Improved MCA Based DoS Attack Detection
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomalybased detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle-area-based technique is proposed to enhance and to speed up the process of MCA. The effectiveness of our proposed detection system is evaluated using KDD Cup 99 dataset, and the influences of both non-normalized data and normalized data on the performance of the proposed detection system are examined. The results show that our system outperforms two other previously developed state-of-the-art approaches in terms of detection accuracy.
Authors and Affiliations
Lakshmi Prasanna Kumar Relangi| M.Tech (IT), S.R.K.R.Engineering College, Bhimavaram, A.P., India, M. Krishna Satya Varma| Asst Professor, Dept. of Information Technology, S.R.K.R.Engineering College, Bhimavaram, A.P., India
AODV with DSR Protocol Heirarchy For Packet Dropped Forgery Attacks
Far reaching scale sensor frameworks are sent in different application spaces, and the data they accumulate are used as a piece of essential initiative for fundamental structures. Data are spilled from different sour...
Simulation and Application of Maximum Power Tracking Scheme in a Novel Excitation Synchronous Wind Power Generator (ESWPG) by using Fuzzy Logic Controller
This paper proposes a novel excitation synchronous wind power generator (ESWPG) with a maximum power tracking scheme by using Fuzzy Logic Controller (FLC). The excitation synchronous generator and servo motor rotor s...
Scattered simultaneous and autonomous access to scrambled cloud databases
Cloud data environments square measure unpleasantly tempting for the preparing of tremendous scale applications owing to their amazingly ascendible and offered foundation. Data as a Service (DBaaS) model is utilized...
A Voltage Oriented Control Method for PV - Grid Interfaced Inverter by Using Advanced MPPT Algorithm
The output power of PV module varies with module temperature, solar irradiation and loads. And in order to quickly and accurately track the sun, it is necessary to track the maximum power point (MPP) all the time. An...
An Analysis on Differential Query Services in Cost–Efficient Clouds
In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. Now a days Cloud computing...