Open Access   Article Go Back

Correlation Based Mechanism for the Detection of DDOS Attack

Simmi 1 , Harjinder Kaur2

Section:Research Paper, Product Type: Journal Paper
Volume-9 , Issue-3 , Page no. 18-22, Mar-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i3.1822

Online published on Mar 31, 2021

Copyright © Simmi, Harjinder Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Simmi, Harjinder Kaur, “Correlation Based Mechanism for the Detection of DDOS Attack,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.3, pp.18-22, 2021.

MLA Style Citation: Simmi, Harjinder Kaur "Correlation Based Mechanism for the Detection of DDOS Attack." International Journal of Computer Sciences and Engineering 9.3 (2021): 18-22.

APA Style Citation: Simmi, Harjinder Kaur, (2021). Correlation Based Mechanism for the Detection of DDOS Attack. International Journal of Computer Sciences and Engineering, 9(3), 18-22.

BibTex Style Citation:
@article{Kaur_2021,
author = {Simmi, Harjinder Kaur},
title = {Correlation Based Mechanism for the Detection of DDOS Attack},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2021},
volume = {9},
Issue = {3},
month = {3},
year = {2021},
issn = {2347-2693},
pages = {18-22},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5311},
doi = {https://doi.org/10.26438/ijcse/v9i3.1822}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i3.1822}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5311
TI - Correlation Based Mechanism for the Detection of DDOS Attack
T2 - International Journal of Computer Sciences and Engineering
AU - Simmi, Harjinder Kaur
PY - 2021
DA - 2021/03/31
PB - IJCSE, Indore, INDIA
SP - 18-22
IS - 3
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
393 320 downloads 168 downloads
  
  
           

Abstract

As technology is blooming cloud computing becomes indispensible part of many companies. The users are dependent upon cloud infrastructure as it is widely adopted and used technology. In cloud computing the prime concern is shared storage and it has many security issues. One of these security issues is DDOS attack that can effect business organization which utilizes cloud. This paper describes an approach to handle DDOS attack in cloud systems. In the proposed approach Interpolation between the values are located. In the proposed approach, security attributes gives highest Interpolation and reliability is the next highest Interpolation values. Both of these attributes serve as root nodes. The comparison between these attributes and training data is made to determine the DDOS attack. This means complication of calculations is reduced. Execution time is greatly reduced using this procedure. Results obtained are similar but execution time is reduced. The mechanism of ordering and normalization gives the hierarchical clustering.

Key-Words / Index Term

cloud computing, DDOS attack, Interpolation

References

[1] K. Kim, M. Erza, A. Harry, and C. Tanuwidjaja, Network Intrusion Detection using Deep Learning A Feature Learning Approach. 2018.
[2] W. Kong, Y. Lei, and J. Ma, “Data security and privacy information challenges in cloud computing,” Int. J. Comput. Sci. Eng., vol. 16, no. 3, pp. 215–218, 2018.
[3] S. A. Repalle, V. R. Kolluru, and 2, “Intrusion Detection System using AI and Machine Learning Algorithm,” Int. Res. J. Eng. Technol., vol. 4, no. 12, pp. 1709–1715, 2017.
[4] Z. Zhou, C. Du, L. Shu, G. Hancke, J. Niu, and H. Ning, “An Energy-Balanced Heuristic for Mobile Sink Scheduling in Hybrid WSNs,” IEEE Trans. Ind. Informatics, vol. 12, no. 1, pp. 28–40, 2016.
[5] Y. Chen, J. Yang, W. Trappe, and R. P. Martin, “Detecting and localizing identity-based attacks in wireless and sensor networks,” IEEE Trans. Veh. Technol., vol. 59, no. 5, pp. 2418–2434, 2010.
[6] S. G. Hersha, Rajendra Patil, “Protocol Specfic Multi Threaded Network Intrusion Detection System(PM-NIDS) for DOS/DDOS attack detection in cloud,” IEEE ACcess, 2018.
[7] S. Moradi, “A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks,” IEEE Access, pp. 276–280, 2016.
[8] D. Kim and S. An, “PKC-based dos attacks-resistant scheme in wireless sensor networks,” IEEE Sens. J., vol. 16, no. 8, pp. 2217–2218, 2016.
[9] M. Luo, C. Zou, and J. Xu, “An efficient identity-based broadcast signcryption scheme,” J. Softw., vol. 7, no. 2, pp. 366–373, 2012.
[10] S. Sadrhaghighi and I. T. Engineering, “Detect Pollution Attacks in Intra-Session Network Coding,” pp. 7–12, 2016.
[11] P. Sarigiannidis, “Analysing Indirect Sybil Attacks in Randomly Deployed Wireless Sensor Networks,” IEEE Access, pp. 0–5, 2016.
[12] S. Mahajan, “A Mechanism of preventing Sybil Attack in MANET using Bacterial Foraging Optimization,” IEEE Access, pp. 4–8, 2016.