• About Us
  • Contact Us
  • Cookie policy (EU)
  • Home
  • Privacy Policy
  • Video
  • Write for us
Today Headline
  • HOME
  • NEWS
    • POLITICS
    • News for today
    • Borisov news
  • FINANCE
    • Business
    • Insurance
  • Video
  • TECHNOLOGY
  • ENTERPRISE
  • LIFESTYLE
    • TRAVEL
    • HEALTH
    • ENTERTAINMENT
  • AUTOMOTIVE
  • SPORTS
  • Travel and Tourism
  • HOME
  • NEWS
    • POLITICS
    • News for today
    • Borisov news
  • FINANCE
    • Business
    • Insurance
  • Video
  • TECHNOLOGY
  • ENTERPRISE
  • LIFESTYLE
    • TRAVEL
    • HEALTH
    • ENTERTAINMENT
  • AUTOMOTIVE
  • SPORTS
  • Travel and Tourism
No Result
View All Result
TodayHeadline
No Result
View All Result

A deep learning technique to generate DSN amplification attacks

July 14, 2022
in Technology
0
A deep learning technique to generate DSN amplification attacks
0
SHARES
7
VIEWS
Share on FacebookShare on Twitter


A deep learning technique to generate DSN amplification attacks

Diagram outlining the structure of the team’s experiment. Credit: Mathews et al.

Deep learning techniques have recently proved to be highly promising for detecting cybersecurity attacks and determining their nature. Concurrently, many cybercriminals have been devising new attacks aimed at interfering with the functioning of various deep learning tools, including those for image classification and natural language processing.

Perhaps the most common among these attacks are adversarial attacks, which are designed to “fool” deep learning algorithms using data that has been modified, prompting them to classify it incorrectly. This can lead to the malfunctioning of many applications, biometric systems, and other technologies that operate through deep learning algorithms.

Several past studies have shown the effectiveness of different adversarial attacks in prompting deep neural networks (DNNs) to make unreliable and false predictions. These attacks include the Carlini & Wagner attack, the Deepfool attack, the fast gradient sign method (FGSM) and the Elastic-Net attack (ENA).

Researchers at the Citadel have recently developed a DNN that can detect a type of cyberattack known as distributed denial of service (DDoS) DSN amplification, and then used two different algorithms to generate adversarial examples that could trick their DNN. Their findings, published in a paper pre-published on arXiv, further confirm the unreliability of deep learning methods for DSN attack detection and their vulnerability to adversarial attacks.

DDoS DSN amplification attacks exploit vulnerabilities of domain name system (DNS) servers to amplify the queries made to them, ultimately flooding them with information and bringing the servers down. These attacks can cause significant disruption to online services, including those run by both small and big multinational companies.

Over the past few years, computer scientists have developed several deep learning techniques that can detect DDoS DSN amplification attacks. Nonetheless, the team at the Citadel showed that these techniques could be circumvented using adversarial networks.

“Much of the current work in the field of adversarial learning has been conducted in image processing and natural language processing with a wide variety of algorithms,” Jared Mathews and his colleagues wrote in their paper. “Two algorithms of interest are the Elastic-Net Attack on Deep Neural Networks (EAD) and TextAttack.”

EAD and TextAttack are two algorithms that have proved to be particularly good at creating tampered data that would be misclassified by DNNs. Mathews and his colleagues thus developed a technique for detecting DDOS DSN amplification attacks and then tried to fool it using adversarial data generated by the EAD and TextAttack algorithms.

“In our experiment the EAD and TextAttack algorithms are applied to a Domain Name System amplification classifier,” the researchers wrote in their paper. “The algorithms are used to generate malicious DDoS adversarial examples to then feed as inputs to the network intrusion detection systems neural network to classify as valid traffic.”

In their tests, Mathews and his colleagues found that the adversarial data generated by EAD and TextAttack could fool their DNN for DDoS DSN amplification attack detection 100% and 67.63% of the time, respectively. These results thus highlight the significant flaws and vulnerabilities of existing deep learning-based methods for detecting these attacks.

“We show that both image processing and natural language processing adversarial learning algorithms can be applied against a network intrusion detection neural network,” the researchers wrote in their paper.

In the future, the work by this team of researchers at the Citadel could inspire the development of more effective tools for detecting DDoS DSN amplification attacks, which can detect adversarial data and correctly classify it. In their next studies, the researchers plan to test the effectiveness of adversarial attacks on a particular type of algorithms for detecting DNS amplification attacks, those targeting the so-called constrained application protocol (CoAP) used by many IoT devices.


