Dataconomy
  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
Subscribe
No Result
View All Result
Dataconomy
  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Deep learning can be used to detect DNS amplification attacks

by Kerem Gülen
July 26, 2022
in News, Cybersecurity
Home News
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Researchers from Citadel developed a deep learning method to generate DNS amplification attacks. Deep learning algorithms have lately been shown to be quite effective at identifying and preventing cybersecurity assaults. Various deep learning techniques, such as those used for image classification and natural language processing, have been the target of numerous cybercriminals’ recent development of new attacks.

The most common of these strategies are adversarial attacks, which use altered data to deceive deep learning algorithms into categorizing it incorrectly. This could lead to the failure of numerous deep learning-based apps, biometric systems, and other systems. Researchers are creating new cybersecurity measures every day but protecting data has never been harder. For instance, a “tech NATO” is needed to guard cyber borders, according to Darktrace CEO.

Detecting DDoS DNS amplification attacks

Numerous earlier studies have demonstrated how various adversarial assaults can cause deep neural networks (DNNs) to deliver erroneous and inaccurate predictions. These assaults consist of the Elastic-Net attack, the fast gradient sign technique (FGSM), the Carlini & Wagner attack, and the Deepfool attack (ENA).

Researchers from Citadel developed a deep learning method to generate DNS amplification attacks.
Researchers built a DNN that can recognize DDoS DNS amplification attacks.

Recently, Citadel researchers built a DNN that can recognize a specific type of cyberattack called distributed denial of service (DDoS) DNS amplification, and they then used two distinct ways to create adversarial samples that can trick their DNN. Their findings, which were preliminary published on arXiv, show how inadequate deep learning systems are at detecting DNS intrusions and how vulnerable they are to adversarial attacks.

DDoS DNS amplification attacks amplify requests sent to DNS servers by exploiting their vulnerabilities in order to overwhelm the systems with data and bring them down. These attacks could seriously impede the internet services offered by big and small international companies alike.


Join the Partisia Blockchain Hackathon, design the future, gain new skills, and win!


Recent years have seen the development of deep learning systems for detecting DDoS DNS amplification attacks. However, the Citadel team showed that by using adversarial networks, these strategies might be avoided.

Researchers from Citadel developed a deep learning method to generate DNS amplification attacks.
Deep learning systems for detecting DDoS DNS amplification attacks are being developed in recent years.

“Much of the current work in the field of adversarial learning has been conducted in image processing and natural language processing with a wide variety of algorithms. Two algorithms of interest are the Elastic-Net Attack on Deep Neural Networks (EAD) and TextAttack,” Mathews and his colleagues stated in their study.

Techniques like Elastic-Net Attack (EAD) and TextAttack have proven to be quite successful in generating corrupted data that DNNs would mistakenly classify. Using adversarial data generated by the EAD and TextAttack methods, Jared Mathews and his colleagues tried to fool a system by spotting DDoS DNS amplification attacks.

“In our experiment the EAD and TextAttack algorithms are applied to a Domain Name System amplification classifier. The algorithms are used to generate malicious DDoS adversarial examples to then feed as inputs to the network intrusion detection systems neural network to classify as valid traffic,” the researchers stated.

Researchers from Citadel developed a deep learning method to generate DNS amplification attacks.
Adversarial data provided by EAD and TextAttack could fool the DNN for a DDoS DNS amplification attack detection system.

In their trials, Mathews and his coworkers found that the adversarial data provided by EAD and TextAttack could fool their DNN for DDoS DNS amplification attack detection 100% of the time and 67.63% of the time, respectively. These results highlight significant shortcomings and vulnerabilities in the current deep learning-based systems for detecting these intrusions.

“We show that both image processing and natural language processing adversarial learning algorithms can be applied against a network intrusion detection neural network,” the researchers stated.

Future systems for detecting DDoS DNS amplification attacks that can identify and classify hostile material may be inspired by the work of this Citadel team of researchers. In their further investigations, the researchers plan to assess the effectiveness of adversarial attacks on a particular method for recognizing DNS amplification attacks targeting the so-called limited application protocol (CoAP) used by IoT devices. Before leaving, don’t forget to check out the best cybersecurity practices for staying safe against today’s digital perils!

Tags: Cyber AttacksCybersecurityDDoSDeep learningdns

Related Posts

What is a computer worm?

The silent spreaders: How computer worms can sneak into your system undetected?

March 20, 2023
Can Komo AI be the alternative to Bing?

Can Komo AI be the alternative to Bing?

March 17, 2023
GPT-4 powered LinkedIn AI assistant explained. Learn how to use LinkedIn writing suggestions for headlines, summaries, and job descriptions.

LinkedIn AI won’t take your job but will help you find one

March 16, 2023
OpenAI released GPT-4, the highly anticipated successor to ChatGPT

OpenAI released GPT-4, the highly anticipated successor to ChatGPT

March 15, 2023
What is Reimagine Home AI with examples? Learn how to use Reimagine Home AI and find out how AI can help interior designers. Keep reading...

Reimagine Home AI wants to redesign your home

March 15, 2023
How to use Visual ChatGPT? Explore Visual ChatGPT examples. Microsoft isn't just working on it, GPT-4 release date is coming soon too!

Visual ChatGPT brings AI image generation to the popular chatbot

March 15, 2023

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

LATEST ARTICLES

Microsoft 365 Copilot is more than just a chatbot

The silent spreaders: How computer worms can sneak into your system undetected?

Mastering the art of storage automation for your enterprise

Can Komo AI be the alternative to Bing?

LinkedIn AI won’t take your job but will help you find one

Where does your data go: Inside the world of blockchain storage

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy
  • Partnership
  • Writers wanted

Follow Us

  • News
  • AI
  • Big Data
  • Machine Learning
  • Trends
    • Blockchain
    • Cybersecurity
    • FinTech
    • Gaming
    • Internet of Things
    • Startups
    • Whitepapers
  • Industry
    • Energy & Environment
    • Finance
    • Healthcare
    • Industrial Goods & Services
    • Marketing & Sales
    • Retail & Consumer
    • Technology & IT
    • Transportation & Logistics
  • Events
  • About
    • About Us
    • Contact
    • Imprint
    • Legal & Privacy
    • Newsletter
    • Partner With Us
    • Writers wanted
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.