A Powerful Tool for Intrusion Detection & Clustering Techniques and Methodology  
  Authors : Sonal R.Chakole; Vijaya Balpande; Vyenktesh Giripunge

 

As computer attacks are becoming more and more difficult to identify the need for better and more efficient intrusion detection systems increases. The main problem with current intrusion detection systems is high rate of false alarms. Distributed Denial of Service (DDoS) attacks is large-scale cooperative attack launched from a large number of compromised hosts called Zombies is a major threat to internet services. This paper presents various significant areas where data mining techniques seems to be a strong candidate for detecting and preventing DDOS attack. Purpose for this work is to examine how to integrate multiple intrusion detection sensors in the order to minimize the number of incorrect-alarms.

 

Published In : IJCAT Journal Volume 1, Issue 11

Date of Publication : 31 December 2014

Pages : 587 - 592

Figures :02

Tables : --

Publication Link :A Powerful Tool for Intrusion Detection & Clustering Techniques and Methodology

 

 

 

Sonal R.Chakole : Computer Department, Nagpur University, Professor in Priyadarshini J. L. College of Engg. Maharashtra , India

Vijaya Balpande : Computer Department, Nagpur University, Professor in Priyadarshini J. L. College of Engg. Maharashtra , India

Vyenktesh Giripunge : Computer Department, Nagpur University, Professor in Priyadarshini J. L. College of Engg. Maharashtra , India

 

 

 

 

 

 

 

DDOS

Intrusion

Data Mining

Zombies

IP Traceback

DDoS attacks are quite complex methods of attacking a Computer network, ISP, individual system makes it ineffectual to legitimate network users. These attacks are an aggravation at a minimum, and if they are against a particular system, they can be brutally destroying. Loss of network resources costs money, delays work, and interrupts Communication between various legal network users. The drastic consequences of a DDoS attack make it important that strict and productive solutions and security measures must be made to prevent these types of attacks. Detecting, preventing, and mitigating DDoS attacks is important for national and individual security.

 

 

 

 

 

 

 

 

 

[1] Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73. [2] I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350. [3] K. Elissa, “Title of paper if known,” unpublished. [4] R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press. [5] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982]. [6] M. Young,Sager The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [7] Stone, Electronic Publication: Digital Object Identifiers (DOIs): [8] D. Kornack and P. Rakic, “Cell Proliferation without Neurogenesis in Adult Primate Neocortex,” Science, vol. 294, Dec. 2001, pp. 2127-2130, doi:10.1126/science.1065467. [9] H. Goto, Y. Hasegawa, and M. Tanaka, “Efficient Scheduling Focusing on the Duality of MPL Representatives,” Proc. IEEE Symp. Computational Intelligence in Scheduling (SCIS 07), IEEE Press, Dec. 2007, pp. 57-64, doi:10.1109/SCIS.2007.357670.