International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111 | Views: 168

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Rating: 6.7 / 10


Detection of Denial of Service Attack Based on EMD Embedded with 3D Reduction Method

Swathy Mohan [2] | Niyas N.


Abstract: enial-of-Service attack is an attempt to make network resources or machine unavailable to its intended users. It can temporarily or indefinitely interrupt or suspend the services of a host connected to the Internet. For the Detection of denial of service attack (DoS) various detection systems are developed. The existing system is based on sophisticated anomaly based system for detecting DoS attacks. But there is a problems occurs in this paper is that it reduces the performance of detecting the denial of service attack also it requires more time for the execution. This proposed system is developed to overcome these problems. To extract the features use SIFT it reduces the time when compared to the existing feature extraction method. The traffic records are trained as attack and non attack or the network traffic records changes the records into the respective images using Multivariate correlation analysis. Network traffic records images are used for the proposed denial of service attack detection system that is developed based on a dissimilarity measure Earth Movers Distance embedded with three dimensional reduction method. By using this method it can also detect the unknown Denial of Service attack. It efficiently measure the distance between trained records and new records. It increases the performance of detection of Denial of service attack and also requires only less time for the computation.


Keywords: Denial of service attack DoS, Earth movers distance, Machine learning, Statistical learning


Edition: Volume 5 Issue 5, May 2016,


Pages: 1893 - 1896


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top