MCA Based Anonymous DoS Attacks Detection
Keywords:
Dos Attack Detection, Multi Variate Correlation AnalysisAbstract
All well organized systems, for example, net servers, document servers, distributed computing and so on… are presently under genuine attacks from system assailants. Denial of service attack is the standout amongst the most successive and forceful to processing frameworks. In this plan we propose a methodology called multivariate relationship investigation to distinguish an accurate movement stream characterization by separating the geometrical connection between known and obscure assaults. This framework incorporates abnormality recognition strategy for the identification of known and obscure Dos. Moreover Triangle Area Based method is utilized to accelerate the procedure of Multivariate Correlation Analysis (MCA). Proposed framework can be assessed by utilizing KDD cup dataset.
References
[1] V. Paxson, “Bro: A System for Detecting Network Intruders in Real-Time,” Computer Networks, vol. 31, pp. 2435-2463, 1999.
[2] P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and E. Vzquez, “Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges,” Computers and Security, vol. 28, pp. 18-28, 2009.
[3] K. Lee, J. Kim, K.H. Kwon, Y. Han, and S. Kim, “DDoS Attack Detection Method Using Cluster Analysis,” Expert Systems with Applications, vol. 34, no. 3, pp. 1659-1665, 2008.
[4] A. Tajbakhsh, M. Rahmati, and A. Mirzaei, “Intrusion Detection Using Fuzzy Association Rules,” Applied Soft Computing, vol. 9, no. 2, pp. 462-469, 2009.
[5] C. Yu, H. Kai, and K. Wei-Shinn, “Collaborative Detection of DDoS Attacks over Multiple Network Domains,” IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649-1662, Dec.2007.
[6] J. Yu, H. Lee, M.-S. Kim, and D. Park, “Traffic Flooding Attack Detection with SNMP MIB Using SVM,” Computer Comm., vol. 31, no. 17, pp. 4212-4219, 2008.
[7] Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu, “Triangle- Area-Based Multivariate Correlation Analysis for Effective Denialof-Service Attack Detection,” Proc. IEEE 11th Int’l Conf. Trust, Security and Privacy in Computing and Comm., pp. 33-40, 2012.
[8] G. Thatte, U. Mitra, and J. Heidemann, “Parametric Methods for Anomaly Detection in Aggregate Traffic,” IEEE/ACM Trans. Networking, vol. 19, no. 2, pp. 512-525, Apr. 2011.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 S.Avinash, Y.Ramakrishna, J.Venkata krishna

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
