Dos Attack Detection System Using Anomaly Based Technique In Interconnected Systems
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Denial-of-service (dos) attacks are one kind of violent and threatening invasive behaviour to online servers. Dos attacks harshly humiliate the ease of use of a victim, which can be a host, a router, or an entire network. The efficiency of our proposed detection system is assess using kdd cup 99 dataset, and the power of both non-normalized data and normalized data on the presentation of the proposed detection system are look at. The results show that our scheme outperforms two other before developed state-of-theart approaches in terms of detection accuracy. Unified systems, such as web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of mainly ordinary and violent means, denial-of-service (dos) attacks reason grave crash on these computing systems.
Authors and Affiliations
Vaddi Swarna Rekha, Veerendra Bethineedi
Efficient and Effective Techniques for Source and Sink Location Privacy in WSN.
While many protocols for sensor network security provide confidentiality for the content of messages contextual information usually remains exposes. Such information can be critical to the mission of the sensor netwo...
Novel Implementation of Low Power Test Patterns for In Situ Test
Test vector generation, its application to CUT and its response analysis are the tasks done by the In Situ Test. A new and efficient approach for the Generation of all one bit changing random input patterns for in sit...
Two Techniques for Analyze Network Traffic to Identify Dos Attack
Highlights of the geometric relationships between the network traffic is not a perfect system functionality by taking out the correlation Multivariate analysis (MCA) is to show that the framework of a DoS attack. In...
Design and Implementation of GSM based Irrigation System Using ARM7
The developed system is a machine based system, which automates the irrigation of land by combining various software and hardware approaches together to find exact field information and to provide instant across the...
Construction of Covert Channel Using Data Hiding Mechanism In Ipv4
Covert channel is a way of abstracting the information and hiding the information, in such a way that the reader should not analyse the hidden information and transmit the data to the destination. The covert techniqu...