Anomaly Detection Based on Access Behavior and Document Rank Algorithm

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4

Abstract

Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding,ICMP flooding and UDP flooding, which are called DDoS attacks. The intention of these DDoS attacks is to utilize the network bandwidth and deny service to authorize users of the victim systems. Obtain from the low layers, new application-layer-based DDoS attacks utilizing authorize HTTP requests to overload victim resources are more undetectable. When these are taking place during crowd events of any popular website, this is the case is very serious. The state-of-art approaches cannot handle the situation where there is no considerable deviation between the normal and the attacker’s activity. The page rank and proximity graph representation of online web accesses takes much time in practice. There should be less computational complexity, than of proximity graph search. Hence proposing Web Access Table mechanism to hold the data such as ‘who accessed what and how many times, and their rank on average” to find the anomalous web access behavior. The system takes less computational complexity and may produce considerable time complexity

Authors and Affiliations

Prajwal R Thakare , K. Hanumantha Rao

Keywords

Related Articles

Information Security and Risk Management for Banking System

Risk management provides an effective approach for measuring the security, but existing risk management approaches come with major shortcomings such as the demand for a very detailed knowledge about the IT security spher...

A Privacy Preserving of Composite Private/Public Key in Cloud Servers

Security is a term used to provide secrecy of data from the illegal entries. It is used to prevent a user that he/she should not have access to. It is a two step process. The security system in the first step identifies...

Efficient User Authentication and Providing Host Security against Malware

To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user’s to get the service from the server by using int...

BPR: Evaluation of Existing Methodologies and Limitations

Many of known organizations had their business processes changed and reengineered in order to achieve their objectives, meet their customer’s expectations and attain competitive advantage. Thus, they were willing to adop...

Cloud Computing: A Strategy to Improve the Economy of Islamic Societies

Cloud computing is the new technology that significantly change the landscape of businesses as it enables users, companies, and governments to store information in multiple servers and allows on-demand access. The cloud...

Download PDF file
  • EP ID EP151969
  • DOI -
  • Views 105
  • Downloads 0

How To Cite

Prajwal R Thakare, K. Hanumantha Rao (2013). Anomaly Detection Based on Access Behavior and Document Rank Algorithm. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(4), 230-235. https://europub.co.uk/articles/-A-151969