International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 131

Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016


A Survey Paper on an On-Line Intrusion Detection Approach to Identify Low-Rate Dos Attacks

Dipali Vaidya, Prof. Sonal Fatangare


Abstract: High rate Denial of service attacks, happen in relatively small amount of time, low rate DoS attack consume resources relatively at slower rate but cause eventual crash of the service providing server. The problem of detection of Slow Denial of Service attacks within small time is a challenging task because the approaches either have scalability limitations due to inherent computational costs or these approaches lack timely detection. To overcome this problem, here analysis focuses on the quantity of data directed from the transport layer to the application layer. Frequency of such transfers is taken as input and analysis has been done to identify patterns that show possible Low rate DoS attacks within expected time. It has been discovered in frequency domain analysis that patterns differ between legitimate and anomalous transactions in time horizon proving that fast detection is possible.


Keywords: denial of service, anomaly detection, Fourier transform, slow dos attack


Edition: Volume 5 Issue 1, January 2016,


Pages: 163 - 165


How to Cite this Article?

Dipali Vaidya, Prof. Sonal Fatangare, "A Survey Paper on an On-Line Intrusion Detection Approach to Identify Low-Rate Dos Attacks", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=NOV152616, Volume 5 Issue 1, January 2016, 163 - 165

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'anomaly detection'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this Article

Similar Articles with Keyword 'Fourier transform'

Downloads: 110

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2031 - 2035

A Review on Various Fusion and Features Extraction Approaches for Multi-Modal Biometric Authentication System

Hardeep Kaur, Paramjit Kaur

Share this Article

Downloads: 119

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2114 - 2117

Image Cryptography Technique based on FFT

Mudiyala. Akila Sowndarya, Damodara V V S Phani Kumar

Share this Article

Similar Articles with Keyword 'denial'

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Downloads: 102

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Similar Articles with Keyword 'service'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Similar Articles with Keyword 'anomaly'

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2085 - 2089

Implementation and Analysis of DoS Attack Detection Algorithms

Rupesh Jaiswal, Dr. Shashikant Lokhande, Aditya Gulavani

Share this Article

Similar Articles with Keyword 'detection'

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2623 - 2629

Object Detection and Pose Tracking In Augmented Reality

Vipul P.Chauhan, Dr. Manish M. Kayasth

Share this Article

Similar Articles with Keyword 'Fourier'

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1537 - 1542

Remote Sensing Satellite Image Fusion Using Fast Curvelet Transforms

Namratha H. N., Raghu M. T.

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1427 - 1430

Hand Gesture Recognition Using Clustering Based Technique

Jignasha B. Panchal, Karshan P. Kandoriya

Share this Article

Similar Articles with Keyword 'transform'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 8

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1567 - 1572

A Survey on the Applications of Generative Adversarial Networks

Ashish Roy, Dr. B. G. Prasad

Share this Article

Similar Articles with Keyword 'slow'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 846 - 851

Energy Efficient QRS Detection Method for Portable and Personal Analysis of ECG Signal Obtained from Wearable Wireless ECG Body Sensors

Prineeta Sahni, Khushneet Kaur

Share this Article

Similar Articles with Keyword 'dos'

Downloads: 38 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 65

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Similar Articles with Keyword 'attack'

Downloads: 134 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article
Top