Fooling deep neural networks for object detection with adversarial 3-D logos


More information:
Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance, A deep learning approach to create DSN amplification attacks. arXiv:2206.14346v1 [cs.CR]arxiv.org/abs/2206.14346

© 2022 Science X Network

Citation:
A deep learning technique to generate DSN amplification attacks (2022, July 14)
retrieved 14 July 2022
from https://techxplore.com/news/2022-07-deep-technique-dsn-amplification.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.

Tags: amplificationattacksdeepDSNgenerateLearningtechnique
Previous Post

Monkeypox Treatment in Limited Supply as Cases Soar

Next Post

Oswestry: Village post office in Kinnerley up for sale

Related Posts

Can WhatsApp messages be secure and encrypted—but traceable at same time?
Technology

Can WhatsApp messages be secure and encrypted—but traceable at same time?

Cryptographer and computer scientist Mayank...

Read more
A flexible, rod-driven soft robot for biomedical applications
Technology

A flexible, rod-driven soft robot for biomedical applications

Structure of the rod-driven soft...

Read more
Deepfakes expose vulnerabilities in certain facial recognition technology
Technology

Deepfakes expose vulnerabilities in certain facial recognition technology

Credit: Pixabay/CC0 Public Domain Mobile...

Read more
Prediction of human movement during disasters could allow for more effective emergency response
Technology

Prediction of human movement during disasters could allow for more effective emergency response

Credit: Unsplash/CC0 Public Domain The...

Read more
Researchers mitigate potential side-channel attack vulnerability in multicore processors
Technology

Researchers mitigate potential side-channel attack vulnerability in multicore processors

MIT researchers have shown that...

Read more
Load More
Next Post
Oswestry: Village post office in Kinnerley up for sale

Oswestry: Village post office in Kinnerley up for sale

  • Trending
  • Comments
  • Latest
Six times actors really romped in sex scenes that make 365 DNI look tame

Six times actors really romped in sex scenes that make 365 DNI look tame

Strictly: Ofcom assessing Steve Allen’s Tilly Ramsay comments

Strictly: Ofcom assessing Steve Allen’s Tilly Ramsay comments

What are the leaked photos of Kobe Bryant at the helicopter crash site?

What are the leaked photos of Kobe Bryant at the helicopter crash site?

Trisha Paytas Destroyed The Internet By Posting Her Toilet Paper Asshole

Trisha Paytas Destroyed The Internet By Posting Her Toilet Paper Asshole

Supreme Court striking down gun law makes New Yorkers "less safe," NYC Mayor Eric Adams says

Chilling new film offers a provocative reminder of evil

Chilling new film offers a provocative reminder of evil

Creative spaces: seven ways the new retail world is making life more real | How retail got real

Creative spaces: seven ways the new retail world is making life more real | How retail got real

Fans are all saying the same thing as Man Utd transfer target Antony scores wonder goal for Ajax

Fans are all saying the same thing as Man Utd transfer target Antony scores wonder goal for Ajax

About Us

Todayheadline the independent news and topics discovery
A home-grown and independent news and topic aggregation . displays breaking news linking to news websites all around the world.

Follow Us

Latest News

Supreme Court striking down gun law makes New Yorkers "less safe," NYC Mayor Eric Adams says

Chilling new film offers a provocative reminder of evil

Chilling new film offers a provocative reminder of evil

Supreme Court striking down gun law makes New Yorkers "less safe," NYC Mayor Eric Adams says

Chilling new film offers a provocative reminder of evil

Chilling new film offers a provocative reminder of evil

Creative spaces: seven ways the new retail world is making life more real | How retail got real

Creative spaces: seven ways the new retail world is making life more real | How retail got real

  • Real Estate
  • Education
  • Parenting
  • Cooking
  • NFL Games On TV Today
  • Travel and Tourism
  • Home & Garden
  • Pets
  • Privacy & Policy
  • Contact
  • About

© 2021 All rights are reserved Todayheadline

No Result
View All Result
  • Real Estate
  • Education
  • Parenting
  • Cooking
  • NFL Games On TV Today
  • Travel and Tourism
  • Home & Garden
  • Pets
  • Privacy & Policy
  • Contact
  • About

© 2021 All rights are reserved Todayheadline

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist