A Study on Proposed Distributed Attack Detection Algorithm Using Experimental and Simulation Analysis
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract: The attack detection rates are higher for large node deployment densities, as compared to the low density counterparts. This is because the attack detection scheme relies on both the individual traffic observations by the detector nodes, as well as the subsequent verification and reconstruction of observed traffic sub patterns by the detector nodes as well as the mGN nodes, for classification purposes. In this work, we evaluated the performance of our proposed distributed attack detection scheme, through experiments andsimulation analysis. The scheme proposed, performs distributed denial of service attack detection, in the presence of injected nodes, inclusive of laptop-class nodes, in the network. As part of the detection process, detector nodes monitor network traffic flow towards a set of victim nodes, and further, reconstruct patterns of observed network traffic, to facilitate attack decision making. The performance of the scheme is affected by several algorithmic as well as network parameters, which need to be defined, at network initialization time. We studied the effect of variation of these algorithmic and network-level parameters on the outcomes of the proposed attack detection scheme. We quantified the results obtained for variations in these parameter values,based on simulation experiments. The metrics that are compared and analyzed as part of the simulation experiment are: attack detection rate, false positive rate, false negative rate and detector/mGN node energy utilization rates. We also performed a comparative analysis of the acquired experimental results for the proposed scheme, with corresponding results obtained from the simulation of a centralized Self Organizing Map-based attack detection scheme. The purpose of this comparison is to establish the superiority of the proposed distributed pattern recognition approach over other centralized techniques for detection of distributed denial of service attacks in wireless sensor networks.
Authors and Affiliations
Siva Balaji Yadav. C , R. Seshadri,PhD
A Study of vampire Attack to Avoid the Intruders without Backtracking Method
Abstract: In a Wireless sensor network, every hub gathers the information and transmits all the information parcels to the sink hub utilizing any directing conventions. The directing Protocols are intended to be se...
Digital Image Compression using Hybrid Transform with Kekre Transform and Other Orthogonal Transforms
This paper presents image compression technique using hybrid transform. Concept of hybrid wavelet transform can be extended to generate hybrid transform. In hybrid wavelet transform first few rows represent  ...
Incremental Sequential Pattern Tree Mining
In this paper, we have proposed an Incremental Sequential Pattern Tree mining algorithm to retrieve new updated frequent sequential patterns from dynamic sequence database. Sequential Pattern Tree stores...
Client-Server Model
Client- server is a system that performs both the functions of client and server so as to promote the sharing of information between them. It allows many users to have access to the same database at the same time...
Web Usability Recommendation Model: An Approach to Enhance Web Usability
Abstract: The success of any business mainly e- business is mostly depends on its website. To attract and sustain web users is one of the biggest challenges for any e-business. Web Usability plays key role to retain web...