Detection of Denial of Service Attack in Wireless Network using Dominance based Rough Set
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 12
Abstract
Denial-of-service (DoS) attack is aim to block the services of victim system either temporarily or permanently by sending huge amount of garbage traffic data in various types of protocols such as transmission control protocol, user datagram protocol, internet connecting message protocol, and hypertext transfer protocol using single or multiple attacker nodes. Maintenance of uninterrupted service system is technically difficult as well as economically costly. With the invention of new vulnerabilities to system new techniques for determining these vulnerabilities have been implemented. In general, probabilistic packet marking (PPM) and deterministic packet marking (DPM) is used to identify DoS attacks. Later, intelligent decision proto-type was proposed. The main advantage is that it can be used with both PPM and DPM. But it is observed that, data available in the wireless network information system contains uncertainties. Therefore, an effort has been made to detect DoS attack using dominance based rough set. The accuracy of the proposed model obtained over the KDD cup dataset is 99.76 and it is higher than the accuracy achieved by resilient back propagation (RBP) model.
Authors and Affiliations
N. Ahmed, D. Acharjya
Knowledge Sharing Protocol for Smart Spaces
In this paper we present a novel knowledge sharing protocol (KSP) for semantic technology empowered ubiquitous computing systems. In particular the protocol is designed for M3 which is a blackboard based semantic interop...
Conceptual Level Design of Semi-structured Database System: Graph-semantic Based Approach
This paper has proposed a Graph – semantic based conceptual model for semi-structured database system, called GOOSSDM, to conceptualize the different facets of such system in object oriented paradigm. The model defines a...
First Out First Served Algorithm for Mobile Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have recently gained tremendous attention as they cover a vast range of applications requiring an important number of sensor nodes deployed in the area of interest to measure physiological...
Automatic Detection Of Electrocardiogram ST Segment: Application In Ischemic Disease Diagnosis
The analysis of electrocardiograph (ECG) signal provides important clinical information for heart disease diagnosis. The ECG signal consists of the P, QRS complex, and T-wave. These waves correspond to the fields induced...
Using Induced Fuzzy Bi-Model to Analyze Employee Employer Relationship in an Industry
The employee-employer relationship is an intricate one. In an industry, the employers expect to achieve performances in quality and production in order to earn profit, on the other side employees need good pay and all po...