SlideShare a Scribd company logo
A System for Denial-of-Service Attack Detection Based on 
Multivariate Correlation Analysis 
Interconnected systems, such as Web servers, database servers, cloud computing 
servers etc, are now under threads from network attackers. As one of most 
common and aggressive means, Denial-of-Service (DoS) attacks cause serious 
impact on these computing systems. In this paper, we present a DoS attack 
detection system that uses Multivariate Correlation Analysis (MCA) for accurate 
network traffic characterization by extracting the geometrical correlations between 
network traffic features. Our MCA-based DoS attack detection system employs the 
principle of anomaly-based detection in attack recognition. This makes our 
solution capable of detecting known and unknown DoS attacks effectively by 
learning the patterns of legitimate network traffic only. Furthermore, a triangle-area- 
based technique is proposed to enhance and to speed up the process of MCA. 
The effectiveness of our proposed detection system is evaluated using KDD Cup 
99 dataset, and the influences of both non-normalized data and normalized data on 
the performance of the proposed detection system are examined. The results show 
that our system outperforms two other previously developed state-of-the-art 
approaches in terms of detection accuracy. 
EXISTING SYSTEM: 
Generally, network-based detection systems can be classified into two main 
categories, namely misuse-based detection systems and anomaly-based detection 
systems. Misuse-based detection systems detect attacks by monitoring network 
activities and looking for matches with the existing attack signatures. In spite of 
Contact: 9703109334, 9533694296 
ABSTRACT: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
having high detection rates to known attacks and low false positive rates, misuse-based 
detection systems are easily evaded by any new attacks and even variants of 
the existing attacks. Furthermore, it is a complicated and labor intensive task to 
keep signature database updated because signature generation is a manual process 
and heavily involves network security expertise. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Most existing IDS are optimized to detect attacks with high accuracy. 
However, they still have various disadvantages that have been outlined in a 
number of publications and a lot of work has been done to analyze IDS in 
order to direct future research. 
 Besides others, one drawback is the large amount of alerts produced. 
PROPOSED SYSTEM: 
In this paper, we present a DoS attack detection system that uses Multivariate 
Correlation Analysis (MCA) for accurate network traffic characterization by 
extracting the geometrical correlations between network traffic features. Our 
MCA-based DoS attack detection system employs the principle of anomaly-based 
detection in attack recognition. 
The DoS attack detection system presented in this paper employs the principles of 
MCA and anomaly-based detection. They equip our detection system with 
capabilities of accurate characterization for traffic behaviors and detection of 
known and unknown attacks respectively. A triangle area technique is developed to 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
enhance and to speed up the process of MCA. A statistical normalization technique 
is used to eliminate the bias from the raw data. 
ADVANTAGES OF PROPOSED SYSTEM: 
 More detection accuracy 
 Accurate characterization for traffic behaviors and detection of known and 
unknown attacks respectively 
SYSTEM ARCHITECTURE: 
BLOCK DIAGRAM: 
Client Router Correlation 
Graph Analysis Server Attack Detection 
Contact: 9703109334, 9533694296 
 Less false alarm 
Analysis 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
1. Feature Normalization 
2. Multivariate Correlation Analysis 
3. Decision Making Module 
4. Evaluation of Attack detection 
MODULES DESCRIPTION: 
1. Feature Normalization Module: 
In this module, basic features are generated from ingress network traffic to the 
internal network where protected servers reside in and are used to form traffic 
records for a well-defined time interval. Monitoring and analyzing at the 
destination network reduce the overhead of detecting malicious activities by 
concentrating only on relevant inbound traffic. This also enables our detector to 
provide protection which is the best fit for the targeted internal network because 
legitimate traffic profiles used by the detectors are developed for a smaller number 
of network services. 
2. Multivariate Correlation Analysis: 
In this Multivariate Correlation Analys is, in which the “Triangle Area Map 
Generation” module is applied to extract the correlations between two distinct 
features within each traffic record coming from the first step or the traffic record 
normalized by the “Feature Normalization” module in this step. The occurrence of 
network intrusions cause changes to these correlations so that the changes can be 
used as indicators to identify the intrusive activities. All the extracted correlations, 
Contact: 9703109334, 9533694296 
MODULES: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
namely triangle areas stored in Triangle Area Maps (TAMs), are then used to 
replace the original basic features or the normalized features to represent the traffic 
records. This provides higher discriminative information to differentiate between 
legitimate and illegitimate traffic records. 
3. Decision Making Module: 
In this module, the anomaly-based detection mechanism is adopted in Decision 
Making. It facilitates the detection of any DoS attacks without requiring any attack 
relevant knowledge. Furthermore, the labor-intensive attack analysis and the 
frequent update of the attack signature database in the case of misuse-based 
detection are avoided. Meanwhile, the mechanism enhances the robustness of the 
proposed detectors and makes them harder to be evaded because attackers need to 
generate attacks that match the normal traffic profiles built by a specific detection 
algorithm. This, however, is a labor-intensive task and requires expertise in the 
targeted detection algorithm. Specifically, two phases (i.e., the “Training Phase” 
and the “Test Phase”) are involved in Decision Making. The “Normal Profile 
Generation” module is operated in the “Training Phase” to generate profiles for 
various types of legitimate traffic records, and the generated normal profiles are 
stored in a database. The “Tested Profile Generation” module is used in the “Test 
Phase” to build profiles for individual observed traffic records. Then, the tested 
profiles are handed over to the “Attack Detection” module, which compares the 
individual tested profiles with the respective stored normal profiles. A threshold-based 
classifier is emp loyed in the “Attack Detection” module to distinguish DoS 
attacks from legitimate traffic. 
4. Evaluation of Attack detection 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
During the evaluation, the 10 percent labeled data of KDD Cup 99 dataset is used, 
where three types of legitimate traffic (TCP, UDP and ICMP traffic) and six 
different types of DoS attacks (Teardrop, Smurf, Pod, Neptune, Land and Back 
attacks) are available. All of these records are first filtered and then are further 
grouped into seven clusters according to their labels. We show the evaluation 
results in graph. 
SYSTEM CONFIGURATION:- 
H/W SYSTEM CONFIGURATION:- 
 Processor -Pentium –III 
 Speed - 1.1 Ghz 
 RAM - 256 MB(min) 
 Hard Disk - 20 GB 
 Floppy Drive - 1.44 MB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - SVGA 
S/W System Configuration:- 
 Operating System : Windows95/98/2000/XP 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
 Front End : Java 
 Tool : JDK1.7 
Zhiyuan Tan, Aruna Jamdagni, Xiangjian He‡, Senior Member, IEEE, Priyadarsi 
Nanda, Member, IEEE, and Ren Ping Liu, Member, IEEE, “A System for Denial-of- 
Service Attack Detection Based on Multivariate Correlation Analysis”, IEEE 
TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , 
NO. , 2013. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

What's hot (17)

PDF
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
 
PDF
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
 
PDF
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
 
PDF
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
IJNSA Journal
 
PDF
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
cscpconf
 
PDF
1762 1765
Editor IJARCET
 
PDF
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
IJCNCJournal
 
PDF
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
Editor IJMTER
 
PDF
An anomalous behavior detection model in cloud computing
redpel dot com
 
PDF
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
IJNSA Journal
 
PDF
Secure intrusion detection and attack measure selection
Uvaraj Shan
 
PDF
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
1crore projects
 
DOC
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 
PDF
Limiting self propagating malware based
IJNSA Journal
 
PDF
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
IJNSA Journal
 
PDF
Optimised malware detection in digital forensics
IJNSA Journal
 
PDF
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
IJNSA Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
ijceronline
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET Journal
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
IJNSA Journal
 
DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED ME...
cscpconf
 
1762 1765
Editor IJARCET
 
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
IJCNCJournal
 
DETECTING NETWORK ANOMALIES USING CUSUM and FCM
Editor IJMTER
 
An anomalous behavior detection model in cloud computing
redpel dot com
 
A COMBINATION OF TEMPORAL SEQUENCE LEARNING AND DATA DESCRIPTION FOR ANOMALYB...
IJNSA Journal
 
Secure intrusion detection and attack measure selection
Uvaraj Shan
 
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
1crore projects
 
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 
Limiting self propagating malware based
IJNSA Journal
 
STATISTICAL QUALITY CONTROL APPROACHES TO NETWORK INTRUSION DETECTION
IJNSA Journal
 
Optimised malware detection in digital forensics
IJNSA Journal
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
IJNSA Journal
 

