Detection & Deletion of DDOS Attacks Using Multi-clustering Algorithm
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 4
Abstract
Wireless sensor networks are mostly vulnerable to attacks. It’s difficult to find /track attacker due to mobility. Indeed, the numbers of new attacks as well as their sophistication are continuously increasing. Diametrically opposite strategy has been studied in the last few years such as unsupervised anomaly detection (UAD). UAD uses data mining techniques to extract patterns and uncover similar structures “hidden” in unlabeled traffic or unknown nature (attack or normal operation traffic), without relying on Digital signatures or baseline traffic profiles. Based on the observation that attacks, particularly the most difficult ones to detect are contained in a small fraction of traffic flows with respect to normal operation traffic so we propose a paramount advantage of unsupervised, knowledgeindependent detection algorithms based on clustering. The main aim is to combine the clustering results provided by multiple independent partitions of the same set of flows and filtering out biased groupings. We focus on the detection and characterization of standard and well-known attacks, which facilitates the interpretation of results. Denial of service (DOS), distributed DOS (DDOS), network scans, and worm propagation are examples of such standard network attacks. The approach can easily be generalized to detect other kinds of anomalies and attacks.
Authors and Affiliations
Meera A R, Jismy K Jose
Media Manipulation Detection System Using Passive Aggressive
Due to the extreme growing use of social media and online news media, there has been a rise in fake news recently. It has become much easier to spread fake news than it was before. This type of fake news, if widely circu...
Randomize Dissemination Path for Secure Data Transmission in Mobile Ad-Hoc Network
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes. The nodes are free to move arbitrarily. Due to lack of a centralized secure infrastructure, the communication is prone to security attacks and the no...
Solar Mobile Charger
Vedic literatures in India even state the use of flying machines which were powered using the sun. Coming 21st century, we have come a long way in developing solar cells which are the devices powering our future, convert...
Human Identification using Histogram of Oriented Gradients (HOG) and Non-Maximum Suppression (NMS) for ATM Video Surveillance
Today video surveillance is the scorching topic in the research field of Computer Vision. Around 400 million surveillance cameras are used in various sectors which merely act as blind and record videos for post-incident...
Study on Travel Pattern in Traffic and Analysis of Interrelated Activity in Traffic
Understanding travel conduct change under different climate conditions can support examiners and arrangement producers fuse the uniqueness of nearby climate and atmosphere inside their approach configuration, particularl...