Detection of Denial of Service Attack in Wireless Network using Dominance based Rough Set

Abstract

Denial-of-service (DoS) attack is aim to block the services of victim system either temporarily or permanently by sending huge amount of garbage traffic data in various types of protocols such as transmission control protocol, user datagram protocol, internet connecting message protocol, and hypertext transfer protocol using single or multiple attacker nodes. Maintenance of uninterrupted service system is technically difficult as well as economically costly. With the invention of new vulnerabilities to system new techniques for determining these vulnerabilities have been implemented. In general, probabilistic packet marking (PPM) and deterministic packet marking (DPM) is used to identify DoS attacks. Later, intelligent decision proto-type was proposed. The main advantage is that it can be used with both PPM and DPM. But it is observed that, data available in the wireless network information system contains uncertainties. Therefore, an effort has been made to detect DoS attack using dominance based rough set. The accuracy of the proposed model obtained over the KDD cup dataset is 99.76 and it is higher than the accuracy achieved by resilient back propagation (RBP) model.

Authors and Affiliations

N. Ahmed, D. Acharjya

Keywords

Related Articles

 Multi-Objective Intelligent Manufacturing System for Multi Machine Scheduling

This paper proposes a framework for Intelligent Manufacturing systems in which the machine scheduling is achieved by MCDM and DRSA. The relationship between perception/knowledge base and profit maximization is being exte...

Experimental Study of Spatial Cognition Capability Enhancement with Building Block Learning Contents for Disabled Children

In this research, we develop learning teaching materials using building blocks for children with disabilities, and verify learning effect. It is important to prepare input equipment according to children with disabilitie...

Explore the Major Characteristics of Learning Management Systems and their Impact on e-Learning Success

Today, there are many educational institutions and organizations around the world, especially the universities have adopted the e-learning and learning management system concepts because they want to enhance and support...

Attacking Misaligned Power Tracks Using Fourth-Order Cumulant

Side channel attacks (SCA) use the leaked confidential data to reveal the cipher key. Power consumptions, electromagnetic emissions, and operation timing of cryptographic hardware are examples of measurable parameters (a...

Service Design for Developing Multimodal Human-Computer Interaction for Smart Tvs

A Smart TV integrates Internet and Web features into a TV, as well convergence between computer and TV and can utilize as a computer. Smart TV devices facilitate the curation of content by combining Internet-based inform...

Download PDF file
  • EP ID EP138410
  • DOI 10.14569/IJACSA.2015.061236
  • Views 73
  • Downloads 0

How To Cite

N. Ahmed, D. Acharjya (2015). Detection of Denial of Service Attack in Wireless Network using Dominance based Rough Set. International Journal of Advanced Computer Science & Applications, 6(12), 267-278. https://europub.co.uk/articles/-A-138410