The growth of Internet and local area networks
provide quality and convenience to human life but at the same
time provides a platform for network hackers and criminals.
Internet security hence becomes an important problem in near
future. Blocking availability of an Internet service may imply
large financial losses, as in the case of an attack that prevented
users from having steady connectivity to major e-commerce Web
sites. Such attacks that aimed at blocking availability of
computer systems or services are generally referred to as Denial
of Service (DoS) Attacks. As more and more essential services
become reliant on the Internet as part of their communication
infrastructure, the consequences of denial of service attacks can
be very damaging. Therefore, it is crucial to deter, or otherwise
minimize, the damage caused by denial of service attacks.
Published In : IJCAT Journal Volume 2, Issue 2
Date of Publication : 28 February 2015
Pages : 97 - 100
Figures :--
Tables : 01
Publication Link :A Survey on Denial of Service Attack Detection
Systems Based on Feature Correlation Analysis
Binil Anto Thampi C. : M.Tech Student, Computer Science And engineering, MES college of Engineering
Malappuram, Kerala, India
Syed Farook K. : Assistant Professor, Computer Science And engineering, MES college of Engineering
Malappuram, Kerala, India
Anomaly Detection
Availability
Denial of
Service Attack
Feature Correlation
Internet Security
This work performs the review among recent statistical
network intrusion detection methods uses feature
correlation analysis. These methods find out the
anomalies in network using statistical parameters and
used in many systems.
[1] Tavallaee, M., Wei Lu; Iqbal, S.A.; Ghorbani, A.A. A
Novel Covariance Matrix Based Approach for
Detecting Network Anomalies Communication
Networks and Services Research Conference, 2008.
6th Annual, IEEE Computer Society, vol. 75, no. 81,
pp. 5-8, May 2008.
[2] Jamdagni A., Zhiyuan Tan, Nanda P., Xiangjian He,
Ren Liu, "Intrusion Detection Using Geometrical
Structure", Frontier of Computer Science and
Technology, 2009. Fourth International Conference,
IEEE Computer Society, vol. 327, no. 333, pp. 17-19,
December. 2009
[3] Zhiyuan Tan, Jamdagni A., Xiangjian He, Nanda P.,
"Network Intrusion Detection based on LDA for
payload feature selection", IEEE GLOBECOM
Workshops on Web and Pervasive Security, vol.6,
no.10, pp.1545-1549, December 2010.
[4] Udhayan J., Hamsapriya T., "Statistical segregation
method to minimize the false detections during DDoS
attacks", International Journal of Network Security
,vol.13, pp. 152-160, November 2011.
[5] S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, F. Tang,
"Discriminating DDoS Attacks from Flash Crowds
Using Flow Correlation Coefficient", IEEE Trans.
Parallel and Distributed Systems, vol. 23, no. 6, June
2012.