4.6 Article

A statistical class center based triangle area vector method for detection of denial of service attacks

出版社

SPRINGER
DOI: 10.1007/s10586-020-03120-3

关键词

Attack detection; Cluster center; Denial of service attacks; Feature extraction; Mahalanobis distance; Statistical method

向作者/读者索取更多资源

The paper proposes a class center based triangle area vector (CCTAV) method for DoS attack detection, which reduces the complexity of feature extraction and enhances attack detection accuracy by computing the mean of target classes and extracting correlations between features. The proposed method is evaluated using tenfold cross validation and demonstrates significant results compared to existing attack detection methods.
Denial of service (DoS) attack is the menace to private cloud computing environment that denies services provided by cloud servers leading to huge business losses. Efficient DoS attack detection mechanisms are demanded which necessitates the extraction of features for its best performance. The lacuna in the existing feature extraction based detection systems is the sensitiveness of initial cluster center which leads to high false alarm rate and low accuracy. In this paper, this issue is addressed by proposing a class center based triangle area vector (CCTAV) method which computes the mean of target classes individually and extracts the correlation between features. Mahalanobis distance measure is used for profile construction and DoS attacks detection. The proposed CCTAV method is tested with five publicly available datasets and compared with existing methods. It is noticed that the proposed statistical method reduces the complexity of feature extraction and enhances the attack detection process. The proposed approach is evaluated by conducting tenfold cross validation to compute 95% confidence interval. It is evident that the accuracy obtained for all the datasets are within the confidence interval. Further, the proposed CCTAV method provides significant results compared to the state-of-the-art attack detection methods.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Electrical & Electronic

A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data

Bhuvaneswari N. G. Amma, Jitaksh Kapoor

Summary: Security of data is crucial in our digitized world, and a novel approach using encryption and LSB embedding to hide sensitive information without loss of quality has been proposed.

IETE JOURNAL OF RESEARCH (2021)

Article Computer Science, Artificial Intelligence

Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks

N. G. Bhuvaneswari Amma, S. Selvakumar

Summary: This article introduces an optimized deep neural network structure for detecting DDoS attacks, using the CuI optimization technique. Experimental results show that this optimization method outperforms existing techniques and achieves significant performance improvement.

NEURAL COMPUTING & APPLICATIONS (2022)

Article Telecommunications

PaSOFuAC: Particle Swarm Optimization Based Fuzzy Associative Classifier for Detecting Phishing Websites

S. Priya, S. Selvakumar, R. Leela Velusamy

Summary: The increased use of wireless handheld devices and smartphones has led to a rise in internet phishing attacks. Phishing attacks involve forged websites that aim to obtain personal credentials from online users. Current methods for mitigating these attacks include black lists, white lists, and heuristic techniques, with the latter outperforming the others in detecting unknown attacks. Associative Classification (AC) is an emerging heuristic technique that utilizes Association Rule Mining for classification. However, existing AC techniques require two threshold values and face a sharp boundary problem due to discretization of quantitative attributes. To address these issues, this paper proposes a novel Particle Swarm Optimization based Fuzzy Associative Classifier (PaSOFuAC) for phishing website detection. The proposed approach improves detection accuracy by determining the best rule based on Rule Gain Ratio and utilizing fuzzy logic to overcome the sharp boundary problem. Experimental results demonstrate that PaSOFuAC outperforms existing techniques for detecting phishing websites.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Information Systems

A vector convolutional deep autonomous learning classifier for detection of cyber attacks

N. G. Bhuvaneswari Amma

Summary: This paper proposes a method for detecting cyber attacks using deep learning techniques. By using the Vector Convolutional Deep Autonomous Learning (VCDAL) classifier, unknown attacks can be detected in real time, and significant results have been achieved in experiments.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2022)

Article Computer Science, Artificial Intelligence

Stratified hyperparameters optimization of feed-forward neural network for social network spam detection (SON2S)

E. Elakkiya, S. Selvakumar

Summary: In the past decade, the popularity and fascination for social networks have grown exponentially, leading to cybercriminals exploiting social networks for malicious activities such as spam. This research proposes the use of a feed-forward neural network for spam detection, utilizing a reinforcement learning and shuffled frog leaping algorithm to optimize the neural network parameters. Experimental results show that the proposed algorithm achieves higher accuracy and lower false positive rate compared to existing techniques.