Similar to a system for denial-of-service attack detection based on multivariate correlation analysis (20)

DOCX
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
DOC
A system for denial of-service attack detection based on multivariate correla...
Shakas Technologies
 
DOCX
COPYRIGHTThis thesis is copyright materials protected under the .docx
voversbyobersby
 
PDF
A novel signature based traffic classification engine to reduce false alarms ...
IJCNCJournal
 
PDF
IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK ...
IJNSA Journal
 
PDF
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
IRJET Journal
 
PDF
A Survey On Intrusion Detection Systems
Mary Calkins
 
DOCX
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Shakas Technologies
 
PDF
IEEE- Intrusion Detection Model using Self Organizing Map
Tushar Shinde
 
PDF
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
IJNSA Journal
 
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
PDF
1762 1765
Editor IJARCET
 
PDF
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
IJNSA Journal
 
PDF
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
IJCSIS Research Publications
 
PDF
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
IJCNCJournal
 
PDF
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
IJCNCJournal
 
PDF
Intrusion Detection System using Hidden Markov Model (HMM)
IOSR Journals
 
PDF
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
IJNSA Journal
 
PPTX
spamzombieppt
kajol agarwal
 
PDF
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
IJCSIS Research Publications
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
IEEEGLOBALSOFTSTUDENTSPROJECTS
 
A system for denial of-service attack detection based on multivariate correla...
Shakas Technologies
 
COPYRIGHTThis thesis is copyright materials protected under the .docx
voversbyobersby
 
A novel signature based traffic classification engine to reduce false alarms ...
IJCNCJournal
 
IMPROVING INTRUSION DETECTION SYSTEM USING THE COMBINATION OF NEURAL NETWORK ...
IJNSA Journal
 
Cybersecurity Threat Detection of Anomaly Based DDoS Attack Using Machine Lea...
IRJET Journal
 
A Survey On Intrusion Detection Systems
Mary Calkins
 
Detecting_and_Mitigating_Botnet_Attacks_in_Software-Defined_Networks_Using_De...
Shakas Technologies
 
IEEE- Intrusion Detection Model using Self Organizing Map
Tushar Shinde
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
IJNSA Journal
 
Secure intrusion detection and countermeasure selection in virtual system usi...
eSAT Publishing House
 
1762 1765
Editor IJARCET
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
IJNSA Journal
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
IJCSIS Research Publications
 
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
IJCNCJournal
 
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
IJCNCJournal
 
Intrusion Detection System using Hidden Markov Model (HMM)
IOSR Journals
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
IJNSA Journal
 
spamzombieppt
kajol agarwal
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
IJCSIS Research Publications
 
Ad

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
swathi78
 
DOCX
web service recommendation via exploiting location and qo s information
swathi78
 
DOCX
privacy-enhanced web service composition
swathi78
 
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
DOCX
friend book a semantic-based friend recommendation system for social networks
swathi78
 
DOCX
efficient authentication for mobile and pervasive computing
swathi78
 
DOCX
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
DOCX
an incentive framework for cellular traffic offloading
swathi78
 
DOCX
secure outsourced attribute-based signatures
swathi78
 
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
DOCX
the design and evaluation of an information sharing system for human networks
swathi78
 
DOCX
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
DOCX
sos a distributed mobile q&a system based on social networks
swathi78
 
DOCX
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
DOCX
rre a game-theoretic intrusion response and recovery engine
swathi78
 
DOCX
on false data-injection attacks against power system state estimation modelin...
swathi78
 
DOCX
loca ward a security and privacy aware location-based rewarding system
swathi78
 
DOCX
exploiting service similarity for privacy in location-based search queries
swathi78
 
DOCX
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 
DOCX
secure data retrieval for decentralized disruption-tolerant military networks
swathi78
 
secure mining of association rules in horizontally distributed databases
swathi78
 
web service recommendation via exploiting location and qo s information
swathi78
 
privacy-enhanced web service composition
swathi78
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
friend book a semantic-based friend recommendation system for social networks
swathi78
 
efficient authentication for mobile and pervasive computing
swathi78
 
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
an incentive framework for cellular traffic offloading
swathi78
 
secure outsourced attribute-based signatures
swathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
the design and evaluation of an information sharing system for human networks
swathi78
 
