MULTIVARIATE CORRELATION ANALYSIS FOR DOS ATTACK DETECTION USING SUPPORT VECTOR

Interconnected systems, like internet servers, info servers, cloud computing servers etc, are currently below threads from network attackers. During this paper, tend to present a DOS attack detection system that uses variable Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic options. MCA- based DOS attack detection system employs the principle of anomaly-based detection in attack recognition. This makes our answer capable of detective work famous and unknown DOS attacks effectively by learning the patterns of legitimate network traffic solely. Moreover, a triangle-area-based technique is planned to boost and to hurry up the method of MCA. The effectiveness of planned detection system is evaluated victimization KDD Cup ninety nine dataset, and therefore the influences of each non- normalized knowledge and normalized knowledge on the performance of the planned detection system are examined. The results show that system outperforms 2 different antecedently developed progressive approaches in terms of detection accuracy. Support Vector Machines (SVM) could be a powerful, progressive algorithmic program with robust theoretical foundations. SVM cut back the false positive rate. Experimental results show that SVMs bring home the considerably higher search accuracy.

[1]  J.S. Baras,et al.  Distributed change detection for worms, DDoS and other network attacks , 2004, Proceedings of the 2004 American Control Conference.

[2]  Abdolreza Mirzaei,et al.  Intrusion detection using fuzzy association rules , 2009, Appl. Soft Comput..

[3]  Kai Hwang,et al.  Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.

[4]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[5]  George V. Moustakides Quickest Detection of Abrupt Changes for a Class of Random Processes , 1998, IEEE Trans. Inf. Theory.

[6]  Urbashi Mitra,et al.  Parametric Methods for Anomaly Detection in Aggregate Traffic , 2011, IEEE/ACM Transactions on Networking.

[7]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[8]  Svein J. Knapskog,et al.  Attribute Normalization in Network Intrusion Detection , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.