SOFT COMPUTING (2022)

Article Engineering, Electrical & Electronic

PClusBA: A Novel Partition Clustering-Based Biometric Authentication Mechanism

Nageswari N. G. Amma, Bhuvaneswari N. G. Amma

Summary: The text discusses an authentication mechanism based on fingerprint biometrics, optimizing the extraction of unique points using partition clustering for higher uniqueness and security. The proposed mechanism, PClusBA, uses a cluster count of eight to achieve a 192-bit UID in accordance with NIST standards, and was found to provide unique results for each image tested.

IETE JOURNAL OF RESEARCH (2022)

Article Computer Science, Information Systems

LPCOCN: A Layered Paddy Crop Optimization-Based Capsule Network Approach for Anomaly Detection at IoT Edge

Bhuvaneswari Amma Narayanavadivoo Gopinathan, Velliangiri Sarveshwaran, Vinayakumar Ravi, Rajasekhar Chaganti

Summary: This article suggests a method for anomaly detection in IoT networks to protect smart devices from cyberattacks. By selecting an optimal set of IoT traffic features and using a learning algorithm for classification, efficient detection at the edge of the IoT network can be achieved. The proposed approach utilizes a layered paddy crop optimization algorithm for feature selection and employs a capsule network for labeling traffic as normal or attack. The experimental results demonstrate the effectiveness of the proposed strategy, outperforming existing base classifiers and feature selection approaches.

INFORMATION (2022)

Article Computer Science, Information Systems

Towards improving the performance of traffic sign recognition using support vector machine based deep learning model

N. G. Bhuvaneswari Amma, Vikrant Rajput

Summary: Nowadays, autonomous vehicles are evolving with the advancements in cutting edge technologies. Traffic recognition system is required to efficiently recognize traffic signals. It consists of sign detection and classification. The proposed approach utilizes a support vector machine based fast detection module to detect traffic signs into different traffic classes, and deep convolutional neural networks for further classification into subclasses. Experimental results on benchmark traffic sign image datasets demonstrate that the proposed approach significantly improves traffic sign recognition accuracy compared to state-of-the-art systems.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

Detection of DoS Attacks in Smart City Networks With Feature Distance Maps: A Statistical Approach

S. Velliangiri, N. G. Bhuvaneswari Amma, Nam-Kyun Baik

Summary: This paper proposes a statistical method for identifying DoS attacks in smart city networks, and develops a DoS attack detection model with low computational complexity and low false positive rate. Using smart city network traffic data set and feature distance map method for statistical analysis, this approach enhances the accuracy of attack detection.

IEEE INTERNET OF THINGS JOURNAL (2023)

Proceedings Paper Computer Science, Information Systems

IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics

N. G. Bhuvaneswari Amma, P. Valarmathi

Summary: The evolution of technology has led to an increase in cyberattacks on IoT devices. Statistical methods can be used to detect intrusions in IoT traffic, but current techniques suffer from the curse of dimensionality. To address this issue, a method called IoT Intrusion Detection (IoTInDet) is proposed, which identifies intrusions by selecting relevant features and calculating their correlation.

INFORMATION SYSTEMS SECURITY, ICISS 2022 (2022)

Proceedings Paper Computer Science, Artificial Intelligence

PalmNet: A CNN Transfer Learning Approach for Recognition of Young Children Using Contactless Palmprints

Kanchana Rajaram, Arti Devi, S. Selvakumar

Summary: Recognition of children's palmprints has gained attention, and the use of CNN transfer learning for palmprint recognition is proposed in this paper. The results demonstrate the effectiveness of the approach with a high matching accuracy of 96% and a low Equal Error Rate (EER) of 0.02%.

MACHINE LEARNING AND AUTONOMOUS SYSTEMS (2022)

Article Computer Science, Information Systems

Detection of phishing attacks using probabilistic neural network with a novel training algorithm for reduced Gaussian kernels and optimal smoothing parameter adaptation for mobile web services

S. Priya, S. Selvakumar

Summary: This study introduces a method for detecting phishing attacks using a probabilistic neural network and a novel training algorithm, as well as a new clustering algorithm and optimization procedure to improve detection accuracy and reduce false positive rates.

INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING (2021)

暂无数据