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
sos a distributed mobile q&a system based on social networks
swathi78
 
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
rre a game-theoretic intrusion response and recovery engine
swathi78
 
on false data-injection attacks against power system state estimation modelin...
swathi78
 
loca ward a security and privacy aware location-based rewarding system
swathi78
 
exploiting service similarity for privacy in location-based search queries
swathi78
 
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 
secure data retrieval for decentralized disruption-tolerant military networks
swathi78
 
Ad

Recently uploaded (20)

PDF
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
PDF
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
PDF
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
PDF
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
 
PPTX
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
PPTX
Work at Height training for workers .pptx
cecos12
 
PDF
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
 
PDF
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
PDF
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
 
PDF
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
PDF
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
PPTX
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
PPTX
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
 
PPTX
CST413 KTU S7 CSE Machine Learning Introduction Parameter Estimation MLE MAP ...
resming1
 
PPTX
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
PPTX
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
PDF
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
PPTX
Mobile database systems 20254545645.pptx
herosh1968
 
PDF
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 
تقرير عن التحليل الديناميكي لتدفق الهواء حول جناح.pdf
محمد قصص فتوتة
 
Validating a Citizen Observatories enabling Platform by completing a Citizen ...
Diego López-de-Ipiña González-de-Artaza
 
June 2025 Top 10 Sites -Electrical and Electronics Engineering: An Internatio...
elelijjournal653
 
Generative AI & Scientific Research : Catalyst for Innovation, Ethics & Impact
AlqualsaDIResearchGr
 
Stability of IBR Dominated Grids - IEEE PEDG 2025 - short.pptx
ssuser307730
 
Work at Height training for workers .pptx
cecos12
 
Rapid Prototyping for XR: Lecture 5 - Cross Platform Development
Mark Billinghurst
 
CLIP_Internals_and_Architecture.pdf sdvsdv sdv
JoseLuisCahuanaRamos3
 
Rapid Prototyping for XR: Lecture 6 - AI for Prototyping and Research Directi...
Mark Billinghurst
 
13th International Conference of Security, Privacy and Trust Management (SPTM...
ijcisjournal
 
Decision support system in machine learning models for a face recognition-bas...
TELKOMNIKA JOURNAL
 
Python Mini Project: Command-Line Quiz Game for School/College Students
MPREETHI7
 
Bitumen Emulsion by Dr Sangita Ex CRRI Delhi
grilcodes
 
CST413 KTU S7 CSE Machine Learning Neural Networks and Support Vector Machine...
resming1
 
CST413 KTU S7 CSE Machine Learning Introduction Parameter Estimation MLE MAP ...
resming1
 
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
Comparison of Flexible and Rigid Pavements in Bangladesh
Arifur Rahman
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
Mobile database systems 20254545645.pptx
herosh1968
 
May 2025: Top 10 Read Articles in Data Mining & Knowledge Management Process
IJDKP
 

a system for denial-of-service attack detection based on multivariate correlation analysis

