Detection & Deletion of DDOS Attacks Using Multi-clustering Algorithm
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 4
Abstract
Wireless sensor networks are mostly vulnerable to attacks. It’s difficult to find /track attacker due to mobility. Indeed, the numbers of new attacks as well as their sophistication are continuously increasing. Diametrically opposite strategy has been studied in the last few years such as unsupervised anomaly detection (UAD). UAD uses data mining techniques to extract patterns and uncover similar structures “hidden” in unlabeled traffic or unknown nature (attack or normal operation traffic), without relying on Digital signatures or baseline traffic profiles. Based on the observation that attacks, particularly the most difficult ones to detect are contained in a small fraction of traffic flows with respect to normal operation traffic so we propose a paramount advantage of unsupervised, knowledgeindependent detection algorithms based on clustering. The main aim is to combine the clustering results provided by multiple independent partitions of the same set of flows and filtering out biased groupings. We focus on the detection and characterization of standard and well-known attacks, which facilitates the interpretation of results. Denial of service (DOS), distributed DOS (DDOS), network scans, and worm propagation are examples of such standard network attacks. The approach can easily be generalized to detect other kinds of anomalies and attacks.
Authors and Affiliations
Meera A R, Jismy K Jose
A New Technique of Automated Sericulture Based on IoT
Seasonal variations in environmental factors have a significant impact on genotypic expressions in forms of the phenotypic outputs in silkworm crops, such as a cocoon’s weights, shell’s weights, & cocoon’s shells ratios....
Data Routing and Spectrum Utilization Techniques in Cognitive IOT Network
Wireless devices increase the comfort of human life by reducing labor work and data reading accuracy. Wireless device transfer data though allotted spectrum or free available spectrum. An IOT device has limited resource...
Cyborg Crab
In this paper we emphasis on the cyborg in cybernetic which is a part of Artificial Intelligence. Artificial intelligence (AI) is the intelligence exhibited by machines or software. It is also an academic field of study....
Ergonomics in Medical Equipment Development and System Design
Utilizing ergonomics during medical equipment development and system design increases patient safety and efficiency in the working environment. The purpose of this report is to review the current literature on the use of...
Stock Price Prediction Using Python in Machine Learning
The process of anticipating the stock market is one that is both difficult and time-consuming. On the other hand, advancements in stock market projection have begun to incorporate these methods of evaluating stock market...