Arjstcsit 02 005

Page 1

Advanced Research Journals of Science and Technology

ADVANCED RESEARCH JOURNALS OF SCIENCE AND TECHNOLOGY

(ARJST)

DETECTING DENIAL OF SERVICE ATTACK USING MULTIVARIATE CORRELATION ANALYSIS

2349-1809

Kandula Revathi 1, S.S.N Anjaneyulu 2, 1 Research Scholar, Department of Computer Science And Engineering,Eswar College of Engineering, Narasaraopet, Guntur,India 2 Assistant Professor , Department of Computer Science And Engineering, Eswar College of Engineering, Narasaraopet, Guntur,India

Abstract Well organized systems such as net servers, file servers, cloud computing etc… are now under serious attack from network attackers. Denial-of-service attack is the one of the most frequent and aggressive to computing systems. In this scheme we propose a procedure called multivariate correlation analysis to detect an exact traffic flow classification by extracting the geometrical correlation between known and unknown attacks. This system includes anomaly detection method for the detection of known and unknown Dos. Additionally Triangle Area Based Technique is used to speed up the process of Multivariate Correlation Analysis (MCA). Proposed system can be evaluated by using KDD cup dataset. Index terms: Denial-of-service attack, network characterization, multivariate correlation, triangle area.

*Corresponding Author: Kandula Revathi , Research Scholar, Department of Computer Science And Engineering, Eswar College of Engineering, Narasaraopet, Guntur,India Published: December 26, 2015 Review Type: peer reviewed Volume: II, Issue : II Citation: Kandula Revathi ,Research Scholar (2015) DETECTING DENIAL OF SERVICE ATTACK USING MULTIVARIATE CORRELATION ANALYSIS

INTRODUCTION Denial of service (DoS) attacks has become a major threat to current computer networks. Early DoS attacks were technical games played among underground attackers. For example, an attacker might want to get control of an IRC channel via performing DoS attacks against the channel owner. Attacker could get recognition in the underground community via taking down popular web sites. Because easy-to-use DoS tools, such as Trinoo (Dittrich 1999), can be easily downloaded from the Internet, normal computer users can become DoS attackers as well. They sometime co-ordinately expressed their views via launching DoS attacks against organizations whose policies they disagreed with. DoS attacks also appeared in illegal actions. Companies might use DoS attacks to knock off their competitors in the market. Extortion via DoS attacks were on rise in the past years (Pappalardo et al. 2005). Attackers threatened online businesses with DoS attacks and requested payments for protection. A denial-of-service attack is an action that prevents or damages the authorized use of networks, system or application by exhausting resources such as CPU, memory, bandwidth and disk space. In other words, Dos attack a computer or a user is unable to access resources like email and the internet. An attack can be directed at an operating system or at the network. At first stage they were quite “primitive” involving only one attacker exploiting maximum bandwidth from the victim, denying others

to be served. This was done mostly by using Ping floods, SYN floods & UDP floods. These attacks manually synchronized by a lot of attackers in order to cause an effective damage. It is launched on internet landscapes in network form, where the attacking computer sends crafted network packets. (TCP, UDP or ICMP). Internet based network attacker can be categorized in 2 ways 1. Directed Denial of service attack model, where the specific Dos is developed and rolled out by an attacker with an aim to take down a specific network or computer. 2. Indirect Denial of service attack model, where a worm or virus is at large in the wild, which causes Dos and interruption as a result of its spreading. Normally network detection can be classified into anomaly detection and misuse based detection. Anomaly detection based on normal behaviour of a system. Misuse based detection monitoring all the network activities and looking for matches with existing attack signature. Knowledge Discovery Database (KDD) cup data set is most widely used data set for the evaluation of anomaly detection method. The data set is prepared by Stolfo et.al. And it is built based on the data captured in DARPA’98 IDS evaluation program. Proposed system use a novel trace back method for DoS attacks that is based on MCA between normal and DoS attack traffic, which is fundamentally different from commonly used packet marking techniques. This method is used to identify the attackers efficiently and supports a large scalability. Furthermore, a triangle-area-based technique is used to enhance and to speed up the process of MCA. This method is applied to block the attackers in a wide area of network which was much efficient and protect the data from the attackers. Related Works The whole detection process consists of three major steps as shown in Fig. 1. The sample-by-sample detection mechanism is involved in the whole detection phase (i.e., Steps 1, 2 and 3) and is detailed in Section 2.2. In Step 30


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.