Anomaly Detection Based on Access Behavior and Document Rank Algorithm

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4

Abstract

Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding,ICMP flooding and UDP flooding, which are called DDoS attacks. The intention of these DDoS attacks is to utilize the network bandwidth and deny service to authorize users of the victim systems. Obtain from the low layers, new application-layer-based DDoS attacks utilizing authorize HTTP requests to overload victim resources are more undetectable. When these are taking place during crowd events of any popular website, this is the case is very serious. The state-of-art approaches cannot handle the situation where there is no considerable deviation between the normal and the attacker’s activity. The page rank and proximity graph representation of online web accesses takes much time in practice. There should be less computational complexity, than of proximity graph search. Hence proposing Web Access Table mechanism to hold the data such as ‘who accessed what and how many times, and their rank on average” to find the anomalous web access behavior. The system takes less computational complexity and may produce considerable time complexity

Authors and Affiliations

Prajwal R Thakare , K. Hanumantha Rao

Keywords

Related Articles

Microblogging Service to Report about Earthquake

Data Mining is the extraction of hidden predictive information from large Database set. The huge amount of data is a key resource to be processed and analyzed for knowledge extraction. Volcanic action Reporting system is...

Performance Analysis of SEP and LEACH for Heterogeneous Wireless Sensor Networks

While wireless sensor networks are increasingly equipped to handle more complicated functions, these battery powered sensors which used in network processing, use their constrained energy to enhance the lifetime of the n...

LSSVM-ABC Algorithm for Stock Price prediction

In this paper, Artificial Bee Colony (ABC) algorithm which inspired from the behavior of honey bees swarm is presented. ABC is a stochastic population-based evolutionary algorithm for problem solving. ABC algorithm, whic...

An Efficient Classification Approach for Novel Class Detection by Evolving Feature Datastreams

Data stream classification has been an extensively studied research problem in recent years. data stream classification requires efficient and effective techniques that are significantly different from static data classi...

An Efficient Speaker Diarization using Privacy Preserving Audio Features Based of Speech/Non Speech Detection

Privacy-sensitive audio features for speaker diarization in multiparty conversations: i.e., a set of audio features having low linguistic information for speaker diarization in a single and multiple distant microphone sc...

Download PDF file
  • EP ID EP151969
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

Prajwal R Thakare, K. Hanumantha Rao (2013). Anomaly Detection Based on Access Behavior and Document Rank Algorithm. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(4), 230-235. https://europub.co.uk/articles/-A-151969