Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/251844
Title: | Bipartite machine learning approach for detecting denial of service |
Researcher: | Jagadeesan A P |
Guide(s): | Gnanambal K |
Keywords: | Bipartite Denial of Service Engineering and Technology,Engineering,Engineering Electrical and Electronic Machine Learning |
University: | Anna University |
Completed Date: | 2018 |
Abstract: | The security risk associated with the computer networks increases with the tremendous intensification and dynamism of computer networks Intrusion and its associated attacks both internal and external is an alarming threat in recent days A neural network based intrusion detection system is designed whose primary objective is to detect various types of denial of service attacks with low false positive rate and increased detection rate Initially the system is designed with the support vector classifier and a multi instance neural network classifier The support vector classifier itself includes a clustering process and classification process K Means algorithm is used for clustering and Support vector machine is used for classification The outcome of the support vector classifier is the classification of incoming traffic in to either anomalous or non anomalous Support vector classifier is followed by a multi instance neural network classifier which detects the denial of service attack Denial of service attack is a major concern to any form of network either it be a simple intranet or evolving software defined network. Irrespective of the application that is being accessed Denial of Service DoS attack can be enforced from any level of the network, for instance it could be generated due to the vulnerabilities that exists in Transmission Control Protocol TCP or may be due to vulnerability in Address Resolution Protocol ARP or in Hypertext Transfer Protocol HTTP Any type of communication in networks such as a HTTP request or a request to access a file using File Transfer Protocol FTP is basically built on top of a transport layer protocol it could be either TCP or User Datagram Protocol UDP A catalyst of an attack for instance an IP address might be blocked but it would be an IP of a legitimate user whose IP address is spoofed the future requests from the same IP should not be denied as once it was spoofed newline |
Pagination: | xv, 130p. |
URI: | http://hdl.handle.net/10603/251844 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 142.17 kB | Adobe PDF | View/Open |
02_certificates.pdf | 598.13 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 94.73 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 91.04 kB | Adobe PDF | View/Open | |
05_contents.pdf | 96.45 kB | Adobe PDF | View/Open | |
06_list_of_tables.pdf | 90.52 kB | Adobe PDF | View/Open | |
07_list_of_figures.pdf | 91.59 kB | Adobe PDF | View/Open | |
08_list_of_abbreviations.pdf | 91.19 kB | Adobe PDF | View/Open | |
09_chapter1.pdf | 546.06 kB | Adobe PDF | View/Open | |
10_chapter2.pdf | 221.96 kB | Adobe PDF | View/Open | |
11_chapter3.pdf | 280.02 kB | Adobe PDF | View/Open | |
12_chapter4.pdf | 474.08 kB | Adobe PDF | View/Open | |
13_chapter5.pdf | 324.74 kB | Adobe PDF | View/Open | |
14_chapter6.pdf | 417.24 kB | Adobe PDF | View/Open | |
15_conslusion.pdf | 124.41 kB | Adobe PDF | View/Open | |
16_references.pdf | 168.35 kB | Adobe PDF | View/Open | |
17_list_of_publications.pdf | 139.76 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: