SlideShare a Scribd company logo
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 
A System for Denial-of-Service Attack DetectionBased on Multivariate 
Correlation Analysis 
ABSTRACT 
Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are 
now under threads from network attackers. As one of most common and aggressive means, 
Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, 
we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for 
accurate network traffic characterization by extracting the geometrical correlations between 
network traffic features. Our MCA-based DoS attack detection system employs the principle of 
anomaly-based detection in attack recognition. This makes our solution capable of detecting 
known and unknown DoS attacks effectively by learning the patterns of legitimate network 
traffic only. Furthermore, a triangle-area-based technique is proposed to enhance and to speed up 
the process of MCA. The effectiveness of our proposed detection system is evaluated using KDD 
Cup 99 dataset, and the influences of both non-normalized data and normalized data on the 
performance of the proposed detection system are examined. The results show that our system 
outperforms two other previously developed state-of-the-art approaches in terms of detection 
accuracy. 
Generally, network-based detection systems can be classified into two main categories, namely 
misuse-based detection systems and anomaly-based detection systems. Misuse-based detection 
systems detect attacks by monitoring network activities and looking for matches with the 
existing attack signatures. In spite of having high detection rates to known attacks and low false 
positive rates, misuse-based detection systems are easily evaded by any new attacks and even 
variants of the existing attacks. Furthermore, it is a complicated and labor intensive task to keep 
signature database updated because signature generation is a manual process and heavily 
involves network security expertise. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Most existing IDS are optimized to detect attacks with high accuracy. However, they still 
have various disadvantages that have been outlined in a number of publications and a lot 
of work has been done to analyze IDS in order to direct future research. 
Contact: 9703109334, 9533694296 
EXISTING SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 
 Besides others, one drawback is the large amount of alerts produced. 
In this paper, we present a DoS attack detection system that uses Multivariate Correla tion 
Analysis (MCA) for accurate network traffic characterization by extracting the geometrical 
correlations between network traffic features. Our MCA-based DoS attack detection system 
employs the principle of anomaly-based detection in attack recognition. 
The DoS attack detection system presented in this paper employs the principles of MCA and 
anomaly-based detection. They equip our detection system with capabilities of accurate 
characterization for traffic behaviors and detection of known and unknown attacks respectively. 
A triangle area technique is developed to enhance and to speed up the process of MCA. A 
statistical normalization technique is used to eliminate the bias from the raw data. 
ADVANTAGES OF PROPOSED SYSTEM: 
 More detection accuracy 
 Accurate characterization for traffic behaviors and detection of known and unknown 
SYSTEM ARCHITECTURE: 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
 Less false alarm 
attacks respectively 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 
Client Router Correlation 
Graph Analysis Server Attack Detection 
Contact: 9703109334, 9533694296 
BLOCK DIAGRAM: 
Analysis 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in 
MODULES: 
1. Feature Normalization 
2. Multivariate Correlation Analysis 
3. Decision Making Module 
4. Evaluation of Attack detection 
MODULES DESCRIPTION: 
1. Feature Normalization Module: 
In this module, basic features are generated from ingress network traffic to the internal network 
where protected servers reside in and are used to form traffic records for a well-defined time 
interval. Monitoring and analyzing at the destination network reduce the overhead of detecting 
malicious activities by concentrating only on relevant inbound traffic. This also enables our 
detector to provide protection which is the best fit for the targeted internal network because 
legitimate traffic profiles used by the detectors are developed for a smaller number of network 
services.
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 
2. Multivariate Correlation Analysis: 
In this Multivariate Correlation Analysis, in which the “Triangle Area Map Generation” module 
is applied to extract the correlations between two distinct features within each traffic record 
coming from the first step or the traffic record normalized by the “Feature Normalization” 
module in this step. The occurrence of network intrusions cause changes to these correlations so 
that the changes can be used as indicators to identify the intrusive activities. All the extracted 
correlations, namely triangle areas stored in Triangle Area Maps (TAMs), are then used to 
replace the original basic features or the normalized features to represent the traffic records. This 
provides higher discriminative information to differentiate between legitimate and illegitimate 
traffic records. 
3. Decision Making Module: 
In this module, the anomaly-based detection mechanism is adopted in Decision Making. It 
facilitates the detection of any DoS attacks without requiring any attack relevant knowledge. 
Furthermore, the labor-intensive attack analysis and the frequent update of the attack signature 
database in the case of misuse-based detection are avoided. Meanwhile, the mechanism enhances 
the robustness of the proposed detectors and makes them harder to be evaded because attackers 
need to generate attacks that match the normal traffic profiles built by a specific detection 
algorithm. This, however, is a labor-intensive task and requires expertise in the targeted detection 
algorithm. Specifically, two phases (i.e., the “Training Phase” and the “Test Phase”) are involved 
in Decision Making. The “Normal Profile Generation” module is operated in the “Training 
Phase” to generate profiles for various types of legitimate traffic records, and the generated 
normal profiles are stored in a database. The “Tested Profile Generation” module is used in the 
“Test Phase” to build profiles for individual observed traffic records. Then, the tested profiles are 
handed over to the “Attack Detection” module, which compares the ind ividual tested profiles 
with the respective stored normal profiles. A threshold-based classifier is employed in the 
“Attack Detection” module to distinguish DoS attacks from legitimate traffic. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 
4. Evaluation of Attack detection 
During the evaluation, the 10 percent labeled data of KDD Cup 99 dataset is used, where three 
types of legitimate traffic (TCP, UDP and ICMP traffic) and six different types of DoS attacks 
(Teardrop, Smurf, Pod, Neptune, Land and Back attacks) are available. All of these records are 
first filtered and then are further grouped into seven clusters according to their labels. We show 
the evaluation results in graph. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
Zhiyuan Tan, Aruna Jamdagni, Xiangjian He‡, Senior Member, IEEE, Priyadarsi Nanda, 
Member, IEEE, and Ren Ping Liu, Member, IEEE, “A System for Denial-of-Service Attack 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 
Detection Based on Multivariate Correlation Analysis”, IEEE TRANSACTIONS ON 
PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2014. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

