SlideShare a Scribd company logo
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
A System for Denial-of-Service Attack Detection Based on 
Multivariate Correlation Analysis 
ABSTRACT: 
Interconnected systems, such as Web servers, database servers, cloud computing 
servers etc, are now under threads from network attackers. As one of most 
common and aggressive means, Denial-of-Service (DoS) attacks cause serious 
impact on these computing systems. In this paper, we present a DoS attack 
detection system that uses Multivariate Correlation Analysis (MCA) for accurate 
network traffic characterization by extracting the geometrical correlations between 
network traffic features. Our MCA-based DoS attack detection system employs the 
principle of anomaly-based detection in attack recognition. This makes our 
solution capable of detecting known and unknown DoS attacks effectively by 
learning the patterns of legitimate network traffic only. Furthermore, a triangle-area- 
based technique is proposed to enhance and to speed up the process of MCA. 
The effectiveness of our proposed detection system is evaluated using KDD Cup 
99 dataset, and the influences of both non-normalized data and normalized data on 
the performance of the proposed detection system are examined. The results show
that our system outperforms two other previously developed state-of-the-art 
approaches in terms of detection accuracy. 
EXISTING SYSTEM: 
Generally, network-based detection systems can be classified into two main 
categories, namely misuse-based detection systems and anomaly-based detection 
systems. Misuse-based detection systems detect attacks by monitoring network 
activities and looking for matches with the existing attack signatures. In spite of 
having high detection rates to known attacks and low false positive rates, misuse-based 
detection systems are easily evaded by any new attacks and even variants of 
the existing attacks. Furthermore, it is a complicated and labor intensive task to 
keep signature database updated because signature generation is a manual process 
and heavily involves network security expertise. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Most existing IDS are optimized to detect attacks with high accuracy. 
However, they still have various disadvantages that have been outlined in a 
number of publications and a lot of work has been done to analyze IDS in 
order to direct future research. 
 Besides others, one drawback is the large amount of alerts produced. 
PROPOSED SYSTEM: 
In this paper, we present a DoS attack detection system that uses Multivariate 
Correlation Analysis (MCA) for accurate network traffic characterization by
extracting the geometrical correlations between network traffic features. Our 
MCA-based DoS attack detection system employs the principle of anomaly-based 
detection in attack recognition. 
The DoS attack detection system presented in this paper employs the principles of 
MCA and anomaly-based detection. They equip our detection system with 
capabilities of accurate characterization for traffic behaviors and detection of 
known and unknown attacks respectively. A triangle area technique is developed to 
enhance and to speed up the process of MCA. A statistical normalization technique 
is used to eliminate the bias from the raw data. 
ADVANTAGES OF PROPOSED SYSTEM: 
 More detection accuracy 
 Less false alarm 
 Accurate characterization for traffic behaviors and detection of known and 
unknown attacks respectively 
SYSTEM ARCHITECTURE: 
BLOCK DIAGRAM:
Client Router Correlation 
Graph Analysis Server Attack Detection 
MODULES: 
1. Feature Normalization 
2. Multivariate Correlation Analysis 
3. Decision Making Module 
4. Evaluation of Attack detection 
MODULES DESCRIPTION: 
1. Feature Normalization Module: 
Analysis 
In this module, basic features are generated from ingress network traffic to the 
internal network where protected servers reside in and are used to form traffic 
records for a well-defined time interval. Monitoring and analyzing at the 
destination network reduce the overhead of detecting malicious activities by 
concentrating only on relevant inbound traffic. This also enables our detector to 
provide protection which is the best fit for the targeted internal network because
legitimate traffic profiles used by the detectors are developed for a smaller number 
of network services. 
2. Multivariate Correlation Analysis: 
In this Multivariate Correlation Analysis, in which the “Triangle Area Map 
Generation” module is applied to extract the correlations between two distinct 
features within each traffic record coming from the first step or the traffic record 
normalized by the “Feature Normalization” module in this step. The occurrence of 
network intrusions cause changes to these correlations so that the changes can be 
used as indicators to identify the intrusive activities. All the extracted correlations, 
namely triangle areas stored in Triangle Area Maps (TAMs), are then used to 
replace the original basic features or the normalized features to represent the traffic 
records. This provides higher discriminative information to differentiate between 
legitimate and illegitimate traffic records. 
3. Decision Making Module: 
In this module, the anomaly-based detection mechanism is adopted in Decision 
Making. It facilitates the detection of any DoS attacks without requiring any attack 
relevant knowledge. Furthermore, the labor-intensive attack analysis and the 
frequent update of the attack signature database in the case of misuse-based 
detection are avoided. Meanwhile, the mechanism enhances the robustness of the 
proposed detectors and makes them harder to be evaded because attackers need to 
generate attacks that match the normal traffic profiles built by a specific detection 
algorithm. This, however, is a labor-intensive task and requires expertise in the 
targeted detection algorithm. Specifically, two phases (i.e., the “Training Phase” 
and the “Test Phase”) are involved in Decision Making. The “Normal Profile
Generation” module is operated in the “Training Phase” to generate profiles for 
various types of legitimate traffic records, and the generated normal profiles are 
stored in a database. The “Tested Profile Generation” module is used in the “Test 
Phase” to build profiles for individual observed traffic records. Then, the tested 
profiles are handed over to the “Attack Detection” module, which compares the 
individual tested profiles with the respective stored normal profiles. A threshold-based 
classifier is emp loyed in the “Attack Detection” module to distinguish DoS 
attacks from legitimate traffic. 
4. Evaluation of Attack detection 
During the evaluation, the 10 percent labeled data of KDD Cup 99 dataset is used, 
where three types of legitimate traffic (TCP, UDP and ICMP traffic) and six 
different types of DoS attacks (Teardrop, Smurf, Pod, Neptune, Land and Back 
attacks) are available. All of these records are first filtered and then are further 
grouped into seven clusters according to their labels. We show the evaluation 
results in graph. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
REFERENCE: 
Zhiyuan Tan, Aruna Jamdagni, Xiangjian He‡, Senior Member, IEEE, Priyadarsi 
Nanda, Member, IEEE, and Ren Ping Liu, Member, IEEE, “A System for Denial-of- 
Service Attack Detection Based on Multivariate Correlation Analysis”, IEEE 
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , 
NO. , 2014.

More Related Content

DOCX
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
DOCX
a system for denial-of-service attack detection based on multivariate correla...
DOCX
a system for denial-of-service attack detection based on multivariate correla...
PDF
Iaetsd a survey on detecting denial-of-service attacks
DOCX
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
PPTX
A system for denial of-service attack detection based on multivariate correla...
DOCX
A system for denial of-service attack detection based on multivariate correla...
DOC
A system for denial of-service attack detection based on multivariate correla...
JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariat...
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
Iaetsd a survey on detecting denial-of-service attacks
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...

What's hot (18)

DOC
A wireless intrusion detection system and a new attack model (synopsis)
DOCX
Ids 013 detection approaches
PDF
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
PDF
Optimized Intrusion Detection System using Deep Learning Algorithm
PPTX
Deep learning approach for network intrusion detection system
PDF
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
PDF
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
PDF
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
PDF
Deep Learning based Threat / Intrusion detection system
PDF
Internet ttraffic monitering anomalous behiviour detection
PDF
Vulnerability scanners a proactive approach to assess web application security
PPTX
Network Intrusion Detection and Countermeasure Selection
PDF
Icacci presentation-cnn intrusion
PDF
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
PDF
1762 1765
PDF
Intrusion detection
PPTX
Intrusion Detection with Neural Networks
DOCX
Nice network intrusion detection and countermeasure
A wireless intrusion detection system and a new attack model (synopsis)
Ids 013 detection approaches
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Net...
Optimized Intrusion Detection System using Deep Learning Algorithm
Deep learning approach for network intrusion detection system
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
Deep Learning based Threat / Intrusion detection system
Internet ttraffic monitering anomalous behiviour detection
Vulnerability scanners a proactive approach to assess web application security
Network Intrusion Detection and Countermeasure Selection
Icacci presentation-cnn intrusion
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
1762 1765
Intrusion detection
Intrusion Detection with Neural Networks
Nice network intrusion detection and countermeasure
Ad

Viewers also liked (16)

PPT
Pre assessment
PPTX
My neighborhood
PPTX
Pr11 production commentary
PDF
Demonstra preview 2012
PPTX
4 h scientifically speaking
PDF
2014 Laborshed Report (Executive Summary)
DOCX
Serra's Magazine Group 4.
PPT
ten24 Web Engineering
PPT
Stars above bryce2010
PPT
Ford's Theater PowerPoint Presentation
PPT
09 Methods
PDF
TAUS MT SHOWCASE, Microsoft Translator, Chris Wendt, Microsoft, 10 October 2013
PPT
Intro To Business; Lesson 1 4
PPS
Sri Lankan Tamils
PDF
2011년 사회조사(나눔문화) 결과_보도자료
PPTX
Anger Management Tips
Pre assessment
My neighborhood
Pr11 production commentary
Demonstra preview 2012
4 h scientifically speaking
2014 Laborshed Report (Executive Summary)
Serra's Magazine Group 4.
ten24 Web Engineering
Stars above bryce2010
Ford's Theater PowerPoint Presentation
09 Methods
TAUS MT SHOWCASE, Microsoft Translator, Chris Wendt, Microsoft, 10 October 2013
Intro To Business; Lesson 1 4
Sri Lankan Tamils
2011년 사회조사(나눔문화) 결과_보도자료
Anger Management Tips
Ad

Similar to 2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-attack-detection-based-on-multivariate-correlation-analysis (20)

PDF
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
PDF
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
DOCX
COPYRIGHTThis thesis is copyright materials protected under the .docx
PDF
A Survey On Intrusion Detection Systems
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
PPTX
Presentation1.pptx
PDF
A novel signature based traffic classification engine to reduce false alarms ...
DOCX
Machine learning techniques applied to detect cyber attacks on web applications
DOCX
Machine learning techniques applied to detect cyber attacks on web applications
PDF
A web application detecting dos attack using mca and tam
PDF
Intrusion Detection Systems By Anamoly-Based Using Neural Network
PDF
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
PPTX
Hybrid black chain based on authentication identified scheme
PDF
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
PDF
1762 1765
PPTX
spamzombieppt
PDF
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
PDF
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
PDF
IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK ...
PDF
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
COPYRIGHTThis thesis is copyright materials protected under the .docx
A Survey On Intrusion Detection Systems
Secure intrusion detection and countermeasure selection in virtual system usi...
Presentation1.pptx
A novel signature based traffic classification engine to reduce false alarms ...
Machine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applications
A web application detecting dos attack using mca and tam
Intrusion Detection Systems By Anamoly-Based Using Neural Network
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
Hybrid black chain based on authentication identified scheme
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
1762 1765
spamzombieppt
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK ...
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic

More from IEEEGLOBALSOFTSTUDENTSPROJECTS (20)

PDF
2014 2015 ieee dotnet projects globalsoft technologies
PDF
2014 2015 ieee java projects globalsoft technologies
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
DOCX
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...
2014 2015 ieee dotnet projects globalsoft technologies
2014 2015 ieee java projects globalsoft technologies
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Signature searching in a networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT On social delay tolerant networ...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Multicast capacity-in-manet-wit...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT Efficient data-query-in-intermi...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A probabilistic-misbehavior-det...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Trajectory improves data delivery...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Tracon interference aware schedul...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The design-and-evaluation-of-an-i...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Streaming applications on bus bas...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Securing brokerless publish subsc...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Secure outsourced-attribute-based...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Rre a-game-theoretic-intrusion-re...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Peer assisted vod systems an effi...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On false-data-injection-attacks-a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT On social delay tolerant networki...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Constructing load balanced data a...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT An ontology based hybrid approach...

Recently uploaded (20)

PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Digital Logic Computer Design lecture notes
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
PPT on Performance Review to get promotions
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Lecture Notes Electrical Wiring System Components
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
DOCX
573137875-Attendance-Management-System-original
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPT
Mechanical Engineering MATERIALS Selection
PDF
composite construction of structures.pdf
PDF
Well-logging-methods_new................
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Foundation to blockchain - A guide to Blockchain Tech
Digital Logic Computer Design lecture notes
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Automation-in-Manufacturing-Chapter-Introduction.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
PPT on Performance Review to get promotions
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Lecture Notes Electrical Wiring System Components
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
UNIT 4 Total Quality Management .pptx
Operating System & Kernel Study Guide-1 - converted.pdf
573137875-Attendance-Management-System-original
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Mechanical Engineering MATERIALS Selection
composite construction of structures.pdf
Well-logging-methods_new................
R24 SURVEYING LAB MANUAL for civil enggi
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-attack-detection-based-on-multivariate-correlation-analysis

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis ABSTRACT: Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle-area- based technique is proposed to enhance and to speed up the process of MCA. The effectiveness of our proposed detection system is evaluated using KDD Cup 99 dataset, and the influences of both non-normalized data and normalized data on the performance of the proposed detection system are examined. The results show
  • 2. that our system outperforms two other previously developed state-of-the-art approaches in terms of detection accuracy. EXISTING SYSTEM: Generally, network-based detection systems can be classified into two main categories, namely misuse-based detection systems and anomaly-based detection systems. Misuse-based detection systems detect attacks by monitoring network activities and looking for matches with the existing attack signatures. In spite of having high detection rates to known attacks and low false positive rates, misuse-based detection systems are easily evaded by any new attacks and even variants of the existing attacks. Furthermore, it is a complicated and labor intensive task to keep signature database updated because signature generation is a manual process and heavily involves network security expertise. DISADVANTAGES OF EXISTING SYSTEM:  Most existing IDS are optimized to detect attacks with high accuracy. However, they still have various disadvantages that have been outlined in a number of publications and a lot of work has been done to analyze IDS in order to direct future research.  Besides others, one drawback is the large amount of alerts produced. PROPOSED SYSTEM: In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by
  • 3. extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. The DoS attack detection system presented in this paper employs the principles of MCA and anomaly-based detection. They equip our detection system with capabilities of accurate characterization for traffic behaviors and detection of known and unknown attacks respectively. A triangle area technique is developed to enhance and to speed up the process of MCA. A statistical normalization technique is used to eliminate the bias from the raw data. ADVANTAGES OF PROPOSED SYSTEM:  More detection accuracy  Less false alarm  Accurate characterization for traffic behaviors and detection of known and unknown attacks respectively SYSTEM ARCHITECTURE: BLOCK DIAGRAM:
  • 4. Client Router Correlation Graph Analysis Server Attack Detection MODULES: 1. Feature Normalization 2. Multivariate Correlation Analysis 3. Decision Making Module 4. Evaluation of Attack detection MODULES DESCRIPTION: 1. Feature Normalization Module: Analysis In this module, basic features are generated from ingress network traffic to the internal network where protected servers reside in and are used to form traffic records for a well-defined time interval. Monitoring and analyzing at the destination network reduce the overhead of detecting malicious activities by concentrating only on relevant inbound traffic. This also enables our detector to provide protection which is the best fit for the targeted internal network because
  • 5. legitimate traffic profiles used by the detectors are developed for a smaller number of network services. 2. Multivariate Correlation Analysis: In this Multivariate Correlation Analysis, in which the “Triangle Area Map Generation” module is applied to extract the correlations between two distinct features within each traffic record coming from the first step or the traffic record normalized by the “Feature Normalization” module in this step. The occurrence of network intrusions cause changes to these correlations so that the changes can be used as indicators to identify the intrusive activities. All the extracted correlations, namely triangle areas stored in Triangle Area Maps (TAMs), are then used to replace the original basic features or the normalized features to represent the traffic records. This provides higher discriminative information to differentiate between legitimate and illegitimate traffic records. 3. Decision Making Module: In this module, the anomaly-based detection mechanism is adopted in Decision Making. It facilitates the detection of any DoS attacks without requiring any attack relevant knowledge. Furthermore, the labor-intensive attack analysis and the frequent update of the attack signature database in the case of misuse-based detection are avoided. Meanwhile, the mechanism enhances the robustness of the proposed detectors and makes them harder to be evaded because attackers need to generate attacks that match the normal traffic profiles built by a specific detection algorithm. This, however, is a labor-intensive task and requires expertise in the targeted detection algorithm. Specifically, two phases (i.e., the “Training Phase” and the “Test Phase”) are involved in Decision Making. The “Normal Profile
  • 6. Generation” module is operated in the “Training Phase” to generate profiles for various types of legitimate traffic records, and the generated normal profiles are stored in a database. The “Tested Profile Generation” module is used in the “Test Phase” to build profiles for individual observed traffic records. Then, the tested profiles are handed over to the “Attack Detection” module, which compares the individual tested profiles with the respective stored normal profiles. A threshold-based classifier is emp loyed in the “Attack Detection” module to distinguish DoS attacks from legitimate traffic. 4. Evaluation of Attack detection During the evaluation, the 10 percent labeled data of KDD Cup 99 dataset is used, where three types of legitimate traffic (TCP, UDP and ICMP traffic) and six different types of DoS attacks (Teardrop, Smurf, Pod, Neptune, Land and Back attacks) are available. All of these records are first filtered and then are further grouped into seven clusters according to their labels. We show the evaluation results in graph. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.
  • 7. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Zhiyuan Tan, Aruna Jamdagni, Xiangjian He‡, Senior Member, IEEE, Priyadarsi Nanda, Member, IEEE, and Ren Ping Liu, Member, IEEE, “A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2014.