Presentations

IEEE 2014 JAVA PARALLEL DISTRIBUTION PROJECT A System for Denial-Of-Service Attack Detection Based OnMultivariate Correlation Analysis

Description
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Categories
Published
of 6
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Related Documents
Share
Transcript
  A System for Denial-of-Service Attack Detection Based onMultivariate Correlation Analysis ABSTRACT: Interconnected systems, such as e! servers, data!ase servers, cloud com utin#servers etc, are no$ under threads from net$ork attackers% As one of most common anda##ressive means, Denial-of-Service &DoS' attacks cause serious im act on these com utin#systems% In this a er, $e resent a DoS attack detection system that uses MultivariateCorrelation Analysis &MCA' for accurate net$ork traffic characteri(ation !y e)tractin# the#eometrical correlations !et$een net$ork traffic features% *ur MCA-!ased DoS attack detection system em loys the rinci le of anomaly-!ased detection in attack reco#nition%This makes our solution ca a!le of detectin# kno$n and unkno$n DoS attacks effectively!y learnin# the atterns of le#itimate net$ork traffic only% +urthermore, a trian#le-area-!ased techniue is ro osed to enhance and to s eed u the rocess of MCA% Theeffectiveness of our ro osed detection system is evaluated usin# DD Cu .. dataset, andthe influences of !oth non-normali(ed data and normali(ed data onthe erformance of the ro osed detection system are e)amined% The results sho$ that oursystem out erforms t$o other reviously develo ed state-of-the-art a roaches in terms of detection accuracy%/)istin# System: GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTSIEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEEBULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTSCELL: +91 9!9 #9$ % +91 99' # (% +91 9!9 (9$% +91 9($1! !$!$1 V)*): ,,,-.)02304546738*-64 M0) 6:)333.)0*3546738*;0)-86  Interconnected systems, such as e! servers, data!ase servers, cloudcom utin# servers etc, are no$ under threads from net$ork attackers% As one of mostcommon and a##ressive means, Denial-of-Service &DoS' attacks cause serious im act onthese com utin# systemsDisadvanta#es 1. This makes our solution ca a!le of detectin# kno$n and unkno$n DoS attackseffectively !y learnin# the atterns of le#itimate net$ork traffic only%%0ro osed System: e resent a DoS attack detection system that uses Multivariate Correlation Analysis&MCA' for accurate net$ork traffic characteri(ation !y e)tractin# the #eometricalcorrelations !et$een net$ork traffic features% *ur MCA-!ased DoS attack detectionsystem em loys the rinci le of anomaly-!ased detection in attack reco#nition% This makesour solution ca a!le of detectin# kno$n and unkno$n DoS attacks effectively !y learnin#the atterns of le#itimate net$ork traffic only% +urthermore, a trian#le-area-!asedtechniue is ro osed to enhance and to s eed u the rocess of MCA% The effectiveness of our ro osed detection system is evaluated usin# DD Cu .. dataset, and the influencesof !oth non-normali(ed data and normali(ed data on the erformance of the ro oseddetection system are e)amined% The results sho$ that our system out erforms t$o other reviouslydevelo ed state-of-the-art a roaches in terms of detection accuracy%Advanta#es:1% The results sho$ that our system out erforms t$o other reviouslydevelo ed state-of-the-art a roaches in terms of detection accuracy%  2. To find various attacks from the user to avoid 2et$ork Intrusion% Im lementation Im lementation is the sta#e of the ro3ect $hen the theoretical desi#n is turnedout into a $orkin# system% Thus it can !e considered to !e the most critical sta#e inachievin# a successful ne$ system and in #ivin# the user, confidence that the ne$ system$ill $ork and !e effective% The im lementation sta#e involves careful lannin#, investi#ation of the e)istin#system and it4s constraints on im lementation, desi#nin# of methods to achieve chan#eoverand evaluation of chan#eover methods%Main Modules:- 1. 5ser Module :In this module, 5sers are havin# authentication and security to access the detail$hich is resented in the ontolo#y system% Before accessin# or searchin# the details usershould have the account in that other$ise they should re#ister first% 2.  Multivariate Correlation Analysis :DoS attack traffic !ehaves differently from the le#itimate net$ork traffic, and the!ehavior of net$ork traffic is reflected !y its statistical ro erties% To $ell descri!e thesestatistical ro erties, $e resent a novel Multivariate Correlation Analysis &MCA'a roach in this section% This MCA a roach em loys trian#le area for e)tractin# thecorrelative information !et$een the features $ithin an o!served data o!3ect%  6% Detection Mechanisms :e resent a threshold-!ased anomaly detector, $hose normal rofiles are#enerated usin# urely le#itimate net$ork traffic records and utili(ed for futurecom arisons $ith ne$ incomin# investi#ated traffic records% The dissimilarity !et$een ane$ incomin# traffic record and the res ective normal rofile is e)amined !y the ro oseddetector% If the dissimilarity is #reater than a re-determined threshold, the traffic record isfla##ed as an attack% *ther$ise, it is la!eled as a le#itimate traffic record% Clearly, normal rofiles and thresholds have direct influence on the erformance of a threshold-!aseddetector% A lo$ uality normal rofile causes an inaccurate characteri(ation to le#itimatenet$ork traffic% Thus, $e first a ly the ro osed trian#learea- !ased MCA a roach toanaly(e le#itimate net$ork traffic, and the #enerated TAMs are then used to su ly ualityfeatures for normal rofile #eneration%7% Com utational com le)ity And Time Cost Analysis:e conduct an analysis on the com utational com le)ity and the time cost of our ro osed MCA-!ased detection system% *n one hand, as discussed in, trian#le areas of all ossi!le com!inations of any t$o distinct features in a traffic record need to !e com uted$hen rocessin# our ro osed MCA% The former techniue e)tracts the #eometricalcorrelations hidden in individual airs of t$o distinct features $ithin each net$ork trafficrecord, and offers more accurate characteri(ation for net$ork traffic !ehaviors% The lattertechniue facilitates our system to !e a!le to distin#uish !oth kno$n and unkno$n DoSattacks from le#itimate net$ork traffic%0ro!lem Statement:-
Search
Similar documents
View more...
Tags
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks