International Journal of Innovative Research in Computer and Communication Engineering
|
|
|
- Bethanie Murphy
- 9 years ago
- Views:
Transcription
1 Novel Approach to Generate Signature Preventing Network Attack as Unsupervised Detection Priti B.Dhanke 1, Pratibha Mishra 2 Student (M.Tech) G.H. Raisoni Institute of Engineering &Technology for women, Nagpur, India 1 Assistant Professor, G.H. Raisoni Institute of Engineering &Technology for women, Nagpur, India 2 ABSTRACT: At present days, it is a challenging job to detect network attacks as an unsupervised detection. Various methods proposed to work the problem regarding network attack and determine a solution using specialized signatures, but technique is expensive to follow out and hard to generate labeled traffic data sets for profiling. In this study, we focus on unsupervised approach to detect new kinds of network attacks not seen before. Clustering technique is used to find out inconsistent traffic flows. Clustering algorithm is applied for constructing specific filtering rules automatically so that it can characterize different attacks as well as provides easy interpreted information to the network operator. More ever rules united to make a signature, which can directly exported/transfer towards security devices like IDSs and/or Firewalls. This approach finds different attack without knowledge of traffic. Unsupervised Network Anomaly Detection Algorithm is used for knowledge-independent detection of anomalous traffic. UNADA uses a novel clustering technique based on Sub-Space-Density clustering to identify clusters and outliers in multiple low-dimensional spaces. The evidence of traffic structure provided by these multiple clustering is then combined to produce an abnormality ranking of traffic flows, using a correlation-distance-based approach. KEYWORDS: Network attack, Signature generation, clustering algorithm, Network security. I. INTRODUCTION Now days to discover the network attack on internet world, it is challenging task numerous amount of attack are found such as Denial of Service attacks (DoS) [1], Distributed DoS (DDoS) [2], web/host scans [3], and spreading worms or viruses [4] and many more different attacks that daily threaten the integrity and normal operation of the network. The main challenge in automatically detecting and analyzing network attacks is that these are a moving and ever-growing target [5]. Main idea to detect and analyze network, which affected by an attack, is that these are a moving and evergrowing target. Under this condition it is important to develop the security system, which can help to find out an attack or generate the alternative solution, prevent from an attack. There are different approaches are consider as providing security among these Two different approaches are mainly consider for to find out a solution : signature-based detection[6] and anomaly detection[7]. Signature-based detection systems developed to protect the network using signature matching technique and are highly effective to detect those attacks which they are programmed to alert on but I cannot defend the network against unknown attacks as well as it's not a cost effective technique because for building new signatures [6,8]. While, Anomaly detection uses to detect anomalies as activities that deviate from this baseline. Such methods can discover new forms of network attacks not considered before. Similarly, these techniques is not a cost effective technique Because it detects known attacks, only a signature required for every attack every bit well as novel attacks cannot be detected [7,8]. Under this circumstance, it is necessary to develop cost effective technique, which can help build solution for unsupervised detection. The solution above mention challenges is clustering algorithms; it can used to detect both known Copyright to IJIRCCE
2 or completely unknown attack as well as automatically produce interpret signatures to characterize them, both in an online basis. The complete detection and characterization algorithm runs in three consecutive phases. 1) The first measure lies in detecting an anomalous time slot where an approach might be concealed. For doing so, the time series made for basic traffic metrics such as number of bits, data packets, and IP information flows per time slot using the flow solution. Any generic anomaly detection based on time-series analysis [9, 10] then utilized in time series to identify an anomalous slate. 