Professional Documents
Culture Documents
PRESENTED BY:
C.DHIVYA
GUIDED BY:
Mrs.D.Ponniselvi, M.Sc.,M.Phil.,
M.Phil(CS)
Assistant Professor
Vivekanandha College of Arts & Sciences for Women(Autonomous)
Tiruchengode
ABSTRACT
Cont..
LITERATURE SURVEY
Discriminating DDoS Attacks from Flash Crowds
Flow similarity-based approach is applied to DDoS attacks from
flash crowds, which remains an open problem to date.
Distributed Denial of Service (DDoS) attacks pose a critical threat
to the Internet.
Botnets for attacks or collecting sensitive information for
malicious purposes, hackers to commit these crimes.
Cont..
DNS for Massive Scale Command and Control
Botnet command-and-control (C&C) channel refers to the
protocol used by bots and botmaster to communicate to each
other.
Example for bots to receive new attack commands and updates
from botmaster, or to submit stolen data.
Botnet needs to be reliable, redundant, and easily as legitimate
traffic.
HTTP-based command and control is difficult to distinguish from
legitimate web traffic
Cont..
Scalable Random Early Detection Scheme against DoS Attacks
The routers queue management strategies are divided into two
categories,
Passive Queue Management (PQM)
Active Queue Management (AQM).
PQM drops the new arriving packets or packets in the head of the
queue when the queue is completely filled.
AQM active queue management is the intelligent drop of network
packets inside a buffer.
EXISTING SYSTEM
Cont..
PROPOSED SYSTEM
SYSTEM METHODOLOGY
1.System Framework
DoS attack traffic behaves differently from the legitimate network traffic, and the
behavior of network traffic is reflected by its statistical properties.
This MCA approach employs triangle area for extracting the correlative information
between the features within an observed data object
Represents,
ith m - dimensional traffic record.
Triangle area concept is applied to extract the geometrical correlation between the j and
k features in the vector xi .
To obtain the triangle formed by the two features, data transformation is involved.
where x
Cont..
The vectors
and
have
elements with values of zero, except the (j,j)th and (k,k)th
elements whose values are ones in "j and "k, respectively.
The y
can be interpreted as a 2D column vector, which
can also be defined as a point on the Cartesian coordinate
system in the (j,k)th 2D euclidean subspace with coordinate
Cont..
Then, on the Cartesian coordinate system, a triangle
formed by the origin and the projected points of the coordinate
on the j-axis and k-axis is found. Its area Tr is defined
Tr
where 1 i n, 1 j m, 1 k m, and j = k.
To make a complete analysis, all possible permutations of any two
distinct features in the vector x are extracted and the corresponding
triangle areas are computed.
A TAM is constructed and all the triangle areas are arranged on the map
with respect to their indexes.
Cont..
Comparison of Detection Latency between Multivariate Correlation Analysis (MCA) and Enhanced Multivariate Correlation Analysis
(EMCA)
25
13
400
27
16
600
30
18
800
32
20
1000
34
22
Comparison of False Positive Rate between Multivariate Correlation Analysis (MCA) and Enhanced Multivariate Correlation
Analysis (EMCA) Schemes
Requests
MCA
EMCA
200
4.52
3.63
400
4.21
3.42
600
4.17
3.25
800
4.23
3.49
1000
4.39
3.58
Requests
MCA
EMCA
200
4.24
3.46
400
4.53
3.62
600
4.31
3.48
800
4.68
3.77
1000
4.57
3.86
Screen Shots
QUERIES?
THANK YOU