An Algorithm for Detecting Brute Force Attacks on FTP and SSH Services Utilizing Deep Learning with Probabilistic Neural Networks (PNN)

Main Article Content

Hanadi Alosimy
Jawaher AlZaidi
Samah H. Alajmani
Ben Soh

Abstract

Brute force attacks remain one of the most prevalent and effective methods cybercriminals use to gain unauthorized access to networks and systems. These attacks involve systematically attempting various password or key combinations until the correct one is identified, often targeting critical services such as FTP (File Transfer Protocol) and SSH (Secure Shell). The consequences of these attacks can be severe, including data breaches, financial losses, and reputational damage. Intrusion Detection Systems (IDS) play a crucial role in mitigating these threats by monitoring network traffic and identifying malicious activities. However, traditional IDS methods - such as signaturebased detection and anomaly detection - struggle to detect emerging and evolving threats. To address these challenges, this study presents an advanced detection model utilizing deep learning techniques, specifically a Probabilistic Neural Network (PNN), to identify brute force attacks on FTP and SSH protocols. The model is trained and evaluated using the CICIDS2018 dataset, with the Bat Optimization Algorithm employed to fine-tune parameters and enhance performance. The proposed model achieves remarkable results, with an accuracy of 99.968%, precision of 99.949%, recall of 99.986%, and an F1-score of 99.968%. These findings highlight the model's potential as a highly effective tool for strengthening network security and preventing unauthorized access.

Downloads

Download data is not yet available.

Article Details

Section

Articles

How to Cite

[1]
Hanadi Alosimy, Jawaher AlZaidi, Samah H. Alajmani, and Ben Soh , Trans., “An Algorithm for Detecting Brute Force Attacks on FTP and SSH Services Utilizing Deep Learning with Probabilistic Neural Networks (PNN)”, IJRTE, vol. 13, no. 6, pp. 1–9, Mar. 2025, doi: 10.35940/ijrte.E8187.13060325.
Share |

References

Kolekar, V. K., & Vaidya, M. B. (2016). Click and session based - Captcha as graphical password authentication schemes for smart phone and web. Proceedings - IEEE International Conference on Information Processing, ICIP 2015. https://doi.org/10.1109/INFOP.2015.7489467

Liao, H. J., Richard Lin, C. H., Lin, Y. C., & Tung, K. Y. (2013). Intrusion detection system: A comprehensive review. In Journal of Network and Computer Applications (Vol. 36, Issue 1). https://doi.org/10.1016/j.jnca.2012.09.004

Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1). https://doi.org/10.1002/ett.4150

Aldallal, A., & Alisa, F. (2021). Effective intrusion detection system to secure data in the cloud using machine learning. Symmetry, 13(12). https://doi.org/10.3390/sym13122306

Xu, C., Shen, J., Du, X., & Zhang, F. (2018). An Intrusion Detection System Using a Deep Neural Network with Gated Recurrent Units. IEEE Access, 6. https://doi.org/10.1109/ACCESS.2018.2867564

Elsherif, A. (2018). Automatic Intrusion Detection System Using Deep Recurrent Neural Network Paradigm. Journal of Information Security and Cybercrimes Research. https://doi.org/10.26735/16587790.2018.003.

Panwar, S. S., Negi, P. S., Panwar, L. S., & Raiwani, Y. P. (2019). Implementation of machine learning algorithms on the cicids-2017 dataset for intrusion detection using WEKA. International Journal of Recent Technology and Engineering, 8(3), 2195–2207. https://doi.org/10.35940/ijrte.C4587.098319

Kasongo, S. M., & Sun, Y. (2019). A deep learning method with filter-based feature engineering for wireless intrusion detection system. IEEE Access, 7. https://doi.org/10.1109/ACCESS.2019.2905633

Al-Emadi, S., Al-Mohannadi, A., & Al-Senaid, F. (2020). Using Deep Learning Techniques for Network Intrusion Detection. 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020. https://doi.org/10.1109/ICIoT48696.2020.9089524

Saraeian, S., & Golchi, M. M. (2020). Application of Deep Learning Technique in an Intrusion Detection System. International Journal of Computational Intelligence and Applications, 19(2). https://doi.org/10.1142/S1469026820500169

Liu, C., Gu, Z., & Wang, J. (2021). A Hybrid Intrusion Detection System Based on Scalable K-Means+ Random Forest and Deep Learning. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3082147

Aldallal, A. (2022). Toward Efficient Intrusion Detection System Using Hybrid Deep Learning Approach. Symmetry, 14(9). https://doi.org/10.3390/sym14091916

Ahmad, T., Truscan, D., Vain, J., & Porres, I. (2022). Early Detection of Network Attacks Using Deep Learning. Proceedings - 2022 IEEE 14th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2022. https://doi.org/10.1109/ICSTW55395.2022.00020

Kasongo, S. M. (2023). A deep learning technique for intrusion detection system using a Recurrent Neural Networks-based framework. Computer Communications, 199. https://doi.org/10.1016/j.comcom.2022.12.010

Henry, A., Gautam, S., Khanna, S., Rabie, K., Shongwe, T., Bhattacharya, P., Sharma, B., & Chowdhury, S. (2023). Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System. Sensors, 23(2). https://doi.org/10.3390/s23020890

Alotibi, N., & Alshammari, M. (2023). Deep Learning-based Intrusion Detection: A Novel Approach for Identifying Brute-Force Attacks on FTP and SSH Protocol. International Journal of Advanced Computer Science and Applications, 14(6). https://doi.org/10.14569/IJACSA.2023.0140612

Hamza, A. A., & Al-Janabi, R. J. surayh. (2024). Detecting Brute Force Attacks Using Machine Learning. BIO Web of Conferences, 97. https://doi.org/10.1051/bioconf/20249700045

Hanif, A. Al, & Ilyas, M. (2024). Enhance the Detection of DoS and Brute Force Attacks within the MQTT Environment Through Feature Engineering and Employing an Ensemble Technique. International Journal of Artificial Intelligence & Applications, 15(4), 01–19. https://doi.org/10.5121/ijaia.2024.15401

Chang, D. T. (2021). Probabilistic Deep Learning with Probabilistic Neural Networks and Deep Probabilistic Models. https://doi.org/10.48550/arXiv.2106.00120

Alarfaj, F. K., & Khan, N. A. (2023). Enhancing the Performance of SQL Injection Attack Detection through Probabilistic Neural Networks. Applied Sciences (Switzerland), 13(7). https://doi.org/10.3390/app13074365

Zhao, G., Zhang, C., & Zheng, L. (2017). Intrusion detection using deep belief network and probabilistic neural network. Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017, 1. https://doi.org/10.1109/CSE-EUC.2017.119

Yang, X. S. (2010). A new metaheuristic Bat-inspired Algorithm. Studies in Computational Intelligence, 284. https://doi.org/10.1007/978-3-642-12538-6_6

Mezina, A., Burget, R., & Travieso-Gonzalez, C. M. (2021). Network Anomaly Detection with Temporal Convolutional Network and U-Net Model. IEEE Access, 9. https://doi.org/10.1109/ACCESS.2021.3121998

S, K., N, Dr. U. M., & R, Dr. V. (2020). An Intrusion Detection System Techniques and Algorithms of Machine and Deep L earning. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 10, pp. 370–376). DOI: https://doi.org/10.35940/ijitee.J7541.0891020

Bai, Dr. A., Devi, Dr. R. D. H., & Mohana, Dr. R. M. (2019). High Performance Network Intrusion Detection System. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 3749–3753). DOI: https://doi.org/10.35940/ijeat.A1975.129219

Rathore, R., & Shrivastava, Dr. N. (2023). Network Anomaly Detection System using Deep Learning with Feature Selection Through PSO. In International Journal of Emerging Science and Engineering (Vol. 11, Issue 5, pp. 1–6). DOI: https://doi.org/10.35940/ijese.F2531.0411523

Latha, S., & Prakash, Dr. V. S. J. (2019). Optimization of Rules for Intrusion Detection System (Org-Ids). In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 3, pp. 1356–1361). DOI: https://doi.org/10.35940/ijrte.B3373.098319

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 > >>