2) In the second stage, using as input the set of IP flows captured in the flagged time slot. The method uses robust clustering techniques based on Subspace Clustering (SSC) [11], Density-based Clustering [12], and Evidence Accumulation (EA) [13] blindly pull out the suspicious flows that compose the approach. 3) In the third phase, the evidence of traffic structure provided by the clustering algorithms is applied to produce filtering rules that characterize to detect the attempt[14] The residue of paper highlighted as follows. Related work is reviewed in section II. The system model, architecture, working of system model, advantages of our scheme described in section III. Implementation and proposed model given in section IV. Implementation details and results addressed in section V. concludes the paper and presents some future research work VI. Part of Reference used to write this work. II. RELATED WORK Most approaches analyze statistical variations of traffic volume-metrics techniques (e.g., data packets, and IP information) and/or other traffic features using either single link measurements or completely network-wide information. The problem of network attacks and anomaly detection has extensively analyzed in the final ten. The main challenge in automatically detecting and analyzing network attacks is that these are a moving and ever-growing target [5]. Taxonomy allows previous knowledge to given to new attacks as well as providing a structured way to consider such attacks. The proposed taxonomy aims to create categories that enable this to occur easily, so that similarities between attacks can highlighted and used to combine new attacks. A non-exhaustive list of methods includes the role of signal processing techniques (e.g., ARIMA, wavelets) on singlelink traffic measurements [15], [16], and sketches applied to IP-flows [17] [18], Kalman filters [18] for network-wide anomaly detection, anomaly detection algorithm based on time-series analysis [15] [10], PCA [20] -[21] and sketches applied to IP-flows and signature-based anomaly characterization [22]. And the sub-space approach is another wellknown unsupervised anomaly detection technique, used in [20, 21] to detect network-wide traffic anomalies in highly aggregated traffic flows. To keep off the lack of robustness of general clustering techniques, I have prepared a parallel-multi-clustering approach, combining the notions of Density-based Clustering [12], Subspace Clustering [11], and Evidence Accumulation [13]. The particular details of the algorithm are fully documented in [23]. Clustering is performed in very-low-dimensional subspecies, which is faster than clustering in high-dimensional spaces [24]. The Fisher Score (FS) [25], basically measures the separation between clusters, relative to the total variance within each subdivision. The vast volume of the unsupervised detection schemes proposed in the literature is based on clustering and outliers detection, being [26,27] some relevant examples. In [26], the authors utilize a single-linkage hierarchical clustering method to cluster data from the KDD 99 dataset, based on the standard Euclidean space for inter-patterns similarity. In [28] reports improved results in the same data set, using three different clustering algorithms: Fixed-Width clustering, an optimized version of k-nn, and one class SVM [27] presents a combined density-grid-based clustering algorithm to improve computational complexity, obtaining similar detection results. Copyright to IJIRCCE
3 From literature work mention above some objective some solve the problem regarding network attacks, The main of the our work to design a cluster base system for completely detect unsupervised detection and construct a signature for anomalous flow of data. In order to accomplish the proposed idea. III. SYSTEM MODEL Our main idea is to detect both known, as well as unusual people and unknown attack. This is caused by the production of signature that determine the attack in an online basis algorithm that is being used for characterizing the attack will persist in following stages[29], which is being represented by flow as depicted below in figure 1. Figure 1 Work Flow of our module This came after the three consecutive stages. Firstly, using a temporal sliding-window approach, traffic is caught and it is aggregated in flows. This is performed using different stories of traffic aggregation. For simple traffic metrics such as number of bytes, flows in each time slot, the time series made. In addition, any change-catching method used to identify an anomalous time slot. In the second stage, unsupervised detection algorithm begins, using as input the set of IP flows captured in the flagged time slot. The method uses robust clustering techniques based on Sub-Space Clustering (SSC), Density-based Clustering, and Evidence Accumulation (EA), to blindly extract the suspicious flows that compose the Copyright to IJIRCCE
4 attack. In the third stage, the evidence of traffic structure provided by the clustering algorithms is used to produce filtering rules that characterize to detect the attack. A. Stages of Implementation IV. SYSTEM IMPLEMENTATION Step 1:- To capture the packet of data which takes as input all the IP flows in flagged time slot by using analyzer i.e. Create Log file. Step 2:- IP flows are additionally aggregated at different flow-resolution levels using different aggregation keys and apply sliding time windowing scheme for every 1sec. Step 3:- Create the feature space matrix by using following formula x(1) = [sipadd dipadd sport dport nsipadd/ndipadd y(1)/ndipadd] Similarly, we have to create feature space matrices (i.e. clusters) for all time windows data set.i.e., X= (x1,x2.xn) and then apply Clustering algorithm and declare smallest group of cluster as outlier. Step 4:- Detect anomalies using k-means clustering algorithm, evidence accumulation and outliers ranking. Step 5:- Create a signature. Signature will be logged and updated in the signature table. Signature table can be use in for online detection anomalous flow. Step 6:- To detect the attack in the future this signature can ultimately be integrated to any standard security device. There is filtering rules are combined into a new traffic signature that characterizes the attack in simple terms. B. K-Means Algorithm K-means algorithm [24,29] as the underlying clustering algorithm to produce clustering ensembles. First, the data is split into a large number of compact and small clusters; different decompositions are obtained by random initializations of the K-means algorithm. The data organization present in the multiple clustering is mapped into a co-association matrix, which provides a measure of similarity between patterns. The final data partition is obtained by clustering this new similarity matrix [30]. The primary steps of the K - means algorithm are as follows, 1. Choose an initial partition with N clusters; repeat steps 2 and 3 until cluster membership stabilizes. 2. Bring forth a new partition by assigning each pattern to its closest cluster centre. 3. Compute new cluster of each centers. C. Evidence accumulation and outliers ranking The idea of evidence accumulation-based clustering is to fuse the results of multiple clustering into a single data partition, by viewing each clustering result as an independent evidence of data governance. There are various potential ways to gather evidence in the context of unsupervised learning: (1) Combine results of different clustering algorithms. (2) Produce different results by re-sampling the data. Copyright to IJIRCCE
5 (3) Running a given algorithm many times with different parameters or initializations. The overall method for evidence collection-based clustering is below. Data clustering using Evidence Accumulation. Input: k - number of clusters consider instially; N - number of clustering. t threshold value. Output: Data partition. Initialization: Set Y X a null n n matrix. 1. Do N times: 1.1. Randomly select k cluster point Run the K-means with above specification produce a P partition Updating the Y X matrix: for each pattern pair, (i; j), in the same cluster in P, set Y X (i; j) = Y X (i; j) + (1/N) 2. Detect consistent clusters in the Y X matrix Find majority voting associations: For each pattern pair, (i; j),such that Y X (i; j) > t, Merge the patterns in the same cluster; if the patterns were in distinct previously formed clusters, join the clusters; 2.2. For each remaining pattern not included in a cluster, form a single element cluster. V. EXPERIMENTAL RESULT For experimental propose we can use used analyzer i.e. NetworkActiv PIAFCTM [31], and MATLAB[32], the power of the unsupervised algorithm to detect and construct a signature for different attack in real traffic. Initially we work with packet traces, the shadows are not marked, and thus analysis will be determined to show how the unsupervised approach can find anomalies and characterize different network attack without using signatures, labels, or scholarship. On that, point is to detect the port scan attack, and it refers to TCP/UDP ports. Regarding filtering rules, these require the number of sources and destinations and the fraction of packets combining them produces a signature. Surprisingly the extracted signature matches quite closely the standard signature used to detect an attempt. We can create network packet transfer log file using NetworkActiv PIAFCTM in packet mode. At one time an operation starts it can apply an output using various factors such as Type, Size, Source and Destination IP, Source and Destination port and Time and date information shown in below figure 2. As after generating data, apply sliding time windowing scheme for after a second and IP flow are aggregated at similar time the feature space matrix by using following formula mention in step 3. It produces the number of cluster. It observed, the first column occurs tag values, second column contains the flow of data i.e., Y. And (from column three to eight is feature space) third column is sip, fourth column dip, the fifth column is a sport, sixth column is deported, seventh column is ratio of sources IP address to number of destination IP address and eight columns is the proportion of flow of data to a number of destination IP address. Show in figure 3. Copyright to IJIRCCE
6 ISSN(Online): Figure 2. Packet information generated. Figure 3. Feature Spares Matrix The GUI of Our system has various button labeling functionality of each button shown below table 1. Button Label Meaning Sel sig log: This button is used for selecting a particular log file. This log file contains the packet of data. App time wd: After selecting the log file then this button is use to extract the number of sources, number of destination, number of bytes etc, on the basis of sliding time windowing scheme for every 1sec. Here for every one second IP flow are aggregated. crtxm: It create the feature space matrix. abnorp: This button is used to find abnormal/anomalous/outliers data, by using clustering algorithm. addsig: it create the signature which is updated and used in future to detect anomalies. Table 1. GUI Button Nomenclature To see the anomalies by using k-means clustering algorithm, evidence accumulation and outlier ranking.g. From that outlier, we cause to gather the information about source IP, destination IP and time for that cause to trace back into the feature space matrix, aggregation and log file. The detective work of a group of anomalous flows is to automatically produce a lot of filtering rules to characterize the network attacks. Here it detects the port scan attack. Port scan attack refers to scan TCP/UDP port as shown in figure 4. To produce the signature used addsig function from the GUI. It will Copyright to IJIRCCE
7 update in the signature table. Lastly, I have detected anomalous traffic flows, and network attack such as port scan attack as shown in figure 5. Figure 4: Detect Abnormal Data Figure 5: Create a Signature IV. CONCLUSION AND FUTURE SCOPE The completely unsupervised algorithm for detection of network attack that uses exclusively unlabeled data to identify and characterize network attack without needing any form of signature, particular model, or canonical data distribution. This allows detecting new, previously unseen network attack, even without using statistical learning. We establish how to employ the algorithm automatically construct signatures of network attack without relying on any form of previous information. An attack can applied to devise autonomous network security arrangements, in which the Subspace clustering (SSC) and Evidence Accumulation based algorithm applied in latitude to any standard security device, producing specific signatures to unknown anomalous events. Finally, Results confirm that the use of the algorithm for on-line unsupervised detection and automatic generation of signatures is possible and easy to achieve for the network attack and anomaly detection that analyzed. In this report, we have suggested an idea, which is still young, and a great deal of work needs to be performed to fix the model perfectly. Though we have several challenges to be assembled to solve more efficiently in our proposed model, we believe with our future research it is not far to establish such infrastructure. REFERENCES 1. Carl, G.; Kesidis, G.; Brooks, R.R.; Rai, S., "Denial-of-service attack-detection techniques," Internet Computing, IEEE, vol.10, no.1, pp.82,89, Jan.