SlideShare a Scribd company logo
1 of 4
Download to read offline
A Survey on Detecting Denial-of-Service Attacks
Balaji V
M.E Computer Science And Engineering
Velammal Engineering College
Surapet, Chennai
balaji.venkat90@gmail.com
Dr. V Jeyabalaraja
Professor, Dept of CSE
Velammal Engineering College
Surapet, Chennai
jeyabalaraja@gmail.com
Abstract—Modern World Systems such as Web servers,
database servers, cloud computing environment etc, are now
under threads from network attackers. One of most threat is
Denial-of-Service (DoS) attacks cause serious impact on these
computing systems. In this paper, we present a detection
mechanism for DoS attack that uses Multivariate Correlation
Analysis (MCA) for analyzing network traffic characterization
by studying the geometrical correlations between network traffic
features. Our MCA-based DoS attack detection mechanism
employs the principle of anomaly-based detection in attack
recognition. Thus making it easier for detecting known and
unknown attacks by learning patterns of legitimate network
traffic. Further a triangle area based approach is employed to
speed up the process of MCA. The propsed system is effectively
checked using KDD Cup 99 Dataset.
Keywords—Denial-Of-Service attack , multivariate correlations,
triangle area.
I. INTRODUCTION
Denial-Of-Service (DoS) attacks are one type of
aggressive and menacing intrusive behavior to online servers.
DoS attacks denies the availability of a victim, which can be a
host, a router, or an entire network. They impose high
intrusion tasks to the victim by exploiting its system
vulnerability or flooding it with huge amount of useless
packets. The victim can be forced out of service from a few
minutes to several days. Effective detection of DoS attacks is
essential to the protection of online services.
DoS attack detection focuses on the development of network-
based detection mechanisms. The systems based on these
mechanisms reside on a network to monitor transmitting
traffic. This releases the online servers from monitoring
attacks and ensures that they can dedicate themselves to
provide quality services with optimum response delay.
Moreover, the network-based detection systems are loosely
coupled with the operating systems running on the host
machines which they are protecting, such that configuration of
this type of detection systems is less complicated than the host
based detection systems.
Generally, network-based detection are classified into two
types, namely misuse-based detection system [1] and
anomaly-based detection system [2]. Misuse based detection
system detects attacks by monitoring network activities and
looks for matches with the existing attack signatures. In spite
of having high detection rates to the known attacks and low
false positive rates, misuse based detection systems can be
easily evaded by any new types of attacks and also variants
existing attacks. Furthermore, manual work is needed to keep
signature database updated because signature generation
heavily involves network security expertise.
Looking at the principle of detection, which monitors and
flags any network activities showing significant deviation
from legitimate traffic profiles as suspicious objects, anomaly
based detection techniques show more promising in detecting
intrusions that exploit previous unknown system
vulnerabilities. Moreover, it is not constrained by the expertise
in network security, due to the fact that the profiles of
legitimate behaviors are developed based on techniques, such
as data mining [3], [4], machine learning, and statistical
analysis. However, these proposed systems commonly suffer
from high false-positive rates because the correlations between
features/attributes are intrinsically neglected or the techniques
do not manage to fully exploit these correlations.
The DoS attack detection system presented in this paper
describes the principles of MCA and anomaly based detection.
The detection mechanism involves accurate characterization
for traffic behaviors and detection of known and unknown
attacks, respectively. A triangle area map is developed to
enhance and to speed up the process of MCA. A statistical
normalization method is used to eliminate the bias from the
raw data. Our proposed DoS detection system is evaluated
using KDD Cup 99 data set
II. SYSTEM ARCHITECTURE
The overview of our proposed DoS attack detection
system architecture is given in this section, where the system
framework and the sample-by-sample detection mechanism
are discussed.
Proceedings International Conference On Advances In Engineering And Technology
ISBN NO: 978 - 1503304048
www.iaetsd.in
International Association of Engineering & Technology for Skill Development
58
Fig 1. System Architecture
The whole detection process consists of three major steps as
shown in Fig. 1.
Step 1: The basic features are generated from observed
network are used to form traffic records for a well-defined
time period. Observing and analyzing at the destination