  • 1. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle-area- based technique is proposed to enhance and to speed up the process of MCA. The effectiveness of our proposed detection system is evaluated using KDD Cup 99 dataset, and the influences of both non-normalized data and normalized data on the performance of the proposed detection system are examined. The results show that our system outperforms two other previously developed state-of-the-art approaches in terms of detection accuracy. EXISTING SYSTEM: Generally, network-based detection systems can be classified into two main categories, namely misuse-based detection systems and anomaly-based detection systems. Misuse-based detection systems detect attacks by monitoring network activities and looking for matches with the existing attack signatures. In spite of Contact: 9703109334, 9533694296 ABSTRACT: Email id: [email protected], www.logicsystems.org.in
  • 2. having high detection rates to known attacks and low false positive rates, misuse-based detection systems are easily evaded by any new attacks and even variants of the existing attacks. Furthermore, it is a complicated and labor intensive task to keep signature database updated because signature generation is a manual process and heavily involves network security expertise. DISADVANTAGES OF EXISTING SYSTEM:  Most existing IDS are optimized to detect attacks with high accuracy. However, they still have various disadvantages that have been outlined in a number of publications and a lot of work has been done to analyze IDS in order to direct future research.  Besides others, one drawback is the large amount of alerts produced. PROPOSED SYSTEM: In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. The DoS attack detection system presented in this paper employs the principles of MCA and anomaly-based detection. They equip our detection system with capabilities of accurate characterization for traffic behaviors and detection of known and unknown attacks respectively. A triangle area technique is developed to Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in
  • 3. enhance and to speed up the process of MCA. A statistical normalization technique is used to eliminate the bias from the raw data. ADVANTAGES OF PROPOSED SYSTEM:  More detection accuracy  Accurate characterization for traffic behaviors and detection of known and unknown attacks respectively SYSTEM ARCHITECTURE: BLOCK DIAGRAM: Client Router Correlation Graph Analysis Server Attack Detection Contact: 9703109334, 9533694296  Less false alarm Analysis Email id: [email protected], www.logicsystems.org.in
  • 4. 1. Feature Normalization 2. Multivariate Correlation Analysis 3. Decision Making Module 4. Evaluation of Attack detection MODULES DESCRIPTION: 1. Feature Normalization Module: In this module, basic features are generated from ingress network traffic to the internal network where protected servers reside in and are used to form traffic records for a well-defined time interval. Monitoring and analyzing at the destination network reduce the overhead of detecting malicious activities by concentrating only on relevant inbound traffic. This also enables our detector to provide protection which is the best fit for the targeted internal network because legitimate traffic profiles used by the detectors are developed for a smaller number of network services. 2. Multivariate Correlation Analysis: In this Multivariate Correlation Analys is, in which the “Triangle Area Map Generation” module is applied to extract the correlations between two distinct features within each traffic record coming from the first step or the traffic record normalized by the “Feature Normalization” module in this step. The occurrence of network intrusions cause changes to these correlations so that the changes can be used as indicators to identify the intrusive activities. All the extracted correlations, Contact: 9703109334, 9533694296 MODULES: Email id: [email protected], www.logicsystems.org.in
  • 5. namely triangle areas stored in Triangle Area Maps (TAMs), are then used to replace the original basic features or the normalized features to represent the traffic records. This provides higher discriminative information to differentiate between legitimate and illegitimate traffic records. 3. Decision Making Module: In this module, the anomaly-based detection mechanism is adopted in Decision Making. It facilitates the detection of any DoS attacks without requiring any attack relevant knowledge. Furthermore, the labor-intensive attack analysis and the frequent update of the attack signature database in the case of misuse-based detection are avoided. Meanwhile, the mechanism enhances the robustness of the proposed detectors and makes them harder to be evaded because attackers need to generate attacks that match the normal traffic profiles built by a specific detection algorithm. This, however, is a labor-intensive task and requires expertise in the targeted detection algorithm. Specifically, two phases (i.e., the “Training Phase” and the “Test Phase”) are involved in Decision Making. The “Normal Profile Generation” module is operated in the “Training Phase” to generate profiles for various types of legitimate traffic records, and the generated normal profiles are stored in a database. The “Tested Profile Generation” module is used in the “Test Phase” to build profiles for individual observed traffic records. Then, the tested profiles are handed over to the “Attack Detection” module, which compares the individual tested profiles with the respective stored normal profiles. A threshold-based classifier is emp loyed in the “Attack Detection” module to distinguish DoS attacks from legitimate traffic. 4. Evaluation of Attack detection Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in
  • 6. During the evaluation, the 10 percent labeled data of KDD Cup 99 dataset is used, where three types of legitimate traffic (TCP, UDP and ICMP traffic) and six different types of DoS attacks (Teardrop, Smurf, Pod, Neptune, Land and Back attacks) are available. All of these records are first filtered and then are further grouped into seven clusters according to their labels. We show the evaluation results in graph. SYSTEM CONFIGURATION:- H/W SYSTEM CONFIGURATION:-  Processor -Pentium –III  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Floppy Drive - 1.44 MB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA S/W System Configuration:-  Operating System : Windows95/98/2000/XP Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in
  • 7.  Front End : Java  Tool : JDK1.7 Zhiyuan Tan, Aruna Jamdagni, Xiangjian He‡, Senior Member, IEEE, Priyadarsi Nanda, Member, IEEE, and Ren Ping Liu, Member, IEEE, “A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013. Contact: 9703109334, 9533694296 REFERENCE: Email id: [email protected], www.logicsystems.org.in