-Feb doi: /MIC Wonjun Lee; Squicciarini, A.C.; Bertino, E., "Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems," Cluster, Cloud and Grid Computing (CCGrid), th IEEE/ACM International Symposium on, vol., no., pp.534,543, May 2011 doi: /CCGrid Selamat, S.R., "Web server scanner: scanning on IIS CGI and HTTP," Communications, APCC The 9th Asia-Pacific Conference vol.3, no., pp.919,923 Vol.3, Sept doi: /APCC Zesheng Chen; Lixin Gao; Kwiaty, K., "Modeling the spread of active worms," INFOCOM Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol.3, no., 5. pp.1890,1900 vol.3, 30 March-3 April 2003doi: /INFCOM Zheng Wu; Yang Ou; Yujun Liu, "A Taxonomy of Network and Computer Attacks Based on Responses," Information Technology, Computer Engineering and Management Sciences (ICM), 2011 International Conference on, vol.1, no., pp.26,29, Sept. 2011doi: /ICM Ngoc Thinh Tran; Tomiyama, S.; Kittitornkun, S.; Tran Huy Vu, "TCP reassembly for signature-based Network Intrusion Detection systems," 9th International Conference Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), 2012 pp.1,4, May 2012 doi: /ECTICon Weiyu Zhang; Qingbo Yang; Yushui Geng, "A Survey of Anomaly Detection Methods in Networks," International Symposium on Computer Network and Multimedia Technology, CNMT 2009., vol., no., pp.1,3, Jan doi: /CNMT Casas, P.; Mazel, J.; Owezarski, P., "Steps Towards Autonomous Network Security: Unsupervised Detection of Network Attacks," 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2011, pp.1,5, 7-10 Feb. 2011doi: /NTMS Copyright to IJIRCCE
8 10. P. Barford, J. Kline, D. Plonka, A. Ron, A Signal Analysis of Network Traffic Anomalies, in Proc. 11. ACM IMW, 2002.Pages 71-82ACM New York, NY, USA 2002 ISBN: X. doi> / Cormode, G.; Muthukrishnan, S., "What's new: finding significant differences in network data streams," INFOCOM Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3, no., pp.1534,1545 vol.3, 7-11 March 2004 doi: /INFCOM L. Parsons et al., Subspace Clustering for High Dimensional Data: a Review, in ACM SIGKDD Expl. Newsletter, vol. 6 (1), pp , 2004.L. Parsons et al., Subspace Clustering for High Dimensional Data: a Review, in ACM SIGKDD Expl. Newsletter, vol. 6 (1), pp , Martin Ester, Hans-peter Kriegel, Jörg S, Xiaowei Xu, "A density-based algorithm for discovering clusters in large spatial databases with noise", pages , publisher :AAAI Press. 15. Fred, A.L.N.; Jain, A.K., "Combining multiple clustering s using evidence accumulation," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol.27, no.6, pp.835,850, Jun 2005doi: /TPAMI URL: Casas, P.; Mazel, J.; Owezarski, P., "Knowledge-independent traffic monitoring: Unsupervised detection of network attacks," Network, IEEE, vol.26, no.1, pp.13,21, January-February 2012 doi: /MNET P. Barford, J. Kline, D. Plonka, A. Ron, A Signal Analysis of Network Traffic Anomalies, Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment Pages ACM New York, NY, USA 2002 ISBN: X doi> / J. Brutlag, Aberrant Behavior Detection in Time Series for Network Monitoring, Proceedings of the 14th USENIX conference on System administration Pages USENIX Association Berkeley, CA, USA B. Krishnamurthy et al., Sketch-based Change Detection: Methods, Evaluation, and Applications, Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement Pages ACM New York, NY, USA 2003 ISBN: doi> / G. Dewaele et al., Extracting Hidden Anomalies using Sketch and non Gaussian Multi-resolution Statistical Detection Procedures, Proceedings of the 2007 workshop on Large scale attack defense Pages ACM New York, NY, USA 2007 ISBN: doi> / Soule et al., Combining Filtering and Statistical Methods for Anomaly Detection, Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement Pages 31-31USENIX Association Berkeley, CA, USA Lakhina, M. Crovella, C. Diot, Diagnosing Network-Wide Traffic Anomalies, Proceeding SIGCOMM '04 Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications Pages ACM New York, NY, USA [21] A. Lakhina, M. Crovella, C. Diot, Mining Anomalies Using Traffic Feature Distributions Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications Pages ACM New York, NY, USA 2005 ISBN: doi> / G. Fernandes, P. Owezarski, Automated Classification of Network Traffic Anomalies, Security and Privacy in Communication Networks Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Volume 19, 2009, pp Print ISBN , DOI / _6 ISBN: doi> / P. Casas, J. Mazel, P. Owezarski, Sub-Space Clustering & Evidence Accumulation for 26. Unsupervised Network Anomaly Detection, Proceedings of the Third international conference 27. on Traffic monitoring and analysis Pages Springer-Verlag Berlin, Heidelberg 2011 ISBN: Jain, Data Clustering: 50 Years Beyond K-Means, Published in Journal Pattern Recognition Letters archive