Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/251844
Title: Bipartite machine learning approach for detecting denial of service
Researcher: Jagadeesan A P
Guide(s): Gnanambal K
Keywords: Bipartite
Denial of Service
Engineering and Technology,Engineering,Engineering Electrical and Electronic
Machine Learning
University: Anna University
Completed Date: 2018
Abstract: The security risk associated with the computer networks increases with the tremendous intensification and dynamism of computer networks Intrusion and its associated attacks both internal and external is an alarming threat in recent days A neural network based intrusion detection system is designed whose primary objective is to detect various types of denial of service attacks with low false positive rate and increased detection rate Initially the system is designed with the support vector classifier and a multi instance neural network classifier The support vector classifier itself includes a clustering process and classification process K Means algorithm is used for clustering and Support vector machine is used for classification The outcome of the support vector classifier is the classification of incoming traffic in to either anomalous or non anomalous Support vector classifier is followed by a multi instance neural network classifier which detects the denial of service attack Denial of service attack is a major concern to any form of network either it be a simple intranet or evolving software defined network. Irrespective of the application that is being accessed Denial of Service DoS attack can be enforced from any level of the network, for instance it could be generated due to the vulnerabilities that exists in Transmission Control Protocol TCP or may be due to vulnerability in Address Resolution Protocol ARP or in Hypertext Transfer Protocol HTTP Any type of communication in networks such as a HTTP request or a request to access a file using File Transfer Protocol FTP is basically built on top of a transport layer protocol it could be either TCP or User Datagram Protocol UDP A catalyst of an attack for instance an IP address might be blocked but it would be an IP of a legitimate user whose IP address is spoofed the future requests from the same IP should not be denied as once it was spoofed newline
Pagination: xv, 130p.
URI: http://hdl.handle.net/10603/251844
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File142.17 kBAdobe PDFView/Open
02_certificates.pdf598.13 kBAdobe PDFView/Open
03_abstract.pdf94.73 kBAdobe PDFView/Open
04_acknowledgement.pdf91.04 kBAdobe PDFView/Open
05_contents.pdf96.45 kBAdobe PDFView/Open
06_list_of_tables.pdf90.52 kBAdobe PDFView/Open
07_list_of_figures.pdf91.59 kBAdobe PDFView/Open
08_list_of_abbreviations.pdf91.19 kBAdobe PDFView/Open
09_chapter1.pdf546.06 kBAdobe PDFView/Open
10_chapter2.pdf221.96 kBAdobe PDFView/Open
11_chapter3.pdf280.02 kBAdobe PDFView/Open
12_chapter4.pdf474.08 kBAdobe PDFView/Open
13_chapter5.pdf324.74 kBAdobe PDFView/Open
14_chapter6.pdf417.24 kBAdobe PDFView/Open
15_conslusion.pdf124.41 kBAdobe PDFView/Open
16_references.pdf168.35 kBAdobe PDFView/Open
17_list_of_publications.pdf139.76 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: