Anomaly Detection Based on Access Behavior and Document Rank Algorithm

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4

Abstract

Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding,ICMP flooding and UDP flooding, which are called DDoS attacks. The intention of these DDoS attacks is to utilize the network bandwidth and deny service to authorize users of the victim systems. Obtain from the low layers, new application-layer-based DDoS attacks utilizing authorize HTTP requests to overload victim resources are more undetectable. When these are taking place during crowd events of any popular website, this is the case is very serious. The state-of-art approaches cannot handle the situation where there is no considerable deviation between the normal and the attacker’s activity. The page rank and proximity graph representation of online web accesses takes much time in practice. There should be less computational complexity, than of proximity graph search. Hence proposing Web Access Table mechanism to hold the data such as ‘who accessed what and how many times, and their rank on average” to find the anomalous web access behavior. The system takes less computational complexity and may produce considerable time complexity

Authors and Affiliations

Prajwal R Thakare , K. Hanumantha Rao

Keywords

Related Articles

An Energy-efficient Clock Synchronization Protocol for Wireless Sensor Network

The behavior of Wireless detector (sensor) networks (WDN) is today wide analyzed. One in all the foremost necessary problems is said to their energy consumption, as this contains a major impact on the network time period...

Improving Routing Performance by Using Neighbor Coverage Knowledge and Energy Aware Metric in Mobile Adhoc Networks

A mobile adhoc network is an independent collection of mobile nodes without having the fixed infrastructure. In the mobile adhoc networks, because of the high mobility of the nodes there is frequent link breakage that ca...

Journey from Data Mining to Web Mining to Big Data

This paper describes the journey of big data starting from data mining to web mining to big data. It discusses each of this method in brief and also provides their applications. It states the importance of mining big dat...

A Smart Intelligent Way of Video Authentication Using Classification and Decomposition of Watermarking Methods

Video Watermarking serves as a new technology mainly used to provide security to the illegal distribution of digital video over the web. The purpose of any video watermarking scheme is to embed extra information into vid...

Comparative Analysis of Edge Based Single Image Superresolution

Super-resolution image reconstruction provides an effective way to increase image resolution from a single or multiple low resolution images. There exists various single image super-resolution based on different assumpti...

Download PDF file
  • EP ID EP151969
  • DOI -
  • Views 112
  • Downloads 0

How To Cite

Prajwal R Thakare, K. Hanumantha Rao (2013). Anomaly Detection Based on Access Behavior and Document Rank Algorithm. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(4), 230-235. https://europub.co.uk/articles/-A-151969