z-logo
open-access-imgOpen Access
Review on EM-CURE Algorithm for Detection DDOS Attack
Author(s) -
Miss Priyanka P. Narode,
Irshad Shaikh
Publication year - 2018
Publication title -
international journal of engineering and computer science
Language(s) - English
Resource type - Journals
ISSN - 2319-7242
DOI - 10.18535/ijecs/v7i1.04
Subject(s) - denial of service attack , computer science , application layer ddos attack , cluster analysis , data mining , network packet , trinoo , botnet , flooding (psychology) , network security , constant false alarm rate , the internet , entropy (arrow of time) , computer network , computer security , algorithm , artificial intelligence , psychology , physics , quantum mechanics , world wide web , psychotherapist
Distributed Denial of Service attack (DoS attack) is a cyber attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. It is necessary to analyze the fundamental features of DDoS attacks because these attacks can easily vary the used port/protocol, or operation method because they are designed to restricted applications on limited environments.DDoS attack detection very difficult because the non-existence of predefined rules to correctly identify the genuine network flow. A combination of unsupervised data mining techniques as IDS are introduced. The Entropy Method concept in term of windowing the incoming packets is applied with data mining technique using Clustering Using Representative (CURE) as cluster analysis to detect the DDoS attack in network flow. The data is mainly collected from datasets. The CURE DDoS attack detection technique based on entropy gives a promising way to analyze this attack and construct an efficient detection model using a clustering data mining techniques. This approach has been evaluated and compared with several existing approaches in terms of accuracy, false alarm rate, detection rate, F. measure and Phi coefficient.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here