Research Output
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection
  Cloud computing plays an important role in current converged networks. It brings convenience of accessing services and information to users regardless of location and time. However, there are some critical security issues residing in cloud computing, such as availability of services. Denial of service occurring on cloud computing has even more serious impact on the Internet. Therefore, this paper studies the techniques for detecting Denial-of-Service (DoS) attacks to network services and proposes an effective system for DoS attack detection. The proposed system applies the idea of Multivariate Correlation Analysis (MCA) to network traffic characterization and employs the principal of anomaly-based detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle area technique is proposed to enhance and speed up the process of MCA. The effectiveness of our proposed detection system is evaluated on the KDD Cup 99 dataset, and the influence of both non-normalized and normalized data on the performance of the detection system is examined. The results presented in the system evaluation section illustrate that our DoS attack detection system outperforms two state-of-the-art approaches.

  • Date:

    30 June 2012

  • Publication Status:

    Published

  • Publisher

    Institute of Electrical and Electronics Engineers (IEEE)

  • DOI:

    10.1109/trustcom.2012.284

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    005.8 Data security

Citation

Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2012). Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. https://doi.org/10.1109/trustcom.2012.284

Authors

Keywords

triangle area, Denial-of-Service attack, network traffic characterization, multivariate correlations

Monthly Views:

Available Documents