Anomaly Detection Based on Access Behavior and Document Rank Algorithm
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4
Abstract
Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding,ICMP flooding and UDP flooding, which are called DDoS attacks. The intention of these DDoS attacks is to utilize the network bandwidth and deny service to authorize users of the victim systems. Obtain from the low layers, new application-layer-based DDoS attacks utilizing authorize HTTP requests to overload victim resources are more undetectable. When these are taking place during crowd events of any popular website, this is the case is very serious. The state-of-art approaches cannot handle the situation where there is no considerable deviation between the normal and the attacker’s activity. The page rank and proximity graph representation of online web accesses takes much time in practice. There should be less computational complexity, than of proximity graph search. Hence proposing Web Access Table mechanism to hold the data such as ‘who accessed what and how many times, and their rank on average” to find the anomalous web access behavior. The system takes less computational complexity and may produce considerable time complexity
Authors and Affiliations
Prajwal R Thakare , K. Hanumantha Rao
Information Security and Risk Management for Banking System
Risk management provides an effective approach for measuring the security, but existing risk management approaches come with major shortcomings such as the demand for a very detailed knowledge about the IT security spher...
A Privacy Preserving of Composite Private/Public Key in Cloud Servers
Security is a term used to provide secrecy of data from the illegal entries. It is used to prevent a user that he/she should not have access to. It is a two step process. The security system in the first step identifies...
Efficient User Authentication and Providing Host Security against Malware
To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user’s to get the service from the server by using int...
BPR: Evaluation of Existing Methodologies and Limitations
Many of known organizations had their business processes changed and reengineered in order to achieve their objectives, meet their customer’s expectations and attain competitive advantage. Thus, they were willing to adop...
Cloud Computing: A Strategy to Improve the Economy of Islamic Societies
Cloud computing is the new technology that significantly change the landscape of businesses as it enables users, companies, and governments to store information in multiple servers and allows on-demand access. The cloud...