Dos Attack Detection System Using Anomaly Based Technique In Interconnected Systems
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Denial-of-service (dos) attacks are one kind of violent and threatening invasive behaviour to online servers. Dos attacks harshly humiliate the ease of use of a victim, which can be a host, a router, or an entire network. The efficiency of our proposed detection system is assess using kdd cup 99 dataset, and the power of both non-normalized data and normalized data on the presentation of the proposed detection system are look at. The results show that our scheme outperforms two other before developed state-of-theart approaches in terms of detection accuracy. Unified systems, such as web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of mainly ordinary and violent means, denial-of-service (dos) attacks reason grave crash on these computing systems.
Authors and Affiliations
Vaddi Swarna Rekha, Veerendra Bethineedi
Real Time Traffic Density And Vehicle Count Using Image Processing Technique
Monitoring Indian trafic and calculation of peak hours and density count in a day helps to develop necessary travel and traffic volume estimates, required to satisfy the needs in the are of road planning, constructio...
Measures To Enforce Safety In Digital Libraries
The Digital Library System is an Innovation in Library Service.It is prone to Onslaughts of sabotage by Bibliophiles, Bibliophobes and Biblioklepts all alike the system itself inherent facilities which render it susce...
Prevention of Routing Attack in Mobile Ad-Hoc Networks: A comparative study
Mobile ad hoc networks (MANET) is a wireless network where nodes work in standalone fashion. The MANET faces various security challenges due to the environment in which it is deployed. The nodes of mobile ad hoc netw...
Cloud Computing: Security Threats and Counter Measures
Cloud computing is internet based computing whereby shared resources, software and information, is provided to computers and devices on-demand, like the electricity grid. It is a great idea to make many normal compute...
Design Of A Rceat Architecture For Detecting Multi- Bit Error In RFID
Radio Frequency Identification (RFID) plays an important role in Warehouse Management, especially during the automatic identification of items. Unfortunately, a warehouse environment has electromagnetic interferences...