DOCX
a system for denial-of-service attack detection based on multivariate correla...
DOCX
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
PPTX
A system for denial of-service attack detection based on multivariate correla...
DOCX
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
PDF
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
PDF
Iaetsd a survey on detecting denial-of-service attacks
DOCX
A system for denial of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
A system for denial of-service attack detection based on multivariate correla...
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
Iaetsd a survey on detecting denial-of-service attacks
A system for denial of-service attack detection based on multivariate correla...

What's hot (16)

PDF
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
PDF
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
PDF
IRJET - A Secure Approach for Intruder Detection using Backtracking
PDF
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
PDF
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
PDF
1762 1765
PDF
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
PDF
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
PDF
An anomalous behavior detection model in cloud computing
PDF
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
PDF
Secure intrusion detection and attack measure selection
PDF
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PDF
Limiting self propagating malware based
PDF
Optimised malware detection in digital forensics
PDF
F0371046050
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
IRJET - A Secure Approach for Intruder Detection using Backtracking
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
1762 1765
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
An anomalous behavior detection model in cloud computing
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
Secure intrusion detection and attack measure selection
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
A wireless intrusion detection system and a new attack model (synopsis)
Limiting self propagating malware based
Optimised malware detection in digital forensics
F0371046050
Ad

Viewers also liked (6)

PPTX
dos attacks
PPTX
Statistical Analysis of Left-Censored Geochemical Data
PPS
Statistics
PPT
Prote-OMIC Data Analysis and Visualization
PDF
Anomaly detection Meetup Slides
PDF
Build Features, Not Apps
dos attacks
Statistical Analysis of Left-Censored Geochemical Data
Statistics
Prote-OMIC Data Analysis and Visualization
Anomaly detection Meetup Slides
Build Features, Not Apps
Ad

Similar to a system for denial-of-service attack detection based on multivariate correlation analysis (20)

DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
DOC
A system for denial of-service attack detection based on multivariate correla...
DOCX
COPYRIGHTThis thesis is copyright materials protected under the .docx
PDF
A novel signature based traffic classification engine to reduce false alarms ...
PDF
IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK ...
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
PDF
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
PDF
A Survey On Intrusion Detection Systems
PDF
IEEE- Intrusion Detection Model using Self Organizing Map
PDF
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
PDF
1762 1765
PDF
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
PDF
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
PDF
Intrusion Detection System using Hidden Markov Model (HMM)
DOCX
Machine learning techniques applied to detect cyber attacks on web applications
DOCX
Machine learning techniques applied to detect cyber attacks on web applications
PPTX
spamzombieppt
PDF
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
PDF
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
PDF
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
A system for denial of-service attack detection based on multivariate correla...
COPYRIGHTThis thesis is copyright materials protected under the .docx
A novel signature based traffic classification engine to reduce false alarms ...
IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK ...
Secure intrusion detection and countermeasure selection in virtual system usi...
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
A Survey On Intrusion Detection Systems
IEEE- Intrusion Detection Model using Self Organizing Map
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
1762 1765
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
Intrusion Detection System using Hidden Markov Model (HMM)
Machine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applications
spamzombieppt
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
DOCX
web service recommendation via exploiting location and qo s information
DOCX
privacy-enhanced web service composition
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
DOCX
friend book a semantic-based friend recommendation system for social networks
DOCX
efficient authentication for mobile and pervasive computing
DOCX
cooperative caching for efficient data access in disruption tolerant networks
DOCX
an incentive framework for cellular traffic offloading
DOCX
secure outsourced attribute-based signatures
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
DOCX
the design and evaluation of an information sharing system for human networks
DOCX
the client assignment problem for continuous distributed interactive applicat...
DOCX
sos a distributed mobile q&a system based on social networks
DOCX
securing broker-less publish subscribe systems using identity-based encryption
DOCX
rre a game-theoretic intrusion response and recovery engine
DOCX
on false data-injection attacks against power system state estimation modelin...
DOCX
loca ward a security and privacy aware location-based rewarding system
DOCX
exploiting service similarity for privacy in location-based search queries
DOCX
enabling trustworthy service evaluation in service-oriented mobile social net...
DOCX
secure data retrieval for decentralized disruption-tolerant military networks
secure mining of association rules in horizontally distributed databases
web service recommendation via exploiting location and qo s information
privacy-enhanced web service composition
optimal distributed malware defense in mobile networks with heterogeneous dev...
friend book a semantic-based friend recommendation system for social networks
efficient authentication for mobile and pervasive computing
cooperative caching for efficient data access in disruption tolerant networks
an incentive framework for cellular traffic offloading
secure outsourced attribute-based signatures
traffic pattern-based content leakage detection for trusted content delivery ...
the design and evaluation of an information sharing system for human networks
the client assignment problem for continuous distributed interactive applicat...
sos a distributed mobile q&a system based on social networks
securing broker-less publish subscribe systems using identity-based encryption
rre a game-theoretic intrusion response and recovery engine
on false data-injection attacks against power system state estimation modelin...
loca ward a security and privacy aware location-based rewarding system
exploiting service similarity for privacy in location-based search queries
enabling trustworthy service evaluation in service-oriented mobile social net...
secure data retrieval for decentralized disruption-tolerant military networks

Recently uploaded (20)

PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Well-logging-methods_new................
PPTX
Sustainable Sites - Green Building Construction
PPT
Project quality management in manufacturing
PPT
Mechanical Engineering MATERIALS Selection
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Welding lecture in detail for understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Geodesy 1.pptx...............................................
PDF
Digital Logic Computer Design lecture notes
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
Well-logging-methods_new................
Sustainable Sites - Green Building Construction
Project quality management in manufacturing
Mechanical Engineering MATERIALS Selection
additive manufacturing of ss316l using mig welding
Welding lecture in detail for understanding
bas. eng. economics group 4 presentation 1.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
CYBER-CRIMES AND SECURITY A guide to understanding
Geodesy 1.pptx...............................................
Digital Logic Computer Design lecture notes
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Foundation to blockchain - A guide to Blockchain Tech
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Internet of Things (IOT) - A guide to understanding
Operating System & Kernel Study Guide-1 - converted.pdf

a system for denial-of-service attack detection based on multivariate correlation analysis

  • 1. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis A System for Denial-of-Service Attack DetectionBased on Multivariate Correlation Analysis ABSTRACT Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle-area-based technique is proposed to enhance and to speed up the process of MCA. The effectiveness of our proposed detection system is evaluated using KDD Cup 99 dataset, and the influences of both non-normalized data and normalized data on the performance of the proposed detection system are examined. The results show that our system outperforms two other previously developed state-of-the-art approaches in terms of detection accuracy. Generally, network-based detection systems can be classified into two main categories, namely misuse-based detection systems and anomaly-based detection systems. Misuse-based detection systems detect attacks by monitoring network activities and looking for matches with the existing attack signatures. In spite of having high detection rates to known attacks and low false positive rates, misuse-based detection systems are easily evaded by any new attacks and even variants of the existing attacks. Furthermore, it is a complicated and labor intensive task to keep signature database updated because signature generation is a manual process and heavily involves network security expertise. DISADVANTAGES OF EXISTING SYSTEM:  Most existing IDS are optimized to detect attacks with high accuracy. However, they still have various disadvantages that have been outlined in a number of publications and a lot of work has been done to analyze IDS in order to direct future research. Contact: 9703109334, 9533694296 EXISTING SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis  Besides others, one drawback is the large amount of alerts produced. In this paper, we present a DoS attack detection system that uses Multivariate Correla tion Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. The DoS attack detection system presented in this paper employs the principles of MCA and anomaly-based detection. They equip our detection system with capabilities of accurate characterization for traffic behaviors and detection of known and unknown attacks respectively. A triangle area technique is developed to enhance and to speed up the process of MCA. A statistical normalization technique is used to eliminate the bias from the raw data. ADVANTAGES OF PROPOSED SYSTEM:  More detection accuracy  Accurate characterization for traffic behaviors and detection of known and unknown SYSTEM ARCHITECTURE: Contact: 9703109334, 9533694296 PROPOSED SYSTEM:  Less false alarm attacks respectively Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Client Router Correlation Graph Analysis Server Attack Detection Contact: 9703109334, 9533694296 BLOCK DIAGRAM: Analysis Email id: academicliveprojects@gmail.com, www.logicsystems.org.in MODULES: 1. Feature Normalization 2. Multivariate Correlation Analysis 3. Decision Making Module 4. Evaluation of Attack detection MODULES DESCRIPTION: 1. Feature Normalization Module: In this module, basic features are generated from ingress network traffic to the internal network where protected servers reside in and are used to form traffic records for a well-defined time interval. Monitoring and analyzing at the destination network reduce the overhead of detecting malicious activities by concentrating only on relevant inbound traffic. This also enables our detector to provide protection which is the best fit for the targeted internal network because legitimate traffic profiles used by the detectors are developed for a smaller number of network services.
  • 4. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 2. Multivariate Correlation Analysis: In this Multivariate Correlation Analysis, in which the “Triangle Area Map Generation” module is applied to extract the correlations between two distinct features within each traffic record coming from the first step or the traffic record normalized by the “Feature Normalization” module in this step. The occurrence of network intrusions cause changes to these correlations so that the changes can be used as indicators to identify the intrusive activities. All the extracted correlations, namely triangle areas stored in Triangle Area Maps (TAMs), are then used to replace the original basic features or the normalized features to represent the traffic records. This provides higher discriminative information to differentiate between legitimate and illegitimate traffic records. 3. Decision Making Module: In this module, the anomaly-based detection mechanism is adopted in Decision Making. It facilitates the detection of any DoS attacks without requiring any attack relevant knowledge. Furthermore, the labor-intensive attack analysis and the frequent update of the attack signature database in the case of misuse-based detection are avoided. Meanwhile, the mechanism enhances the robustness of the proposed detectors and makes them harder to be evaded because attackers need to generate attacks that match the normal traffic profiles built by a specific detection algorithm. This, however, is a labor-intensive task and requires expertise in the targeted detection algorithm. Specifically, two phases (i.e., the “Training Phase” and the “Test Phase”) are involved in Decision Making. The “Normal Profile Generation” module is operated in the “Training Phase” to generate profiles for various types of legitimate traffic records, and the generated normal profiles are stored in a database. The “Tested Profile Generation” module is used in the “Test Phase” to build profiles for individual observed traffic records. Then, the tested profiles are handed over to the “Attack Detection” module, which compares the ind ividual tested profiles with the respective stored normal profiles. A threshold-based classifier is employed in the “Attack Detection” module to distinguish DoS attacks from legitimate traffic. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 5. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 4. Evaluation of Attack detection During the evaluation, the 10 percent labeled data of KDD Cup 99 dataset is used, where three types of legitimate traffic (TCP, UDP and ICMP traffic) and six different types of DoS attacks (Teardrop, Smurf, Pod, Neptune, Land and Back attacks) are available. All of these records are first filtered and then are further grouped into seven clusters according to their labels. We show the evaluation results in graph. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 Zhiyuan Tan, Aruna Jamdagni, Xiangjian He‡, Senior Member, IEEE, Priyadarsi Nanda, Member, IEEE, and Ren Ping Liu, Member, IEEE, “A System for Denial-of-Service Attack Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 6. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Detection Based on Multivariate Correlation Analysis”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2014. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in