network reduce the overhead of detecting abnormal traffic by
concentrating only on relevant inbound traffic. This also
enables us provide protection which is the best fit for the
targeted internal network because legitimate traffic profiles
used are developed for a smaller number of network services.
Step 2: Multivariate Correlation Analysis, in which the
“Triangle Area Map Generation” method [5] is applied to
determine the correlations between two distinct features within
each traffic record coming from the first step or the traffic
record normalized by the “Feature Normalization” module in
this step. The occurrence of intrusions cause changes to these
correlations so that the changes can be used as indicators to
identify the malicious activities. All the extracted correlations,
namely triangle areas stored in Triangle Area Maps (TAMs),
are then used to replace the original basic features or the
normalized features to represent the traffic records. This
provides a better discriminative information to differentiate
between legitimate and illegitimate traffic records.
Step 3: The anomaly-based detection mechanism is widely
used in Decision Making. It performs the detection of any DoS
attacks without requiring any attack relevant knowledge.
Furthermore, the labor-intensive analysis of data and the
frequent update of the attack signatures in the case of misuse-
based detection are avoided. Meanwhile, the mechanism
enhances the robustness of the proposed detectors and makes
them harder to be evaded because attackers need to generate
attacks that match the normal traffic profiles built by a specific
detection algorithm. This, however, is a labor-intensive task
and requires expertise in the targeted detection algorithm.
There are two phases (i.e., the “Training Phase” and the “Test
Phase”) are involved in Decision Making. The “Normal
Profile Generation” module is operated in the “Training
Phase” to generate profiles for various types of legitimate
traffic records, and the generated normal profiles are stored in
a database. The “Tested Profile Generation” module is used in
the “Test Phase” to build profiles for individual observed
traffic records. Then, the tested profiles are handed over to the
“Attack Detection” module, which compares the individual
tested profiles with the respective stored normal profiles. A
threshold-based classifier is employed in the “Attack
Detection” module to distinguish DoS attacks from legitimate
traffic.
The group-based detection mechanism has a higher rate in
classifying a group of sequential network traffic samples than
the sample-by-sample detection mechanism. Whereas the
proof was based on an assumption that the samples in a tested
group were all from the same distribution (class). This restricts
the applications of the group-based detection to limited
scenarios, because attacks occur unpredictably in general and
it is difficult to obtain a group of sequential samples only from
the same distribution. To remove these types of restriction, our
system in this paper investigates traffic samples individually.
This offers great outcome that are not found in the group-
based detection mechanism. For example, 1) attacks can be
detected by comparing with the group-based detection
mechanism, 2) intrusive traffic samples can be named
individually, and 3) the probability of classifying a sample
accurately into its population is higher than the one achieved
using the group-based detection mechanism in a general
network scenario.
III. MULTIVARIATE CORRELATION ANALYSIS
DoS attack traffic behaves in a different way compared
with legitimate network traffic and the behavior of network
traffic is represented by its statistical properties. To well
describe these statistical properties, we present Multivariate
Correlation Analysis (MCA) approach in this section. This
MCA approach employs a triangle area map for extracting the
correlative information between the features within an
observed data object (i.e., a traffic record). The Triangle area
map approach is used to extract the hidden correlations
between two distinct features within each traffic record
Proceedings International Conference On Advances In Engineering And Technology
ISBN NO: 978 - 1503304048
www.iaetsd.in
International Association of Engineering & Technology for Skill Development
59
coming from the first step. All extracted correlations, i.e.
triangle areas, are then used to replace the existing basic
features to represent the traffic records. This provides a unique
way to differentiate between legitimate traffic and illegitimate
records. In order to make a complete analysis, all possible
permutations of any two distinct features are extracted and the
corresponding triangle areas are computed.
A Triangle Area Map (TAM) is constructed and all the
triangle areas are arranged on the map depending on their
indexe values. The values of the elements on the diagonal of
the map are set to zeros because we only care about the
