Detection & Deletion of DDOS Attacks Using Multi-clustering Algorithm

Abstract

Wireless sensor networks are mostly vulnerable to attacks. It’s difficult to find /track attacker due to mobility. Indeed, the numbers of new attacks as well as their sophistication are continuously increasing. Diametrically opposite strategy has been studied in the last few years such as unsupervised anomaly detection (UAD). UAD uses data mining techniques to extract patterns and uncover similar structures “hidden” in unlabeled traffic or unknown nature (attack or normal operation traffic), without relying on Digital signatures or baseline traffic profiles. Based on the observation that attacks, particularly the most difficult ones to detect are contained in a small fraction of traffic flows with respect to normal operation traffic so we propose a paramount advantage of unsupervised, knowledgeindependent detection algorithms based on clustering. The main aim is to combine the clustering results provided by multiple independent partitions of the same set of flows and filtering out biased groupings. We focus on the detection and characterization of standard and well-known attacks, which facilitates the interpretation of results. Denial of service (DOS), distributed DOS (DDOS), network scans, and worm propagation are examples of such standard network attacks. The approach can easily be generalized to detect other kinds of anomalies and attacks.

Authors and Affiliations

Meera A R, Jismy K Jose

Keywords

Related Articles

A New Technique of Automated Sericulture Based on IoT

Seasonal variations in environmental factors have a significant impact on genotypic expressions in forms of the phenotypic outputs in silkworm crops, such as a cocoon’s weights, shell’s weights, & cocoon’s shells ratios....

Data Routing and Spectrum Utilization Techniques in Cognitive IOT Network

Wireless devices increase the comfort of human life by reducing labor work and data reading accuracy. Wireless device transfer data though allotted spectrum or free available spectrum. An IOT device has limited resource...

Cyborg Crab

In this paper we emphasis on the cyborg in cybernetic which is a part of Artificial Intelligence. Artificial intelligence (AI) is the intelligence exhibited by machines or software. It is also an academic field of study....

Ergonomics in Medical Equipment Development and System Design

Utilizing ergonomics during medical equipment development and system design increases patient safety and efficiency in the working environment. The purpose of this report is to review the current literature on the use of...

Stock Price Prediction Using Python in Machine Learning

The process of anticipating the stock market is one that is both difficult and time-consuming. On the other hand, advancements in stock market projection have begun to incorporate these methods of evaluating stock market...

Download PDF file
  • EP ID EP749178
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

Meera A R, Jismy K Jose (2014). Detection & Deletion of DDOS Attacks Using Multi-clustering Algorithm. International Journal of Innovative Research in Computer Science and Technology, 2(4), -. https://europub.co.uk/articles/-A-749178