Anomaly Detection Based on Access Behavior and Document Rank Algorithm
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4
Abstract
Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding,ICMP flooding and UDP flooding, which are called DDoS attacks. The intention of these DDoS attacks is to utilize the network bandwidth and deny service to authorize users of the victim systems. Obtain from the low layers, new application-layer-based DDoS attacks utilizing authorize HTTP requests to overload victim resources are more undetectable. When these are taking place during crowd events of any popular website, this is the case is very serious. The state-of-art approaches cannot handle the situation where there is no considerable deviation between the normal and the attacker’s activity. The page rank and proximity graph representation of online web accesses takes much time in practice. There should be less computational complexity, than of proximity graph search. Hence proposing Web Access Table mechanism to hold the data such as ‘who accessed what and how many times, and their rank on average” to find the anomalous web access behavior. The system takes less computational complexity and may produce considerable time complexity
Authors and Affiliations
Prajwal R Thakare , K. Hanumantha Rao
Comparative Analysis of Edge Based Single Image Superresolution
Super-resolution image reconstruction provides an effective way to increase image resolution from a single or multiple low resolution images. There exists various single image super-resolution based on different assumpti...
A Study on Big Data Integration with Data Warehouse
The amount of data in world is exploding. Data is being collected and stored at unprecedented rates. The challenge is not only to store and manage the vast volume of data, but also to analyze and extract meaningful value...
Performance Enhancement in Power aware Ad hoc Routing using Highly Probable Link
In today’s fast-moving world connectivity is the biggest trend to look out for and connecting devices with varying specifications is not a simple task. This becomes more of a problem in an environment where all devices,...
A Literature Survey on Face Recognition Techniques
With data and information accumulating in abundance, there is a crucial need for high security. Biometrics has now received more attention. Face biometrics, useful for a person’s authentication is a simple and non-intrus...
To Improve Data Security by Using Secure Data Transmission
The “Secure data transmission” is a software solution which provides security during transmission .Present day security is the main issue that the third person attacks on the data. To provide security Tiny Encsryption Al...