We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Combined Approach to DoS Attack Detection System

by Archana Salaskar, R.N. Phursule
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 14
Year of Publication: 2015
Authors: Archana Salaskar, R.N. Phursule
10.5120/ijca2015905684

Archana Salaskar, R.N. Phursule . A Combined Approach to DoS Attack Detection System. International Journal of Computer Applications. 123, 14 ( August 2015), 43-47. DOI=10.5120/ijca2015905684

@article{ 10.5120/ijca2015905684,
author = { Archana Salaskar, R.N. Phursule },
title = { A Combined Approach to DoS Attack Detection System },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 14 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number14/22030-2015905684/ },
doi = { 10.5120/ijca2015905684 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:05.861819+05:30
%A Archana Salaskar
%A R.N. Phursule
%T A Combined Approach to DoS Attack Detection System
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 14
%P 43-47
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the network system attack like Denial of service (DoS) is forthcoming damaging attack. The performance of online servers degrades within seconds. Intensive computation on the target server is imposed due to this attack. Target Server gets flooded with large useless packets. The fatality server can be forced out of service From a few minutes to even several days. Eventually crucial business services running on the target fatality causes work down on the target fatality. So for the researchers it is very challenging task. The development of network-based detection mechanisms is the focus of the solution of this kind of attack. Based on these mechanisms in the existing detection systems, traffic transmitted over the protected networks get monitored. Mainly two methods are introduced for detection mechanism namely Misuse based and Anomaly based detection systems. But to enhance the detection rate they are not sufficient. In the proposed system the features which are directly associated with DoS attacks are extract by monitoring the network traffic. To generate geometrical triangular area measurements for normal profiles on the basis of these features the multivariate correlation analysis (MCA) model is used. To detect any unknown DoS attack in the network, these models are used as references. And furthermore to detect attack anomaly detection method is used. Only MCA and anomaly based system is not sufficient for accurate attack detection. So the inventive work behavioral based rule model integrated with MCA and anomaly, as a hybrid model used to enhance the accuracy of DoS attack detection. In proposed inventive model behavioral rules are generated for suspected packets and ultimately detection accuracy as well as detection rate get increased.

References
  1. Zhiyuan Tan, Aruna Jamdagni, Xiangjian He,Priyadarsi Nanda, Ren Ping Liu , ‘A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis’, IEEE Transactions On Parallel And Distributed Systems, Vol. 25, No. 2, February 2014
  2. Shuyuan Jin,Daniel S. Yeung, ‘A Covariance Analysis Model for DDoS Attack Detection’. IEEE Communications Society 0-7803-8533-0/04/$20.00 (c) 2004 IEEE Hong Kong RGC project research grant number B-Q571
  3. Mihui Kim, Hyunjung Na, Kijoon Chae, Hyochan Bang, and Jungchan Na, ‘A Combined Data Mining Approach for DDoS Attack Detection’. ICOIN 2004, LNCS 3090, pp. 943–950, 2004 Springer-Verlag Berlin Heidelberg 2004
  4. Aikaterini Mitrokotsa, Christos Douligeris, ‘Detecting Denial of Service Attacks Using Emergent Self-Organizing Maps’. 2005 IEEE International Symposium on Signal Processing and Information Technology
  5. Zhiyuan Tan1; Aruna Jamdagni1; Xiangjian He1, Priyadarsi Nanda1, and Ren Ping Liu, ‘Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Trac Characterization’.
  6. Lata1, Indu Kashyap , ‘Study and Analysis of Network based Intrusion Detection System’,International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 5, May 2013
  7. Ajoy Kumar, Eduardo B. Fernandez,’ Security Patterns for Intrusion Detection Systems’, 1 st LACCEI International Symposium on Software Architecture and Patterns (LACCEI-ISAP-MiniPLoP’2012), July 23-27, 2012, Panama City, Panama
  8. Punit Gupta , ‘Behavior Based IDS for Cloud IaaS’ , International Journal of Software and Web Sciences (IJSWS)
  9. S. Jin, D.S. Yeung, and X. Wang, “Network Intrusion Detection in Covariance Feature Space,” Pattern Recognition, vol. 40, pp. 2185-2197, 2007
  10. HhhhM. Tavallaee, E. Bagheri, L. Wei, and A.A. Ghorbani, “A Detailed Analysis of the KDD Cup 99 Data Set,” Proc. IEEE Second Int’l Conf. Computational Intelligence for Security and Defense Applications,
  11. V. Paxson, “Bro: A System for Detecgting Network Intruders in Real-Time,” Computer Networks, vol. 31, pp. 2435-2463, 1999.
  12. Ghhh D.E. Denning, “An Intrusion-Detection Model,” IEEE Trans.Software Eng., vol. TSE-13, no. 2, pp. 222-232, Feb. 1987.
  13. S.J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P.K. Chan, “Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project,” Proc. DARPA Information Survivability Conf. and Exposition (DISCEX ’00), vol. 2, pp. 130-144, 2000.
  14. W. Wang, X. Zhang, S. Gombault, and S.J. Knapskog, “Attribute Normalization in Network Intrusion Detection,” Proc. 10th Int’l Symp. Pervasive Systems, Algorithms, and Networks (ISPAN), pp. 448-453, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Denial of Service Attack (DoS) Multivariate Correlation Triangle area network traffic characterization. Behavioral Rule.