A statistical class center based triangle area vector method for detection of denial of service attacks

被引:11
作者
Amma, N. G. Bhuvaneswari [1 ]
Selvakumar, S. [1 ,2 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli 620015, Tamil Nadu, India
[2] Indian Inst Informat Technol, Una 177005, Himachal Prades, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2021年 / 24卷 / 01期
关键词
Attack detection; Cluster center; Denial of service attacks; Feature extraction; Mahalanobis distance; Statistical method; INTRUSION DETECTION; DDOS ATTACKS; SYSTEMS; TAXONOMY; DEFENSE;
D O I
10.1007/s10586-020-03120-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Denial of service (DoS) attack is the menace to private cloud computing environment that denies services provided by cloud servers leading to huge business losses. Efficient DoS attack detection mechanisms are demanded which necessitates the extraction of features for its best performance. The lacuna in the existing feature extraction based detection systems is the sensitiveness of initial cluster center which leads to high false alarm rate and low accuracy. In this paper, this issue is addressed by proposing a class center based triangle area vector (CCTAV) method which computes the mean of target classes individually and extracts the correlation between features. Mahalanobis distance measure is used for profile construction and DoS attacks detection. The proposed CCTAV method is tested with five publicly available datasets and compared with existing methods. It is noticed that the proposed statistical method reduces the complexity of feature extraction and enhances the attack detection process. The proposed approach is evaluated by conducting tenfold cross validation to compute 95% confidence interval. It is evident that the accuracy obtained for all the datasets are within the confidence interval. Further, the proposed CCTAV method provides significant results compared to the state-of-the-art attack detection methods.
引用
收藏
页码:393 / 415
页数:23
相关论文
共 42 条
[1]   Deep Radial Intelligence with Cumulative Incarnation approach for detecting Denial of Service attacks [J].
Amma, Bhuvaneswari N. G. ;
Selvakumar, S. .
NEUROCOMPUTING, 2019, 340 :294-308
[2]   A new evolutionary neural networks based on intrusion detection systems using multiverse optimization [J].
Benmessahel, Ilyas ;
Xie, Kun ;
Chellal, Mouna .
APPLIED INTELLIGENCE, 2018, 48 (08) :2315-2327
[3]   Distributed Denial-of-Service Attack Detection and Mitigation Using Feature Selection and Intensive Care Request Processing Unit [J].
Bharot, Nitesh ;
Verma, Priyanka ;
Sharma, Sangeeta ;
Suraparaju, Veenadhari .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) :959-967
[4]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[5]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[6]   A comparative study of efficient initialization methods for the k-means clustering algorithm [J].
Celebi, M. Emre ;
Kingravi, Hassan A. ;
Vela, Patricio A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (01) :200-210
[7]  
Chang H.H., 2015, Proc. Industry Applications Society Annual Meeting, P1, DOI DOI 10.1109/IAS.2015.7356778
[8]  
Cormen TH., 2009, Introduction to Algorithms, V3
[9]   Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems [J].
Derhab, Abdelouahid ;
Bouras, Abdelghani .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) :1193-1212
[10]  
Deza, 2009, Encyclopedia of distances, DOI [DOI 10.1007/978-3-642-00234-2, 10.1007/978-3-662-44342-2]