correlation between each pair of distinct features. The entire
map has a size of m×m.
Our MCA approach introduces the some unique benefits to
data analysis. The hidden correlations between distinct
features in each pairs are analysed through the geometrical
structure analysis. Changes to these may occur when anomaly
behaviors appear in the traffic, and lead to significant changes
occurring between the hidden correlations and the historical
models. This plays a vital role in triggering an alert to our
detection system. Moreover, the triangle area map based
approach facilitates our MCA method to withstand the issue of
linear change of all features.
IV. DETECTION MECHANISM
A mechanism efficient in detecting any known and
unknown DoS attacks will be well served. To match the
anticipation, we propose, a threshold-based anomaly detector,
whose norm profiles (i.e. legitimate traffic profiles) are
extracted using pure legitimate network traffic records and
used for future comparisons with new incoming investigated
traffic records. The dissimilarity between a new incoming
traffic record and the respective normal profile is examined by
the proposed detection mechanism. If the dissimilarity is more
than a pre-determined threshold, the traffic record is viewed as
an attack. Else, it is categorized as a legitimate traffic record.
Normal profiles and thresholds have direct effect on the
performance of a threshold-based detector. A low quality
normal profile causes an inaccurate characterization to
legitimate network traffic. Thus, we first apply the proposed
triangle area- based MCA approach to analyze legitimate
network traffic, and the generated TAMs are then employed to
supply quality features for normal profile generation.
4.1 Normal Profile Generation
Assume there is a set of n legitimate training traffic records
Xnormal = {xnormal 1 , xnormal 2 , · · · , xnormal n }.The
triangle-area-based MCA approach is implemented to analyze
the records. The generated lower triangles of the TAMs of the
set of n legitimate training traffic records are denoted by
XnormalTAMlower={TAMnormal,1lower,TAMnormal,2lowe
r,··· , TAMnormal,glower}. Mahalanobis Distance (MD) is
adopted to measure the dissimilarity between traffic records.
This is because MD has been successfully and widely used in
cluster based analysis, classification and multivariate detection
techniques. Unlike Euclidean distance and Manhattan
distance, it evaluates distance between two multivariate data
objects by taking the correlations between variables into
account and eliminating the dependency on the scale of
measurement during the calculation.
4.2 Threshold Selection
The threshold is used to identify and differentiate attack traffic
from the legitimate one. Threshold = μ + σ ∗ α.
For a normal distribution, α is usually ranged from values 1 to
3. This means that decision based on detection can be made
with a certain level of confidence varying from 68% to 99.7%
in association with the selection of different values of α. Thus,
if the MD between an observed traffic record and the
respective normal profile is higher than the threshold, it will
be flagged as an attack.
4.3 Attack Detection
To detect DoS attacks, the lower triangle(TAMobservedlower)
of the TAM of an observed record (Tobserved) are generated
using the proposed triangle-area-based MCA approach. Then,
the MD between the TAMobserved lower and the
TAMnormal lower stored in the respective pre-generated
normal profile are evaluated. The detailed detection algorithm
is below.
Algorithm for attack detection based on Mahalanobis
distance.
Require: Observed traffic record Tobserved, normal profile
Parameters : (N(μ, σ2), TAMnormal
lower , Cov) and parameter α
1: Generate TAMobserved
lower for the observed traffic
record Tobserved
2: MDobserved ← MD(TAMobserved
lower ,TAMnormal
lower )
3: if (μ − σ ∗ α) ≤ MDobserved ≤ (μ + σ ∗ α) then
4: return Normal
5: else
6: return Attack
7: end if
V. SYSTEM EVALUATION
The evaluation of the system is conducted on KDD CUP
99 dataset [6]. The 10 percent labeled data of KDD CUP 99
dataset is employed, where three different types of legitimate
traffic (TCP, UDP and ICMP traffic) and six different types of
DoS attacks (Teardrop, Smurf, Pod, Neptune, Land and Back
attacks) are available in the dataset. They are the targeted
Proceedings International Conference On Advances In Engineering And Technology
ISBN NO: 978 - 1503304048
www.iaetsd.in
International Association of Engineering & Technology for Skill Development
60
records in this evaluation and first filtered. Then, they are
further grouped into several clusters according to their labels.
A 10-fold cross-validation is conducted to analyse and
evaluate the system, and the entire filtered data subset is used
for validation. Evaluation results are shown as graphs.
Moreover, we come across some weakness in the current
system and suggest a solution. In addition, the results of the
enhanced system and the performance comparisons with two
