A Survey on Denial of Service Attack Detection Systems Based on Feature Correlation Analysis  
  Authors : Binil Anto Thampi C. ; Syed Farook K.

 

The growth of Internet and local area networks provide quality and convenience to human life but at the same time provides a platform for network hackers and criminals. Internet security hence becomes an important problem in near future. Blocking availability of an Internet service may imply large financial losses, as in the case of an attack that prevented users from having steady connectivity to major e-commerce Web sites. Such attacks that aimed at blocking availability of computer systems or services are generally referred to as Denial of Service (DoS) Attacks. As more and more essential services become reliant on the Internet as part of their communication infrastructure, the consequences of denial of service attacks can be very damaging. Therefore, it is crucial to deter, or otherwise minimize, the damage caused by denial of service attacks.

 

Published In : IJCAT Journal Volume 2, Issue 2

Date of Publication : 28 February 2015

Pages : 97 - 100

Figures :--

Tables : 01

Publication Link :A Survey on Denial of Service Attack Detection Systems Based on Feature Correlation Analysis

 

 

 

Binil Anto Thampi C. : M.Tech Student, Computer Science And engineering, MES college of Engineering Malappuram, Kerala, India

Syed Farook K. : Assistant Professor, Computer Science And engineering, MES college of Engineering Malappuram, Kerala, India

 

 

 

 

 

 

 

Anomaly Detection

Availability

Denial of Service Attack

Feature Correlation

Internet Security

This work performs the review among recent statistical network intrusion detection methods uses feature correlation analysis. These methods find out the anomalies in network using statistical parameters and used in many systems.

 

 

 

 

 

 

 

 

 

[1] Tavallaee, M., Wei Lu; Iqbal, S.A.; Ghorbani, A.A. A Novel Covariance Matrix Based Approach for Detecting Network Anomalies Communication Networks and Services Research Conference, 2008. 6th Annual, IEEE Computer Society, vol. 75, no. 81, pp. 5-8, May 2008. [2] Jamdagni A., Zhiyuan Tan, Nanda P., Xiangjian He, Ren Liu, "Intrusion Detection Using Geometrical Structure", Frontier of Computer Science and Technology, 2009. Fourth International Conference, IEEE Computer Society, vol. 327, no. 333, pp. 17-19, December. 2009 [3] Zhiyuan Tan, Jamdagni A., Xiangjian He, Nanda P., "Network Intrusion Detection based on LDA for payload feature selection", IEEE GLOBECOM Workshops on Web and Pervasive Security, vol.6, no.10, pp.1545-1549, December 2010. [4] Udhayan J., Hamsapriya T., "Statistical segregation method to minimize the false detections during DDoS attacks", International Journal of Network Security ,vol.13, pp. 152-160, November 2011. [5] S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, F. Tang, "Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient", IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 6, June 2012.