SlideShare a Scribd company logo
A System for Denial-of-Service Attack Detection Based on 
Multivariate Correlation Analysis 
ABSTRACT: 
Interconnected systems, such as Web servers, database servers, cloud computing 
servers etc, are now under threads from network attackers. As one of most 
common and aggressive means, Denial-of-Service (DoS) attacks cause serious 
impact on these computing systems. In this paper, we present a DoS attack 
detection system that uses Multivariate Correlation Analysis (MCA) for accurate 
network traffic characterization by extracting the geometrical correlations between 
network traffic features. Our MCA-based DoS attack detection system employs the 
principle of anomaly-based detection in attack recognition. This makes our 
solution capable of detecting known and unknown DoS attacks effectively by 
learning the patterns of legitimate network traffic only. Furthermore, a triangle-area- 
based technique is proposed to enhance and to speed up the process of MCA. 
The effectiveness of our proposed detection system is evaluated using KDD Cup 
99 dataset, and the influences of both non-normalized data and normalized data on 
the performance of the proposed detection system are examined. The results show 
that our system outperforms two other previously developed state-of-the-art 
approaches in terms of detection accuracy.
EXISTING SYSTEM: 
Generally, network-based detection systems can be classified into two main 
categories, namely misuse-based detection systems and anomaly-based detection 
systems. Misuse-based detection systems detect attacks by monitoring network 
activities and looking for matches with the existing attack signatures. In spite of 
having high detection rates to known attacks and low false positive rates, misuse-based 
detection systems are easily evaded by any new attacks and even variants of 
the existing attacks. Furthermore, it is a complicated and labor intensive task to 
keep signature database updated because signature generation is a manual process 
and heavily involves network security expertise. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Most existing IDS are optimized to detect attacks with high accuracy. 
However, they still have various disadvantages that have been outlined in a 
number of publications and a lot of work has been done to analyze IDS in 
order to direct future research. 
 Besides others, one drawback is the large amount of alerts produced.
PROPOSED SYSTEM: 
In this paper, we present a DoS attack detection system that uses Multivariate 
Correlation Analysis (MCA) for accurate network traffic characterization by 
extracting the geometrical correlations between network traffic features. Our 
MCA-based DoS attack detection system employs the principle of anomaly-based 
detection in attack recognition. 
The DoS attack detection system presented in this paper employs the principles of 
MCA and anomaly-based detection. They equip our detection system with 
capabilities of accurate characterization for traffic behaviors and detection of 
known and unknown attacks respectively. A triangle area technique is developed to 
enhance and to speed up the process of MCA. A statistical normalization technique 
is used to eliminate the bias from the raw data. 
ADVANTAGES OF PROPOSED SYSTEM: 
 More detection accuracy 
 Less false alarm 
 Accurate characterization for traffic behaviors and detection of known and 
unknown attacks respectively
SYSTEM ARCHITECTURE: 
BLOCK DIAGRAM: 
Client Router Correlation 
Analysis 
Graph Analysis Server Attack Detection
MODULES: 
1. Feature Normalization 
2. Multivariate Correlation Analysis 
3. Decision Making Module 
4. Evaluation of Attack detection 
MODULES DESCRIPTION: 
1. Feature Normalization Module: 
In this module, basic features are generated from ingress network traffic to the 
internal network where protected servers reside in and are used to form traffic 
records for a well-defined time interval. Monitoring and analyzing at the 
destination network reduce the overhead of detecting malicious activities by 
concentrating only on relevant inbound traffic. This also enables our detector to 
provide protection which is the best fit for the targeted internal network because 
legitimate traffic profiles used by the detectors are developed for a smaller number 
of network services. 
2. Multivariate Correlation Analysis: 
In this Multivariate Correlation Analysis, in which the “Triangle Area Map 
Generation” module is applied to extract the correlations between two distinct 
features within each traffic record coming from the first step or the traffic record
normalized by the “Feature Normalization” module in this step. The occurrence of 
network intrusions cause changes to these correlations so that the changes can be 
used as indicators to identify the intrusive activities. All the extracted correlations, 
namely triangle areas stored in Triangle Area Maps (TAMs), are then used to 
replace the original basic features or the normalized features to represent the traffic 
records. This provides higher discriminative information to differentiate between 
legitimate and illegitimate traffic records. 
3. Decision Making Module: 
In this module, the anomaly-based detection mechanism is adopted in Decision 
Making. It facilitates the detection of any DoS attacks without requiring any attack 
relevant knowledge. Furthermore, the labor-intensive attack analysis and the 
frequent update of the attack signature database in the case of misuse-based 
detection are avoided. Meanwhile, the mechanism enhances the robustness of the 
proposed detectors and makes them harder to be evaded because attackers need to 
generate attacks that match the normal traffic profiles built by a specific detection 
algorithm. This, however, is a labor-intensive task and requires expertise in the 
targeted detection algorithm. Specifically, two phases (i.e., the “Training Phase” 
and the “Test Phase”) are involved in Decision Making. The “Normal Profile 
Generation” module is operated in the “Training Phase” to generate profiles for
various types of legitimate traffic records, and the generated normal profiles are 
stored in a database. The “Tested Profile Generation” module is used in the “Test 
Phase” to build profiles for individual observed traffic records. Then, the tested 
profiles are handed over to the “Attack Detection” module, which compares the 
individual tested profiles with the respective stored normal profiles. A threshold-based 
classifier is employed in the “Attack Detection” module to distinguish DoS 
attacks from legitimate traffic. 
4. Evaluation of Attack detection 
During the evaluation, the 10 percent labeled data of KDD Cup 99 dataset is used, 
where three types of legitimate traffic (TCP, UDP and ICMP traffic) and six 
different types of DoS attacks (Teardrop, Smurf, Pod, Neptune, Land and Back 
attacks) are available. All of these records are first filtered and then are further 
grouped into seven clusters according to their labels. We show the evaluation 
results in graph. 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : ASP.net, C#.net 
 Tool : Visual Studio 2010 
 Database : SQL SERVER 2008 
REFERENCE: 
Zhiyuan Tan, Aruna Jamdagni, Xiangjian He‡, Senior Member, IEEE, Priyadarsi 
Nanda, Member, IEEE, and Ren Ping Liu, Member, IEEE, “A System for Denial-of- 
Service Attack Detection Based on Multivariate Correlation Analysis”, IEEE 
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , 
NO. , 2014.

More Related Content

DOCX
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
PDF
Iaetsd a survey on detecting denial-of-service attacks
DOCX
A system for denial of-service attack detection based on multivariate correla...
DOC
A system for denial of-service attack detection based on multivariate correla...
PPTX
A system for denial of-service attack detection based on multivariate correla...
PDF
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
DOCX
Ids 013 detection approaches
PDF
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
Iaetsd a survey on detecting denial-of-service attacks
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...
A System for Denial of Service Attack Detection Based On Multivariate Corelat...
Ids 013 detection approaches
Computer Worms Based on Monitoring Replication and Damage: Experiment and Eva...

What's hot (19)

PDF
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
PDF
Intrusion detection system based on web usage mining
PDF
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
PDF
Internet ttraffic monitering anomalous behiviour detection
PDF
A web application detecting dos attack using mca and tam
PDF
Protect mobile agent against malicious host using partial mobility mechanism
PDF
Cybersecurity Assessment of Communication-Based Train Control systems
PPTX
Network behavioral clustering engine
DOCX
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
PDF
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
DOC
On false data injection attacks against power system
DOCX
Network intrusion detection using supervised machine learning technique with ...
PDF
DB-OLS: An Approach for IDS1
PDF
Application of Data Mining Technique in Invasion Recognition
PDF
The International Journal of Engineering and Science (The IJES)
PDF
M41028892
DOCX
By passing infected areas in wireless sensor networks using bpr
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
Intrusion detection system based on web usage mining
A Survey on Hidden Markov Model (HMM) Based Intention Prediction Techniques
Internet ttraffic monitering anomalous behiviour detection
A web application detecting dos attack using mca and tam
Protect mobile agent against malicious host using partial mobility mechanism
Cybersecurity Assessment of Communication-Based Train Control systems
Network behavioral clustering engine
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
On false data injection attacks against power system
Network intrusion detection using supervised machine learning technique with ...
DB-OLS: An Approach for IDS1
Application of Data Mining Technique in Invasion Recognition
The International Journal of Engineering and Science (The IJES)
M41028892
By passing infected areas in wireless sensor networks using bpr
Ad

Viewers also liked (20)

