domain
• Dataset, Tools (Front End and Back End)
• Budget
Reference
2
ABSTRACT
1. Background
2. Motivation
3. Problem Identification
4. Research Objectives
INTRODUCTION
BACKGROUND: The text provides background information about a study that aims to detect
TCP port scans using neural networks. The authors describe their approach, which involves
training two neural networks: one to classify general packet categories and another to classify
TCP messages. The TCP classifier is specifically designed to detect TCP port scans by
analyzing flag patterns in the TCP messages. The authors provide details on the architecture
of the neural networks, the datasets used for training and testing, and the evaluation metrics
used to assess the accuracy of the classifiers. The authors also discuss some of the
challenges associated with detecting TCP port scans and highlight the benefits of using
neural networks compared to rule-based approaches.
PROBLEM :The problem is that TCP port scan attacks can compromise computer systems by identifying
vulnerabilities and allowing attackers to gain unauthorized access. Current methods for detecting port
scan attacks are often inefficient or require significant resources.
The solution proposed in this paper is to use sequential neural networks, which can analyze network
traffic in real-time and identify patterns associated with port scan attacks. By using this approach,
network administrators can quickly detect and respond to port scan attacks, reducing the risk of a
successful cyberattack.
MOTIVATION:
1. The motivation behind the development of a solution for combating TCP port scan attacks using
sequential neural networks is to address the increasing threat of cyber attacks on computer
networks. TCP port scan attacks are one of the most common types of attacks, and they can be used
to gather information about vulnerable systems or launch more sophisticated attacks.
2. Traditional methods of detecting and preventing these attacks often rely on rule-based or signature-
based approaches, which can be limited in their ability to detect new and sophisticated attacks. This
is where the application of sequential neural networks can be beneficial, as they can analyze
network traffic in real-time and identify patterns that may indicate a port scan attack.
3. The development of a solution for combating TCP port scan attacks using sequential neural
networks can help to improve the security of computer networks and protect against cyber threats. It
can also provide a more automated and efficient approach to detecting and preventing attacks,
allowing for faster response times and reduced risk of damage to critical systems and data.
RESEARCH OBJECTIVES:
Budget: The budget for a research project can depend on various factors such as the
scope of the project, resources required, equipment and materials needed,
personnel costs, and so on. It would be best to consult with a project manager or
research team to determine a suitable budget for a specific project.
METHODOLOGY:
• Data Collection: The first step is to collect data on TCP port scan attacks. This data
will be used to train the Sequential Neural Network (SNN) model. The dataset used
in this research will be the KDD Cup 1999 dataset, which is a widely used dataset
in the field of network intrusion detection.
• Preprocessing: The collected dataset will be preprocessed to remove any irrelevant
features and to normalize the data. This step is essential to ensure that the model
can learn from the data efficiently.
• Training: The preprocessed dataset will be used to train the SNN model. The
model will be trained using the backpropagation algorithm, which is a widely used
algorithm for training neural networks.
• Validation: After training, the model will be validated using a separate
dataset to ensure that it is performing accurately. The performance of the
model will be evaluated using various metrics such as accuracy, precision,
recall, and F1-score.
• Testing: The final step is to test the performance of the SNN model on a real-time
network. The model will be integrated into an intrusion detection system and will
be tested on various TCP port scan attacks.The performance of the model will be
compared with existing methods to evaluate its effectiveness.
The tools used in this research include Python for coding, TensorFlow and Keras for
developing the SNN model, and Scikit-learn for data preprocessing and validation.
The front-end of the intrusion detection system will be developed using a web-based
interface, while the back-end will be developed using Python and Flask.
The budget for this research will be allocated towards the cost of computing resources,
data storage, and software licenses.
EXPECTED OUTPUT
CONCLUSION :