Improved MCA Based DoS Attack Detection
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomalybased detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle-area-based technique is proposed to enhance and to speed up the process of MCA. The effectiveness of our proposed detection system is evaluated using KDD Cup 99 dataset, and the influences of both non-normalized data and normalized data on the performance of the proposed detection system are examined. The results show that our system outperforms two other previously developed state-of-the-art approaches in terms of detection accuracy.
Authors and Affiliations
Lakshmi Prasanna Kumar Relangi| M.Tech (IT), S.R.K.R.Engineering College, Bhimavaram, A.P., India, M. Krishna Satya Varma| Asst Professor, Dept. of Information Technology, S.R.K.R.Engineering College, Bhimavaram, A.P., India
Effect of nano particles on air conditioning compressor performance
Nano particles are found to attract the attention in the recent years due to their diverse uses. Addition of metal or non-metal oxides to a base fluid leads to a different working fluid called NANO FLUID. Addition of...
Optimizing Architecture of DSRC Device By Using Component Reuse
Devoted short-extend correspondence (DSRC) is a developing method to push the keen transportation framework into our day by day life. The DSRC norms for the most part receive FM0 and Manchester codes to achieve dc-ad...
Anomaly Detection on Firewall Logs from Multifold System Based on Email Classification
The greater part of the current frameworks sort the report or firewall logs-corpus in light of the term similitude by discover the archive term relationship. It can't distinguish the calculated comparability or conne...
A Comparative Study on Shape Reorganization
This paper proposes a new mechanism for identifying two-dimensional shapes called the SKS algorithm and compares it with three other state-ofart methods in detail. These include the Hu Moments, CSS matching and Shape...
Fusing Local Patterns Of Gabor Magnitue For Recognition System
Face recognition is a process of analyzing (or) comparing face with the previously stored face images. Training phase involves the collection of images and checking it for the presence of noise. A testing phase is a...