PPTX
Luis chisiquinga
PDF
[Jpjr] sistema de gestão da qualidade
KEY
Switchonyourbiz
PDF
Volantes epi 2011
PPSX
Frases diversas xii
PPT
Ixda Shanghai Kickoff: APRIL 29TH, 2008
PPTX
Azure And Silverlight
PPTX
Rio+20 module, part 1 11.30.11 don
PPS
Quer jejuar nesta quaresma
PDF
Ivu loto numeros-ganadores
PPTX
Green ideas # 10 mangiare i frutti della stagione
PPTX
Monitoría hemodinámica perioperatoria
PDF
Ixmati Línea de Acción 6
DOC
Proyecto programación 2
PPT
June 14 - Corvallis Science Pub
PDF
Overview Of RBAC
DOC
Outline 2 5-11
PDF
Oviedo ief variaciones
PDF
Rio marina fase 2 cliente
Luis chisiquinga
[Jpjr] sistema de gestão da qualidade
Switchonyourbiz
Volantes epi 2011
Frases diversas xii
Ixda Shanghai Kickoff: APRIL 29TH, 2008
Azure And Silverlight
Rio+20 module, part 1 11.30.11 don
Quer jejuar nesta quaresma
Ivu loto numeros-ganadores
Green ideas # 10 mangiare i frutti della stagione
Monitoría hemodinámica perioperatoria
Ixmati Línea de Acción 6
Proyecto programación 2
June 14 - Corvallis Science Pub
Overview Of RBAC
Outline 2 5-11
Oviedo ief variaciones
Rio marina fase 2 cliente
Ad

Similar to JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis (20)

DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
DOCX
a system for denial-of-service attack detection based on multivariate correla...
DOCX
a system for denial-of-service attack detection based on multivariate correla...
PDF
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
DOCX
COPYRIGHTThis thesis is copyright materials protected under the .docx
DOCX
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
PPTX
dos attacks
PDF
M0446772
PDF
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
PDF
1762 1765
PDF
1762 1765
PDF
46 102-112
PDF
The Practical Data Mining Model for Efficient IDS through Relational Databases
PDF
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
PDF
Intrusion detection system via fuzzy
PDF
Gp3112671275
PDF
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
PDF
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
PDF
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
COPYRIGHTThis thesis is copyright materials protected under the .docx
A system for-denial-of-service-attack-detection-based-on-multivariate-correla...
dos attacks
M0446772
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
1762 1765
1762 1765
46 102-112
The Practical Data Mining Model for Efficient IDS through Relational Databases
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
Intrusion detection system via fuzzy
Gp3112671275
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...

More from chennaijp (20)

DOCX
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
DOCX
JPN1423 Stars a Statistical Traffic Pattern
DOCX
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
DOCX
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
DOCX
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
DOCX
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
DOCX
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
DOCX
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
DOCX
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
DOCX
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
DOCX
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
DOCX
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
DOCX
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
DOCX
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
DOCX
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
DOCX
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
DOCX
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
DOCX
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
DOCX
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
DOCX
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification
JPEEE1440 Cascaded Two-Level Inverter-Based Multilevel STATCOM for High-Pow...
JPN1423 Stars a Statistical Traffic Pattern
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1420 Joint Routing and Medium Access Control in Fixed Random Access Wire...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1417 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs ...
JPN1416 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor...
JPN1415 R3E: Reliable Reactive Routing Enhancement for Wireless Sensor Netw...
JPN1411 Secure Continuous Aggregation in Wireless Sensor Networks
JPN1414 Distributed Deployment Algorithms for Improved Coverage in a Networ...
JPN1413 An Energy-Balanced Routing Method Based on Forward-Aware Factor for...
JPN1412 Transmission-Efficient Clustering Method for Wireless Sensor Networ...
JPN1410 Secure and Efficient Data Transmission for Cluster-Based Wireless Se...
JPN1409 Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks
JPN1408 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sen...
JPN1406 Snapshot and Continuous Data Collection in Probabilistic Wireless S...
JPN1405 RBTP: Low-Power Mobile Discovery Protocol through Recursive Binary T...
JPN1404 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
JPM1410 Images as Occlusions of Textures: A Framework for Segmentation
JPM1407 Exposing Digital Image Forgeries by Illumination Color Classification

Recently uploaded (20)

PDF
737-MAX_SRG.pdf student reference guides
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PDF
Abrasive, erosive and cavitation wear.pdf
PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
UNIT - 3 Total quality Management .pptx
PDF
PPT on Performance Review to get promotions
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
737-MAX_SRG.pdf student reference guides
Nature of X-rays, X- Ray Equipment, Fluoroscopy
Abrasive, erosive and cavitation wear.pdf
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf
Fundamentals of Mechanical Engineering.pptx
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
86236642-Electric-Loco-Shed.pdf jfkduklg
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
UNIT - 3 Total quality Management .pptx
PPT on Performance Review to get promotions
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Fundamentals of safety and accident prevention -final (1).pptx

