Anomaly Detection Based on Access Behavior and Document Rank Algorithm

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4

Abstract

Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding,ICMP flooding and UDP flooding, which are called DDoS attacks. The intention of these DDoS attacks is to utilize the network bandwidth and deny service to authorize users of the victim systems. Obtain from the low layers, new application-layer-based DDoS attacks utilizing authorize HTTP requests to overload victim resources are more undetectable. When these are taking place during crowd events of any popular website, this is the case is very serious. The state-of-art approaches cannot handle the situation where there is no considerable deviation between the normal and the attacker’s activity. The page rank and proximity graph representation of online web accesses takes much time in practice. There should be less computational complexity, than of proximity graph search. Hence proposing Web Access Table mechanism to hold the data such as ‘who accessed what and how many times, and their rank on average” to find the anomalous web access behavior. The system takes less computational complexity and may produce considerable time complexity

Authors and Affiliations

Prajwal R Thakare , K. Hanumantha Rao

Keywords

Related Articles

Vertical Clustering of 3D Elliptical Helical Data

This research proposes an effective vertical clustering strategy of 3D data in an elliptical helical shape based on 2D geometry. The clustering object is an elliptical cross-sectioned metal pipe which is been bended in t...

Analyzing the Road Traffic and Accidents with Classification Techniques

Data mining is the process of extracting data’s from the database engines. Now a days the road traffic and accidents are main area for the researchers to discover the new problems behind that. It is commonly used in a ma...

A survey on Human Computer Interaction Mechanism Using Finger Tracking

Human Computer Interaction (HCI) is a field in which developer makes a user friendly system. User can interact with a computer system without using any conventional peripheral devices. Marker is used to recognize hand mo...

Anomaly Detection Based on Access Behavior and Document Rank Algorithm

Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding,ICMP flooding and UDP flooding, which are called DD...

Multi-Level Association Rule Mining: A Review

Association rule mining is the most popular technique in the area of data mining. The main task of this technique is to find the frequent patterns by using minimum support thresholds decided by the user. The Apriori algo...

Download PDF file
  • EP ID EP151969
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

Prajwal R Thakare, K. Hanumantha Rao (2013). Anomaly Detection Based on Access Behavior and Document Rank Algorithm. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(4), 230-235. https://europub.co.uk/articles/-A-151969