state-of-the-art approaches are the presented to prove the
effectiveness of the solution.
5.1 Evaluation Metrics
True Negative Rate (TNR), Detection Rate (DR), False
Positive Rate (FPR) and Accuracy (i.e. the proportion of the
overall samples which are classified correctly) are four
important parametrics for evaluating a DoS attack detection
system. Systems which can give a high detection rate and also
a low false positive rate (namely a high detection accuracy
rate) are highly rated in detection mechanisms. To technically
reveal the performance of the proposed DoS attack detection
system, Receiver Operating Characteristics (ROC) curve is
employed to reveal the relationship between DR and FPR.
VI. COMPUTATIONAL COMPLEXITY AND
TIME COST ANALYSIS
We conduct an analysis on the computational complexity
and the time cost of our proposed MCA-based detection
system. On one hand, as discussed in, triangle areas of all
possible combinations of any two distinct features in a traffic
record have to be calculated when processing our proposed
MCA. The former technique analyses the geometrical
correlations hidden in individual pairs of two distinct features
within each network traffic record, and offers more accurate
characterization for network traffic behaviors. The latter
technique facilitates our system to be able to distinguish both
known and unknown DoS attacks from legitimate network
traffic.
Moreover, time cost is evaluated to show the contribution of
our proposed MCA towards detection mechanism of DOS
attacks. Our proposed MCA can proceed approximately
23,092 traffic records per second. In contrast, the MCA based
on euclidean distance map can achieve relatively 12,044
traffic records per second, which is almost half of what is
achieved by our proposed MCA.
VII. CONCLUSION
This paper has proposed a threshold-based DoS attack
detection system which is employed by the triangle area based
multivariate correlation analysis technique and the anomaly-
based detection technique. The previously used method
extracts the geometrical correlations that are invisible in
individual pairs of two distinct features within each network
traffic records, and offers more accurate differentiation for
network traffic behaviors. The latter technique enables our
system to distinguish both known and unknown DoS attacks
from legitimate network traffic.
Evaluation has been conducted on the KDD CUP 99 dataset to
verify the effectiveness and acuuracy rate of the proposed
system. The results proves that when working with non-
normalized data, our detection system achieves maximum
95.20% detection accuracy though its performances degrades
in detecting ceratain types of DoS attacks. The problem,
however, can be solved by employing statistical normalization
technique to eliminate the bias from the dataset. The results of
evaluating with the normalized data show a more satisfying
detection accuracy of 99.95% and nearly 100.00% detection
rates for wide range of DoS attacks. Besides, the comparison
result proves that our detection system outperforms two state-
of-the-art approaches in terms of detection accuracy.
However, the false positive rate of our detection system needs
to be further reduced in order to release network
administrators from being disrupted by frequent shown false
alarms. Thus, we will employ more sophisticated classification
techniques in our future work to reduce the false positive rates.
To be part of the future work, we will further put to test our
DoS attack detection mechanism using real-world data and
employ more sophisticated classification techniques to further
eliminate the false-positive rate.
VIII. REFERENCES
[1] V. Paxson, “Bro: A System for Detecting Network
Intruders in Real-Time,” Computer Networks, vol. 31, pp.
2435-2463, 1999.
[2] P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and
E. Vzquez, “Anomaly-Based Network Intrusion Detection:
Techniques, Systems and Challenges,” Computers and
Security, vol. 28, pp. 18-28, 2009.
[3] K. Lee, J. Kim, K.H. Kwon, Y. Han, and S. Kim, “DDoS
Attack Detection Method Using Cluster Analysis,” Expert
Systems with Applications, vol. 34, no. 3, pp. 1659-1665,
2008.
[4] A. Tajbakhsh, M. Rahmati, and A. Mirzaei, “Intrusion
Detection Using Fuzzy Association Rules,” Applied Soft
Computing, vol. 9, no. 2, pp. 462-469, 2009.
[5] Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu,
“Triangle- Area-Based Multivariate Correlation Analysis for
Effective Denialof-Service Attack Detection,” Proc. IEEE
11th Int’l Conf. Trust, Security and Privacy in Computing and
Comm., pp. 33-40, 2012.
[6] M. Tavallaee, E. Bagheri, L. Wei, and A.A. Ghorbani, “A
Detailed Analysis of the KDD Cup 99 Data Set,” Proc. IEEE
Second Int’l Conf. Computational Intelligence for Security
and Defense Applications, pp. 1-6, 2009.
Proceedings International Conference On Advances In Engineering And Technology
ISBN NO: 978 - 1503304048
www.iaetsd.in
International Association of Engineering & Technology for Skill Development
61

