Detection of Denial of Service Attack in Wireless Network using Dominance based Rough Set
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 12
Abstract
Denial-of-service (DoS) attack is aim to block the services of victim system either temporarily or permanently by sending huge amount of garbage traffic data in various types of protocols such as transmission control protocol, user datagram protocol, internet connecting message protocol, and hypertext transfer protocol using single or multiple attacker nodes. Maintenance of uninterrupted service system is technically difficult as well as economically costly. With the invention of new vulnerabilities to system new techniques for determining these vulnerabilities have been implemented. In general, probabilistic packet marking (PPM) and deterministic packet marking (DPM) is used to identify DoS attacks. Later, intelligent decision proto-type was proposed. The main advantage is that it can be used with both PPM and DPM. But it is observed that, data available in the wireless network information system contains uncertainties. Therefore, an effort has been made to detect DoS attack using dominance based rough set. The accuracy of the proposed model obtained over the KDD cup dataset is 99.76 and it is higher than the accuracy achieved by resilient back propagation (RBP) model.
Authors and Affiliations
N. Ahmed, D. Acharjya
New 3D Objects Retrieval Approach using Multi Agent Systems and Artificial Neural Network
Content-based 3D object retrieval is a substantial research area that has drawn a significant number of scientists in last couple of decades. Due to the rapid advancement of technology, 3D models are more and more access...
A Sleep Monitoring System with Sleep-Promoting Functions in Noise Detection and Sound Generation
Recently, there has been a growing demand and interest in developing sleep-promoting systems for improving sleep condition. Because sleep environments are various, and sensitivity to noise differs individually, it is dif...
Role Based Multi-Agent System for E-Learning (MASeL)
Software agents are autonomous entities that can interact intelligently with other agents as well as their environment in order to carry out a specific task. We have proposed a role-based multi-agent system for e-learnin...
Comparative Analysis of ANN Techniques for Predicting Channel Frequencies in Cognitive Radio
Demand of larger bandwidth increases the spectrum scarcity problem. By using the concepts of Cognitive radio we can achieve an efficient spectrum utilization. The cognitive radio allows the unlicensed user to share the l...
Assessment of Technology Transfer from Grid power to Photovoltaic: An Experimental Case Study for Pakistan
Pakistan is located on the world map where enough solar irradiance value strikes the ground that can be harnessed to vanish the existing blackout problems of the country. Government is focusing towards renewable integrat...