Improved MCA Based DoS Attack Detection
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomalybased detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle-area-based technique is proposed to enhance and to speed up the process of MCA. The effectiveness of our proposed detection system is evaluated using KDD Cup 99 dataset, and the influences of both non-normalized data and normalized data on the performance of the proposed detection system are examined. The results show that our system outperforms two other previously developed state-of-the-art approaches in terms of detection accuracy.
Authors and Affiliations
Lakshmi Prasanna Kumar Relangi| M.Tech (IT), S.R.K.R.Engineering College, Bhimavaram, A.P., India, M. Krishna Satya Varma| Asst Professor, Dept. of Information Technology, S.R.K.R.Engineering College, Bhimavaram, A.P., India
To Achieve Perfect Resilience To Packet Loss In Lossy Channels Through Mabs
Authentication is one of the decisive subjects in protecting multicast in a situation attractive to malicious attacks. Multicast is a competent method to transport multimedia content from a sender to a group of recei...
To Assess Numerous Procedures in combination with a Neural learning plan to semantically classify short texts
In OSNs, information filtering can also be used for a unlike, more aware, principle. This is appropriate to the statement that in OSNs there is the leeway of redistribution or mentions other posts on fastidious publi...
Reliability of Chandrapur-Padghe HVDC Line (Chapad) ±500kv HVDC Link
This paper presents an over view of the present status of the reliability model of HVDC link in between CHANDRAPUR & PADGE terminal stations. It is well known fact that it is well-known fact that major generating sta...
Building Trustworthy And Resourceful Interrogation Services In The Cloud Using Knn-R Algorithm
Today’s , peoples are prevalently used cloud computing platform. In this platform user can save their outlay and time by using interrogation services in cloud info. In these info sometimes data owner does not trans...
Pesticide Toxicity Classification using Data Mining Techniques
Agriculture is the main occupation of our working population in India. The techniques and strategies used in agriculture since ancient times varied with many different civilizations. As time varied, the attitude towar...