Volume 31 Issue 8, June, 2010 Pages Elsevier Science Inc. New York, NY, USA doi> /j.patrec T. Jaakkola and D. Haussler, Exploiting Generative Models in 30. Discriminative Classifiers., Proceedings of the 1998 conference on Advances 31. in neural information processing systems II Pages MIT Press Cambridge, MA, USA L. Portnoy, E. Eskin, S. Stolfo, Intrusion Detection with Unlabeled Data Using Clustering,In Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001) pages :5-8,ISBN: K. Leung, C. Leckie, Unsupervised Anomaly Detection in Network Intrusion Detection Using Clustering, ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38 Pages Australian Computer Society, Inc. Darlinghurst, Australia, Australia 2005 ISBN: Eleazar Eskin,Andrew Arnold,Michael Prerau,Leonid Portnoy,Sal Stolfo,"A Geometric Framework for Unsupervised Anomaly Detection", Applications of Data Mining in Computer SecurityAdvances in Information Security Volume 6, 2002, pp , DOI> / _4, Print ISBN Pragati H. Chandankhede, Sonali U. Nimbhorkar, "Autonomous Networ Security for Detection of Network Attacks ", International Journal of Scientific and Research Pu blications, Volume 2, Issue 1, January 2012,ISSN , pp oonsanit, K.Jaruskulchai, C. ; Eiumnoh, "A.Parameter-Free K-Means Clustering Algorithm for Satellite Imagery Application", Information Science and Applications (ICISA), 2012 International Conference on Information Science and Applications, May 2012 Kyonggi University, Suwon, Republic of Korea, pp 1-6, ISBN: , Digital Object Identifier : /ICISA Copyright to IJIRCCE
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based
On Entropy in Network Traffic Anomaly Detection
On Entropy in Network Traffic Anomaly Detection Jayro Santiago-Paz, Deni Torres-Roman. Cinvestav, Campus Guadalajara, Mexico November 2015 Jayro Santiago-Paz, Deni Torres-Roman. 1/19 On Entropy in Network
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
WEB APPLICATION FIREWALL
WEB APPLICATION FIREWALL CS499 : B.Tech Project Final Report by Namit Gupta (Y3188) Abakash Saikia (Y3349) under the supervision of Dr. Dheeraj Sanghi submitted to Department of Computer Science and Engineering
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
A Novel Approach for Network Traffic Summarization
A Novel Approach for Network Traffic Summarization Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia, [email protected],[email protected],M.Maher@unsw.
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
A Frequency-Based Approach to Intrusion Detection
A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop
Adaptive Anomaly Detection for Network Security
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 1 (2013), pp. 1-9 International Research Publication House http://www.irphouse.com Adaptive Anomaly Detection for
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
A Novel Packet Marketing Method in DDoS Attack Detection
SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data
An Analysis on Density Based Clustering of Multi Dimensional Spatial Data K. Mumtaz 1 Assistant Professor, Department of MCA Vivekanandha Institute of Information and Management Studies, Tiruchengode,
Robust Outlier Detection Technique in Data Mining: A Univariate Approach
Robust Outlier Detection Technique in Data Mining: A Univariate Approach Singh Vijendra and Pathak Shivani Faculty of Engineering and Technology Mody Institute of Technology and Science Lakshmangarh, Sikar,
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
Efficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Data Mining System, Functionalities and Applications: A Radical Review
Data Mining System, Functionalities and Applications: A Radical Review Dr. Poonam Chaudhary System Programmer, Kurukshetra University, Kurukshetra Abstract: Data Mining is the process of locating potentially
Adaptive Framework for Network Traffic Classification using Dimensionality Reduction and Clustering
IV International Congress on Ultra Modern Telecommunications and Control Systems 22 Adaptive Framework for Network Traffic Classification using Dimensionality Reduction and Clustering Antti Juvonen, Tuomo
A Study of Web Log Analysis Using Clustering Techniques
A Study of Web Log Analysis Using Clustering Techniques Hemanshu Rana 1, Mayank Patel 2 Assistant Professor, Dept of CSE, M.G Institute of Technical Education, Gujarat India 1 Assistant Professor, Dept
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Comparative Analysis of EM Clustering Algorithm and Density Based Clustering Algorithm Using WEKA tool.
