Improved MCA Based DoS Attack Detection
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomalybased detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle-area-based technique is proposed to enhance and to speed up the process of MCA. The effectiveness of our proposed detection system is evaluated using KDD Cup 99 dataset, and the influences of both non-normalized data and normalized data on the performance of the proposed detection system are examined. The results show that our system outperforms two other previously developed state-of-the-art approaches in terms of detection accuracy.
Authors and Affiliations
Lakshmi Prasanna Kumar Relangi| M.Tech (IT), S.R.K.R.Engineering College, Bhimavaram, A.P., India, M. Krishna Satya Varma| Asst Professor, Dept. of Information Technology, S.R.K.R.Engineering College, Bhimavaram, A.P., India
We propose a protected information sharing plan for dynamic individuals. In the first place, we propose a protected route for key appropriation with no safe correspondence channels, and the clients can safely get the...
Protection of “Fault Tolerant Parallel Filters†by Hamming code with Reversible logic
Advanced channels are generally utilized as a part of flag preparing and correspondence frameworks. Now and again, the dependability of those frameworks is basic, and blame tolerant channel executions are required. T...
We research a novel plan of online multi-modal distance metric learning (OMDML), which investigates a brought together two-level web based learning plan: (i) it figures out how to streamline a separation metric on ev...
Maintaining Integrity for Shared Data In Cloud With Ring Signatures
The wild success of cloud data services bring the cloud commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skeptici...
Analysis And Design Of Flat Slab By Using Etabs Software
“Flat Slab†is better understood as the slab without beams resting directly on supports (like columns & or walls).By virtue of that large Bending Moment & Shear Forces are developed close to the columns. Flat sla...