An algorithm for normal profile generation and for attack detection in terms of detection accuracy
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
We present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for precise network traffic description by take out the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system uses the principle of anomaly-based detection in attack recognition. This makes our key competent of detecting known and unknown DoS attacks effectively by education the model of legitimate network traffic only. Furthermore, a triangle-area-based system is proposed to improve and to speed up the process of MCA. Networkbased detection systems can be classified into two main categories, namely misuse based detection systems and anomaly-based detection systems. Misuse-based detection systems detect attacks by monitoring network activities and come across for matches with the existing attack signatures. In malice of having high detection rates to known attacks and low false positive rates, misuse-based detection systems are without difficulty avoided by any new attacks and even alternative of the existing attacks.
Authors and Affiliations
Ch S V V S N Murty, Bonda Mownika
Data Possession Using Shipment Equilibrium Model And Mechanism on Multi cloud Environment
Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distribu...
Low Power Design of A SRAM Cell for Embedded Memory
This paper presents a new SRAM cell to reduce power consumption with the feedback technique by using Schmitt Trigger in the proposed circuitry design. By the proposed design we may reduce the power consumption and ar...
Impact of DDOS Attacks on Cloud Environment
Cloud Computing is an emerging area nowadays. Researchers are working on all aspects of cloud viz. cloud network architecture, scheduling policies, virtualization, hypervisor performance scalability, I/O efficiency, d...
Hash Function based MAC Protocol to cope with MAC Layer Misbehavior in Manets
Mobile adhoc networks consist of mobile nodes connected by wireless links without using any preexisting infrastructure. MANET nodes rely on network cooperation schemes to properly work, forward traffic unrelated to it...
Hadoop Map Reduce Job Scheduler Implementation and Analysis in Heterogeneous Environment
Hadoop MapReduce is one of the popular framework for BigData analytics. MapReduce cluster is shared among multiple users with heterogeneous workloads. When jobs are concurrently submitted to the cluster, resources ar...