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 9, Issue 8 (January 2014), PP. 19-24 Comparative Analysis of EM Clustering Algorithm
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11 (November 2014)
Denial-of-Service Attack Detection Mangesh D. Salunke * Prof. Ruhi Kabra G.H.Raisoni CEM, SPPU, Ahmednagar HOD, G.H.Raisoni CEM, SPPU,Ahmednagar Abstract: A DoS (Denial of Service) attack as name indicates
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Consensus Extraction from Heterogeneous Detectors to Improve Performance over Network Traffic Anomaly Detection
Consensus Extraction from Heterogeneous Detectors to Improve Performance over Network Traffic Anomaly Detection Jing Gao Wei Fan Deepak Turaga Olivier Verscheure Xiaoqiao Meng Lu Su Jiawei Han University
Design and simulation of wireless network for Anomaly detection and prevention in network traffic with various approaches
IJISE - International Journal of Innovative Science, Engineering & echnology, Vol. 1 Issue 5, July 2014. Design and simulation of wireless network for Anomaly detection and prevention in network traffic
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
System for Denial-of-Service Attack Detection Based On Triangle Area Generation
System for Denial-of-Service Attack Detection Based On Triangle Area Generation 1, Heena Salim Shaikh, 2 N Pratik Pramod Shinde, 3 Prathamesh Ravindra Patil, 4 Parag Ramesh Kadam 1, 2, 3, 4 Student 1,
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
Authentication Anomaly Detection: A Case Study On A Virtual Private Network
Authentication Anomaly Detection: A Case Study On A Virtual Private Network Michael J. Chapple Nitesh Chawla Aaron Striegel Department of Computer Science and Engineering University of Notre Dame Notre
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
Grid Density Clustering Algorithm
Grid Density Clustering Algorithm Amandeep Kaur Mann 1, Navneet Kaur 2, Scholar, M.Tech (CSE), RIMT, Mandi Gobindgarh, Punjab, India 1 Assistant Professor (CSE), RIMT, Mandi Gobindgarh, Punjab, India 2
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds
Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds S.Saranya Devi 1, K.Kanimozhi 2 1 Assistant professor, Department of Computer Science and Engineering, Vivekanandha Institute
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
Early DoS Attack Detection using Smoothened Time-Series and Wavelet Analysis
Third International Symposium on Information Assurance and Security Early DoS Attack Detection using Smoothened Time-Series and Wavelet Analysis Pravin Shinde, Srinivas Guntupalli CDAC, Mumbai {pravin,srinivas}@cdacmumbai.in
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics
Identifying Peer-to-Peer Traffic Based on Traffic Characteristics Prof S. R. Patil Dept. of Computer Engineering SIT, Savitribai Phule Pune University Lonavala, India [email protected] Suraj Sanjay Dangat
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Data Mining Project Report. Document Clustering. Meryem Uzun-Per
Data Mining Project Report Document Clustering Meryem Uzun-Per 504112506 Table of Content Table of Content... 2 1. Project Definition... 3 2. Literature Survey... 3 3. Methods... 4 3.1. K-means algorithm...
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
REVIEW OF ENSEMBLE CLASSIFICATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce
, pp.231-242 http://dx.doi.org/10.14257/ijsia.2014.8.2.24 A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce Wang Jin-Song, Zhang Long, Shi Kai and Zhang Hong-hao School
Quality Assessment in Spatial Clustering of Data Mining
Quality Assessment in Spatial Clustering of Data Mining Azimi, A. and M.R. Delavar Centre of Excellence in Geomatics Engineering and Disaster Management, Dept. of Surveying and Geomatics Engineering, Engineering
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS
1 NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS ALAN BIVENS [email protected] RASHEDA SMITH [email protected] CHANDRIKA PALAGIRI [email protected] BOLESLAW SZYMANSKI [email protected] MARK
Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System
Detection of DDoS Attack Using Virtual Security N.Hanusuyakrish, D.Kapil, P.Manimekala, M.Prakash Abstract Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad
Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad M. Lakshmi Narayana, M.Tech CSE Dept, CMRTC, Hyderabad Abstract:
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System
Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System 1 M.Yasodha, 2 S. Umarani 1 PG Scholar, Department of Information Technology, Maharaja Engineering College,
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Cloud Security - Characteristics, Advantages and Disadvantages
The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA Mohamed Faisal Elrawy 1, T. K. Abdelhamid 2 and A. M. Mohamed 3 1 Faculty of engineering, MUST University, 6th Of October, Egypt [email protected] 2,3
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms
Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia [email protected] Eugene Kalishenko Saint Petersburg