More Related Content

What's hot

Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...IOSRjournaljce
 
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...JPINFOTECH JAYAPRAKASH
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingredpel dot com
 
Abstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environmentsAbstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environmentsUltraUploader
 
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...cscpconf
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensicsIJNSA Journal
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...IJCSIS Research Publications
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONIJNSA Journal
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityijcsa
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 

What's hot (18)

Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
 
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
1762 1765
1762 17651762 1765
1762 1765
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computing
 
Abstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environmentsAbstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environments
 
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
 
F0371046050
F0371046050F0371046050
F0371046050
 
K1803046067
K1803046067K1803046067
K1803046067
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSIONSECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
 
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
[IJET-V1I2P3] Authors :R.M.Chamundeeswari,Dr.P.Sumathi
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 

Similar to Iaetsd a survey on detecting denial-of-service attacks

2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...Shakas Technologies
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tameSAT Journals
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEAPPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEIJNSA Journal
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxvoversbyobersby
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
 
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...IRJET Journal
 
A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...IJCNCJournal
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...Migrant Systems
 
A Novel Exploit Traffic Traceback Method Based on Session Relationship
A Novel Exploit Traffic Traceback Method Based on Session RelationshipA Novel Exploit Traffic Traceback Method Based on Session Relationship
A Novel Exploit Traffic Traceback Method Based on Session RelationshipAIRCC Publishing Corporation
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
 
IEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing MapIEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing MapTushar Shinde
 
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...IJCNCJournal
 
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...IJCNCJournal
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIRJET Journal
 
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKIRJET Journal
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...Shakas Technologies
 

Similar to Iaetsd a survey on detecting denial-of-service attacks (20)

2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tam
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEAPPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docxCOPYRIGHTThis thesis is copyright materials protected under the .docx
COPYRIGHTThis thesis is copyright materials protected under the .docx
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
 
A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
 
A Novel Exploit Traffic Traceback Method Based on Session Relationship
A Novel Exploit Traffic Traceback Method Based on Session RelationshipA Novel Exploit Traffic Traceback Method Based on Session Relationship
A Novel Exploit Traffic Traceback Method Based on Session Relationship
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
IEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing MapIEEE- Intrusion Detection Model using Self Organizing Map
IEEE- Intrusion Detection Model using Self Organizing Map
 
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
 
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An Overview
 
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORKA PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
A PHASED APPROACH TO INTRUSION DETECTION IN NETWORK
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

Iaetsd a survey on detecting denial-of-service attacks

  • 1. A Survey on Detecting Denial-of-Service Attacks Balaji V M.E Computer Science And Engineering Velammal Engineering College Surapet, Chennai balaji.venkat90@gmail.com Dr. V Jeyabalaraja Professor, Dept of CSE Velammal Engineering College Surapet, Chennai jeyabalaraja@gmail.com Abstract—Modern World Systems such as Web servers, database servers, cloud computing environment etc, are now under threads from network attackers. One of most threat is Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a detection mechanism for DoS attack that uses Multivariate Correlation Analysis (MCA) for analyzing network traffic characterization by studying the geometrical correlations between network traffic features. Our MCA-based DoS attack detection mechanism employs the principle of anomaly-based detection in attack recognition. Thus making it easier for detecting known and unknown attacks by learning patterns of legitimate network traffic. Further a triangle area based approach is employed to speed up the process of MCA. The propsed system is effectively checked using KDD Cup 99 Dataset. Keywords—Denial-Of-Service attack , multivariate correlations, triangle area. I. INTRODUCTION Denial-Of-Service (DoS) attacks are one type of aggressive and menacing intrusive behavior to online servers. DoS attacks denies the availability of a victim, which can be a host, a router, or an entire network. They impose high intrusion tasks to the victim by exploiting its system vulnerability or flooding it with huge amount of useless packets. The victim can be forced out of service from a few minutes to several days. Effective detection of DoS attacks is essential to the protection of online services. DoS attack detection focuses on the development of network- based detection mechanisms. The systems based on these mechanisms reside on a network to monitor transmitting traffic. This releases the online servers from monitoring attacks and ensures that they can dedicate themselves to provide quality services with optimum response delay. Moreover, the network-based detection systems are loosely coupled with the operating systems running on the host machines which they are protecting, such that configuration of this type of detection systems is less complicated than the host based detection systems. Generally, network-based detection are classified into two types, namely misuse-based detection system [1] and anomaly-based detection system [2]. Misuse based detection system detects attacks by monitoring network activities and looks for matches with the existing attack signatures. In spite of having high detection rates to the known attacks and low false positive rates, misuse based detection systems can be easily evaded by any new types of attacks and also variants existing attacks. Furthermore, manual work is needed to keep signature database updated because signature generation heavily involves network security expertise. Looking at the principle of detection, which monitors and flags any network activities showing significant deviation from legitimate traffic profiles as suspicious objects, anomaly based detection techniques show more promising in detecting intrusions that exploit previous unknown system vulnerabilities. Moreover, it is not constrained by the expertise in network security, due to the fact that the profiles of legitimate behaviors are developed based on techniques, such as data mining [3], [4], machine learning, and statistical analysis. However, these proposed systems commonly suffer from high false-positive rates because the correlations between features/attributes are intrinsically neglected or the techniques do not manage to fully exploit these correlations. The DoS attack detection system presented in this paper describes the principles of MCA and anomaly based detection. The detection mechanism involves accurate characterization for traffic behaviors and detection of known and unknown attacks, respectively. A triangle area map is developed to enhance and to speed up the process of MCA. A statistical normalization method is used to eliminate the bias from the raw data. Our proposed DoS detection system is evaluated using KDD Cup 99 data set II. SYSTEM ARCHITECTURE The overview of our proposed DoS attack detection system architecture is given in this section, where the system framework and the sample-by-sample detection mechanism are discussed. Proceedings International Conference On Advances In Engineering And Technology ISBN NO: 978 - 1503304048 www.iaetsd.in International Association of Engineering & Technology for Skill Development 58
  • 2. Fig 1. System Architecture The whole detection process consists of three major steps as shown in Fig. 1. Step 1: The basic features are generated from observed network are used to form traffic records for a well-defined time period. Observing and analyzing at the destination network reduce the overhead of detecting abnormal traffic by concentrating only on relevant inbound traffic. This also enables us provide protection which is the best fit for the targeted internal network because legitimate traffic profiles used are developed for a smaller number of network services. Step 2: Multivariate Correlation Analysis, in which the “Triangle Area Map Generation” method [5] is applied to determine the correlations between two distinct features within each traffic record coming from the first step or the traffic record normalized by the “Feature Normalization” module in this step. The occurrence of intrusions cause changes to these correlations so that the changes can be used as indicators to identify the malicious activities. All the extracted correlations, namely triangle areas stored in Triangle Area Maps (TAMs), are then used to replace the original basic features or the normalized features to represent the traffic records. This provides a better discriminative information to differentiate between legitimate and illegitimate traffic records. Step 3: The anomaly-based detection mechanism is widely used in Decision Making. It performs the detection of any DoS attacks without requiring any attack relevant knowledge. Furthermore, the labor-intensive analysis of data and the frequent update of the attack signatures in the case of misuse- based detection are avoided. Meanwhile, the mechanism enhances the robustness of the proposed detectors and makes them harder to be evaded because attackers need to generate attacks that match the normal traffic profiles built by a specific detection algorithm. This, however, is a labor-intensive task and