Академический Документы
Профессиональный Документы
Культура Документы
www.iaetsd.in
Dr. V Jeyabalaraja
I. INTRODUCTION
Denial-Of-Service (DoS) attacks are one type of
aggressive and menacing intrusive behavior to online servers.
DoS attacks denies the availability of a victim, which can be a
host, a router, or an entire network. They impose high
intrusion tasks to the victim by exploiting its system
vulnerability or flooding it with huge amount of useless
packets. The victim can be forced out of service from a few
minutes to several days. Effective detection of DoS attacks is
essential to the protection of online services.
DoS attack detection focuses on the development of networkbased detection mechanisms. The systems based on these
mechanisms reside on a network to monitor transmitting
traffic. This releases the online servers from monitoring
attacks and ensures that they can dedicate themselves to
provide quality services with optimum response delay.
Moreover, the network-based detection systems are loosely
coupled with the operating systems running on the host
machines which they are protecting, such that configuration of
this type of detection systems is less complicated than the host
based detection systems.
www.iaetsd.in
www.iaetsd.in
V. SYSTEM EVALUATION
The evaluation of the system is conducted on KDD CUP
99 dataset [6]. The 10 percent labeled data of KDD CUP 99
dataset is employed, where three different types of legitimate
traffic (TCP, UDP and ICMP traffic) and six different types of
DoS attacks (Teardrop, Smurf, Pod, Neptune, Land and Back
attacks) are available in the dataset. They are the targeted
VII. CONCLUSION
This paper has proposed a threshold-based DoS attack
detection system which is employed by the triangle area based
multivariate correlation analysis technique and the anomalybased detection technique. The previously used method
extracts the geometrical correlations that are invisible in
www.iaetsd.in