JPD1424 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

  • 1. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis ABSTRACT: Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle-area- based technique is proposed to enhance and to speed up the process of MCA. The effectiveness of our proposed detection system is evaluated using KDD Cup 99 dataset, and the influences of both non-normalized data and normalized data on the performance of the proposed detection system are examined. The results show that our system outperforms two other previously developed state-of-the-art approaches in terms of detection accuracy.
  • 2. EXISTING SYSTEM: Generally, network-based detection systems can be classified into two main categories, namely misuse-based detection systems and anomaly-based detection systems. Misuse-based detection systems detect attacks by monitoring network activities and looking for matches with the existing attack signatures. In spite of having high detection rates to known attacks and low false positive rates, misuse-based detection systems are easily evaded by any new attacks and even variants of the existing attacks. Furthermore, it is a complicated and labor intensive task to keep signature database updated because signature generation is a manual process and heavily involves network security expertise. DISADVANTAGES OF EXISTING SYSTEM:  Most existing IDS are optimized to detect attacks with high accuracy. However, they still have various disadvantages that have been outlined in a number of publications and a lot of work has been done to analyze IDS in order to direct future research.  Besides others, one drawback is the large amount of alerts produced.
  • 3. PROPOSED SYSTEM: In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. The DoS attack detection system presented in this paper employs the principles of MCA and anomaly-based detection. They equip our detection system with capabilities of accurate characterization for traffic behaviors and detection of known and unknown attacks respectively. A triangle area technique is developed to enhance and to speed up the process of MCA. A statistical normalization technique is used to eliminate the bias from the raw data. ADVANTAGES OF PROPOSED SYSTEM:  More detection accuracy  Less false alarm  Accurate characterization for traffic behaviors and detection of known and unknown attacks respectively
  • 4. SYSTEM ARCHITECTURE: BLOCK DIAGRAM: Client Router Correlation Analysis Graph Analysis Server Attack Detection
  • 5. MODULES: 1. Feature Normalization 2. Multivariate Correlation Analysis 3. Decision Making Module 4. Evaluation of Attack detection MODULES DESCRIPTION: 1. Feature Normalization Module: In this module, basic features are generated from ingress network traffic to the internal network where protected servers reside in and are used to form traffic records for a well-defined time interval. Monitoring and analyzing at the destination network reduce the overhead of detecting malicious activities by concentrating only on relevant inbound traffic. This also enables our detector to provide protection which is the best fit for the targeted internal network because legitimate traffic profiles used by the detectors are developed for a smaller number of network services. 2. Multivariate Correlation Analysis: In this Multivariate Correlation Analysis, in which the “Triangle Area Map Generation” module is applied to extract the correlations between two distinct features within each traffic record coming from the first step or the traffic record
  • 6. normalized by the “Feature Normalization” module in this step. The occurrence of network intrusions cause changes to these correlations so that the changes can be used as indicators to identify the intrusive activities. All the extracted correlations, namely triangle areas stored in Triangle Area Maps (TAMs), are then used to replace the original basic features or the normalized features to represent the traffic records. This provides higher discriminative information to differentiate between legitimate and illegitimate traffic records. 3. Decision Making Module: In this module, the anomaly-based detection mechanism is adopted in Decision Making. It facilitates the detection of any DoS attacks without requiring any attack relevant knowledge. Furthermore, the labor-intensive attack analysis and the frequent update of the attack signature database in the case of misuse-based detection are avoided. Meanwhile, the mechanism enhances the robustness of the proposed detectors and makes them harder to be evaded because attackers need to generate attacks that match the normal traffic profiles built by a specific detection algorithm. This, however, is a labor-intensive task and requires expertise in the targeted detection algorithm. Specifically, two phases (i.e., the “Training Phase” and the “Test Phase”) are involved in Decision Making. The “Normal Profile Generation” module is operated in the “Training Phase” to generate profiles for
  • 7. various types of legitimate traffic records, and the generated normal profiles are stored in a database. The “Tested Profile Generation” module is used in the “Test Phase” to build profiles for individual observed traffic records. Then, the tested profiles are handed over to the “Attack Detection” module, which compares the individual tested profiles with the respective stored normal profiles. A threshold-based classifier is employed in the “Attack Detection” module to distinguish DoS attacks from legitimate traffic. 4. Evaluation of Attack detection During the evaluation, the 10 percent labeled data of KDD Cup 99 dataset is used, where three types of legitimate traffic (TCP, UDP and ICMP traffic) and six different types of DoS attacks (Teardrop, Smurf, Pod, Neptune, Land and Back attacks) are available. All of these records are first filtered and then are further grouped into seven clusters according to their labels. We show the evaluation results in graph. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.
  • 8.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : ASP.net, C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Zhiyuan Tan, Aruna Jamdagni, Xiangjian He‡, Senior Member, IEEE, Priyadarsi Nanda, Member, IEEE, and Ren Ping Liu, Member, IEEE, “A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2014.