requires expertise in the targeted detection algorithm. There are two phases (i.e., the “Training Phase” and the “Test Phase”) are involved in Decision Making. The “Normal Profile Generation” module is operated in the “Training Phase” to generate profiles for various types of legitimate traffic records, and the generated normal profiles are stored in a database. The “Tested Profile Generation” module is used in the “Test Phase” to build profiles for individual observed traffic records. Then, the tested profiles are handed over to the “Attack Detection” module, which compares the individual tested profiles with the respective stored normal profiles. A threshold-based classifier is employed in the “Attack Detection” module to distinguish DoS attacks from legitimate traffic. The group-based detection mechanism has a higher rate in classifying a group of sequential network traffic samples than the sample-by-sample detection mechanism. Whereas the proof was based on an assumption that the samples in a tested group were all from the same distribution (class). This restricts the applications of the group-based detection to limited scenarios, because attacks occur unpredictably in general and it is difficult to obtain a group of sequential samples only from the same distribution. To remove these types of restriction, our system in this paper investigates traffic samples individually. This offers great outcome that are not found in the group- based detection mechanism. For example, 1) attacks can be detected by comparing with the group-based detection mechanism, 2) intrusive traffic samples can be named individually, and 3) the probability of classifying a sample accurately into its population is higher than the one achieved using the group-based detection mechanism in a general network scenario. III. MULTIVARIATE CORRELATION ANALYSIS DoS attack traffic behaves in a different way compared with legitimate network traffic and the behavior of network traffic is represented by its statistical properties. To well describe these statistical properties, we present Multivariate Correlation Analysis (MCA) approach in this section. This MCA approach employs a triangle area map for extracting the correlative information between the features within an observed data object (i.e., a traffic record). The Triangle area map approach is used to extract the hidden correlations between two distinct features within each traffic record Proceedings International Conference On Advances In Engineering And Technology ISBN NO: 978 - 1503304048 www.iaetsd.in International Association of Engineering & Technology for Skill Development 59
  • 3. coming from the first step. All extracted correlations, i.e. triangle areas, are then used to replace the existing basic features to represent the traffic records. This provides a unique way to differentiate between legitimate traffic and illegitimate records. In order to make a complete analysis, all possible permutations of any two distinct features are extracted and the corresponding triangle areas are computed. A Triangle Area Map (TAM) is constructed and all the triangle areas are arranged on the map depending on their indexe values. The values of the elements on the diagonal of the map are set to zeros because we only care about the correlation between each pair of distinct features. The entire map has a size of m×m. Our MCA approach introduces the some unique benefits to data analysis. The hidden correlations between distinct features in each pairs are analysed through the geometrical structure analysis. Changes to these may occur when anomaly behaviors appear in the traffic, and lead to significant changes occurring between the hidden correlations and the historical models. This plays a vital role in triggering an alert to our detection system. Moreover, the triangle area map based approach facilitates our MCA method to withstand the issue of linear change of all features. IV. DETECTION MECHANISM A mechanism efficient in detecting any known and unknown DoS attacks will be well served. To match the anticipation, we propose, a threshold-based anomaly detector, whose norm profiles (i.e. legitimate traffic profiles) are extracted using pure legitimate network traffic records and used for future comparisons with new incoming investigated traffic records. The dissimilarity between a new incoming traffic record and the respective normal profile is examined by the proposed detection mechanism. If the dissimilarity is more than a pre-determined threshold, the traffic record is viewed as an attack. Else, it is categorized as a legitimate traffic record. Normal profiles and thresholds have direct effect on the performance of a threshold-based detector. A low quality normal profile causes an inaccurate characterization to legitimate network traffic. Thus, we first apply the proposed triangle area- based MCA approach to analyze legitimate network traffic, and the generated TAMs are then employed to supply quality features for normal profile generation. 4.1 Normal Profile Generation Assume there is a set of n legitimate training traffic records Xnormal = {xnormal 1 , xnormal 2 , · · · , xnormal n }.The triangle-area-based MCA approach is implemented to analyze the records. The generated lower triangles of the TAMs of the set of n legitimate training traffic records are denoted by XnormalTAMlower={TAMnormal,1lower,TAMnormal,2lowe r,··· , TAMnormal,glower}. Mahalanobis Distance (MD) is adopted to measure the dissimilarity between traffic records. This is because MD has been successfully and widely used in cluster based analysis, classification and multivariate detection techniques. Unlike Euclidean distance and Manhattan distance, it evaluates distance between two multivariate data objects by taking the correlations between variables into account and eliminating the dependency on the scale of measurement during the calculation. 4.2 Threshold Selection The threshold is used to identify and differentiate attack traffic from the legitimate one. Threshold = μ + σ ∗ α. For a normal distribution, α is usually ranged from values 1 to 3. This means that decision based on detection can be made with a certain level of confidence varying from 68% to 99.7% in association with the selection of different values of α. Thus, if the MD between an observed traffic record and the respective normal profile is higher than the threshold, it will be flagged as an attack. 4.3 Attack Detection To detect DoS attacks, the lower triangle(TAMobservedlower) of the TAM of an observed record (Tobserved) are generated using the proposed triangle-area-based MCA approach. Then, the MD between the TAMobserved lower and the TAMnormal lower stored in the respective pre-generated normal profile are evaluated. The detailed detection algorithm is below. Algorithm for attack detection based on Mahalanobis distance. Require: Observed traffic record Tobserved, normal profile Parameters : (N(μ, σ2), TAMnormal lower , Cov) and parameter α 1: Generate TAMobserved lower for the observed traffic record Tobserved 2: MDobserved ← MD(TAMobserved lower ,TAMnormal lower ) 3: if (μ − σ ∗ α) ≤ MDobserved ≤ (μ + σ ∗ α) then 4: return Normal 5: else 6: return Attack 7: end if V. SYSTEM EVALUATION The evaluation of the system is conducted on KDD CUP 99 dataset [6]. The 10 percent labeled data of KDD CUP 99 dataset is employed, where three different types of legitimate traffic (TCP, UDP and ICMP traffic) and six different types of DoS attacks (Teardrop, Smurf, Pod, Neptune, Land and Back attacks) are available in the dataset. They are the targeted Proceedings International Conference On Advances In Engineering And Technology ISBN NO: 978 - 1503304048 www.iaetsd.in International Association of Engineering & Technology for Skill Development 60
  • 4. records in this evaluation and first filtered. Then, they are further grouped into several clusters according to their labels. A 10-fold cross-validation is conducted to analyse and evaluate the system, and the entire filtered data subset is used for validation. Evaluation results are shown as graphs. Moreover, we come across some weakness in the current system and suggest a solution. In addition, the results of the enhanced system and the performance comparisons with two state-of-the-art approaches are the presented to prove the effectiveness of the solution. 5.1 Evaluation Metrics True Negative Rate (TNR), Detection Rate (DR), False Positive Rate (FPR) and Accuracy (i.e. the proportion of the overall samples which are classified correctly) are four important parametrics for evaluating a DoS attack detection system. Systems which can give a high detection rate and also a low false positive rate (namely a high detection accuracy rate) are highly rated in detection mechanisms. To technically reveal the performance of the proposed DoS attack detection system, Receiver Operating Characteristics (ROC) curve is employed to reveal the relationship between DR and FPR. VI. COMPUTATIONAL COMPLEXITY AND TIME COST ANALYSIS We conduct an analysis on the computational complexity and the time cost of our proposed MCA-based detection system. On one hand, as discussed in, triangle areas of all possible combinations of any two distinct features in a traffic record have to be calculated when processing our proposed MCA. The former technique analyses the geometrical correlations hidden in individual pairs of two distinct features within each network traffic record, and offers more accurate characterization for network traffic behaviors. The latter technique facilitates our system to be able to distinguish both known and unknown DoS attacks from legitimate network traffic. Moreover, time cost is evaluated to show the contribution of our proposed MCA towards detection mechanism of DOS attacks. Our proposed MCA can proceed approximately 23,092 traffic records per second. In contrast, the MCA based on euclidean distance map can achieve relatively 12,044 traffic records per second, which is almost half of what is achieved by our proposed MCA. VII. CONCLUSION This paper has proposed a threshold-based DoS attack detection system which is employed by the triangle area based multivariate correlation analysis technique and the anomaly- based detection technique. The previously used method extracts the geometrical correlations that are invisible in individual pairs of two distinct features within each network traffic records, and offers more accurate differentiation for network traffic behaviors. The latter technique enables our system to distinguish both known and unknown DoS attacks from legitimate network traffic. Evaluation has been conducted on the KDD CUP 99 dataset to verify the effectiveness and acuuracy rate of the proposed system. The results proves that when working with non- normalized data, our detection system achieves maximum 95.20% detection accuracy though its performances degrades in detecting ceratain types of DoS attacks. The problem, however, can be solved by employing statistical normalization technique to eliminate the bias from the dataset. The results of evaluating with the normalized data show a more satisfying detection accuracy of 99.95% and nearly 100.00% detection rates for wide range of DoS attacks. Besides, the comparison result proves that our detection system outperforms two state- of-the-art approaches in terms of detection accuracy. However, the false positive rate of our detection system needs to be further reduced in order to release network administrators from being disrupted by frequent shown false alarms. Thus, we will employ more sophisticated classification techniques in our future work to reduce the false positive rates. To be part of the future work, we will further put to test our DoS attack detection mechanism using real-world data and employ more sophisticated classification techniques to further eliminate the false-positive rate. VIII. REFERENCES [1] V. Paxson, “Bro: A System for Detecting Network Intruders in Real-Time,” Computer Networks, vol. 31, pp. 2435-2463, 1999. [2] P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and E. Vzquez, “Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges,” Computers and Security, vol. 28, pp. 18-28, 2009. [3] K. Lee, J. Kim, K.H. Kwon, Y. Han, and S. Kim, “DDoS Attack Detection Method Using Cluster Analysis,” Expert Systems with Applications, vol. 34, no. 3, pp. 1659-1665, 2008. [4] A. Tajbakhsh, M. Rahmati, and A. Mirzaei, “Intrusion Detection Using Fuzzy Association Rules,” Applied Soft Computing, vol. 9, no. 2, pp. 462-469, 2009. [5] Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu, “Triangle- Area-Based Multivariate Correlation Analysis for Effective Denialof-Service Attack Detection,” Proc. IEEE 11th Int’l Conf. Trust, Security and Privacy in Computing and Comm., pp. 33-40, 2012. [6] M. Tavallaee, E. Bagheri, L. Wei, and A.A. Ghorbani, “A Detailed Analysis of the KDD Cup 99 Data Set,” Proc. IEEE Second Int’l Conf. Computational Intelligence for Security and Defense Applications, pp. 1-6, 2009. Proceedings International Conference On Advances In Engineering And Technology ISBN NO: 978 - 1503304048 www.iaetsd.in International Association of Engineering & Technology for Skill Development 61