Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/307990
Title: | Hybrid Intrusion Detection Methods to Mitigate Denial of Service Attacks for Malicious Traffic Identification using Combined Machine Learning And Optimization Methods |
Researcher: | Lekha J |
Guide(s): | Padmavathi G |
Keywords: | Engineering and Technology Computer Science Computer Science Interdisciplinary Applications |
University: | Avinashilingam Deemed University For Women |
Completed Date: | 2018 |
Abstract: | Due to the rapid developments in Internet, the network traffic has also increased permanently. newlineThe malicious traffic flow increases day by day in the network apart from non-malicious traffic flow. newlineThe malicious traffic flow may be due to cyber attacks and one of the challenging groups of cyber newlineattacks are Denial of Service Attacks. There are many challenges that must be understood in order to newlinedesign solutions to address the malicious traffic flow in DoS attacks. The fundamental challenge is newlinebased on two exploited weakness such as: i) the computer and network is flooded with more requests newlinethan it can handle at a time which leads to crash and ii) using vulnerabilities to malfunction an newlineapplication, host or a network. The exploited weakness occur due to the malicious traffic execution newlineflows, packet flow, network connection flows, transport layer segments and connection requests or newlineapplication service request messages. newlineMalicious traffic flow caused by DoS attacks makes unavailability of network resources thus newlineresulting in heavy financial loss to government and private organizations. An Intrusion Detection newlineSystem (IDS) is needed that aims at detecting malicious traffic flow caused by DoS attacks. Among newlineseveral intrusion detection approaches, the core approaches for detecting DoS attacks are Anomaly newlinedetection and Misuse detection approaches. Signature (Misuse) based detection approach is used to newlinedetect the known attacks from the traffic. Anomaly based detection approaches are efficient in newlineidentifying unknown attacks. Many researchers proposed Misuse, Anomaly and Hybrid intrusion newlinedetection models based on various detection methods such as Statistical based, Knowledge based, Soft newlineComputing and Machine Learning based methods. Even though the existing models provide newlineimproved results, certain research gaps have been observed. newlineThe primary objective of the research work is to device a defense mechanism for detecting newlinemalicious traffic flow in a network caused by vulnerability and flooding based exploited |
Pagination: | 223 p. |
URI: | http://hdl.handle.net/10603/307990 |
Appears in Departments: | Department of Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 114.43 kB | Adobe PDF | View/Open |
02_certificate.pdf | 1.63 MB | Adobe PDF | View/Open | |
03_acknowledgement.pdf | 129.6 kB | Adobe PDF | View/Open | |
04_contents.pdf | 133.43 kB | Adobe PDF | View/Open | |
05_list of tables, figures, abbreviation.pdf | 143.18 kB | Adobe PDF | View/Open | |
06_chapter1.pdf | 427.52 kB | Adobe PDF | View/Open | |
07_chapter2.pdf | 347.11 kB | Adobe PDF | View/Open | |
08_chapter3.pdf | 244.14 kB | Adobe PDF | View/Open | |
09_chapter4.pdf | 767.08 kB | Adobe PDF | View/Open | |
10_chapter5.pdf | 1.33 MB | Adobe PDF | View/Open | |
11_chapter6.pdf | 1.13 MB | Adobe PDF | View/Open | |
12_chapter7.pdf | 1.08 MB | Adobe PDF | View/Open | |
13_chapter8.pdf | 121.24 kB | Adobe PDF | View/Open | |
14_annexures.pdf | 250.15 kB | Adobe PDF | View/Open | |
15_references.pdf | 185.13 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 121.24 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: