DETECTION OF PHYSICAL LAYER BASED SPOOFING ATTACK IN WIRELESS NETWORK

Similar documents
Enhanced Multivariate Correlation Analysis (MCA) Based Denialof-Service

A SYSTEM FOR DETECTION AND PRVENTION OF PATH BASED DENIAL OF SERVICE ATTACK

Improved MCA Based DoS Attack Detection

International Journal of Informative & Futuristic Research ISSN (Online):

MCA-based DoS attack detection system using principle of anomaly based detection in attack recognition.

MCA: MULTIVARIATE CORRELATION ANALYSIS FOR ATTACKS

UNCOVERING OF ANONYMOUS ATTACKS BY DISCOVERING VALID PATTERNS OF NETWORK

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis and triangle map generation

TRIANGLE AREA MAP POWERED MULTIVARIATE CORRELATION ANALYSIS FOR ANOMALY BASED DENIAL-OF-SERVICE ATTACK DETECTION

Distributed Denial of Service (DDoS)

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

Basic Concepts in Intrusion Detection

Chapter 7. Denial of Service Attacks

Model Based Prediction Technique for Denial of Service Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection

Denial of Service (DoS)

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

An Efficient Way of Detecting Denial-Of-Service Attack Using Multivariate Correlation Analysis

International Journal of Research in Computer and Communication Technology, Vol 4, Issue 10, October- 2015

COMPUTER NETWORK SECURITY

Security+ Guide to Network Security Fundamentals, Fourth Edition. Network Attacks Denial of service Attacks

Denial of Service and Distributed Denial of Service Attacks

Configuring attack detection and prevention 1

Computer Security: Principles and Practice

To Study and Explain the Different DDOS Attacks In MANET

Configuring attack detection and prevention 1

DoS Attack Detection System Using Multivariate Correlation Analysis(MCA) and Classification Techniques

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

DDoS PREVENTION TECHNIQUE

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 9

Intrusion Detection System

A Software Tool for Network Intrusion Detection

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

CLASSIFICATION OF LINK BASED IDENTIFICATION RESISTANT TO DRDOS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 9

Denial of Service. Serguei A. Mokhov SOEN321 - Fall 2004

CSE 565 Computer Security Fall 2018

Review on Data Mining Techniques for Intrusion Detection System

Low-rate and High-rate Distributed DoS Attack Detection Using Partial Rank Correlation

CSC 6575: Internet Security Fall Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers

A Firewall Architecture to Enhance Performance of Enterprise Network

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

TO DETECT AND RECOVER THE AUTHORIZED CLI- ENT BY USING ADAPTIVE ALGORITHM

Attack Prevention Technology White Paper

CSE Computer Security (Fall 2006)

A Survey on DDoS Attack and Defense Strategies: From Traditional Schemes to Current Techniques

Ping of death Land attack Teardrop Syn flood Smurf attack. DOS Attack Methods

DoS Cyber Attack on a Government Agency in Europe- April 2012 Constantly Changing Attack Vectors

PROTECTING INFORMATION ASSETS NETWORK SECURITY

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

A Novel Approach to Denial-of-Service Attack Detection with Tracebacking

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Developing the Sensor Capability in Cyber Security

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

Cloudflare Advanced DDoS Protection

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

EE 122: Network Security

CSE 565 Computer Security Fall 2018

Anatomy and Mechanism of DOS attack

Denial of Service (DoS) attacks and countermeasures

Double Guard: Detecting intrusions in Multitier web applications with Security

Computer Security: Principles and Practice

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric

DESIGN AND DEVELOPMENT OF MAC LAYER BASED DEFENSE ARCHITECTURE FOR ROQ ATTACKS IN WLAN

DDoS Testing with XM-2G. Step by Step Guide

Modeling Intrusion Detection Systems With Machine Learning And Selected Attributes

CSE Computer Security

Detection Of Dos Attack Using Multivariate Correlation Analysis

Distributed Denial of Service

INTRODUCTION ON D-DOS. Presentation by RAJKUMAR PATOLIYA

HP High-End Firewalls

HP High-End Firewalls

NETWORK SECURITY. Ch. 3: Network Attacks

Towards Intelligent Fuzzy Agents to Dynamically Control the Resources Allocations for a Network under Denial of Service Attacks

Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users

DDOS DETECTION SYSTEM USING C4.5 DECISION TREE ALGORITHM

DDOS Attack Prevention Technique in Cloud

Worldwide Detection of Denial of Service (DoS) Attacks

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Towards Traffic Anomaly Detection via Reinforcement Learning and Data Flow

DENIAL OF SERVICE ATTACKS

DDoS and Traceback 1

IMPLEMENTATION OF VARIETY ASSOCIATION ANALYSIS FOR DENIALOF-SERVICE ATTACK DETECTION

On the State of the Inter-domain and Intra-domain Routing Security

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 11

International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 ISSN

Raj Jain. Washington University in St. Louis

DDoS Mitigation & Case Study Ministry of Finance

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Contents. Denial-of-Service Attacks. Flooding Attacks. Distributed Denial-of Service Attacks. Reflector Against Denial-of-Service Attacks

Check Point DDoS Protector Simple and Easy Mitigation

Why IPS Devices and Firewalls Fail to Stop DDoS Threats

9. Security. Safeguard Engine. Safeguard Engine Settings

Transcription:

DETECTION OF PHYSICAL LAYER BASED SPOOFING ATTACK IN WIRELESS NETWORK *Corresponding Author: M. Rajesh E-mail:jishnukannan00@gmail.com, Jishnu T M, Lijo john, Sreekanth C, M. Rajesh * Department of computer science, Sri venkateshwara hi-tech engineering college, Erode 638 453, Tamilnadu, India. Received: 01/01/2017, Revised: 07/02/2017 and Accepted: 02/04/2017 Abstract Interconnected systems, such as Web servers, database servers, cloud computing servers etc, are now under threads from network attackers. As one of most common and aggressive means, Denial-of-Service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. This makes our solution capable of detecting known and unknown DoS attacks effectively by learning the patterns of legitimate network traffic only. Furthermore, a triangle-area-based technique is proposed to enhance and to speed up the process of MCA. The effectiveness of our proposed detection system is evaluated using KDD Cup 99 dataset, and the influences of both nonnormalized data and normalized data on the performance of the proposed detection system are examined. The results show that our system outperforms two other previously developed state-of-the-art approaches in terms of detection accuracy. Keywords: Bayesian network, java jdk1.3, LAN 1. Introduction Denial-Of-Service (DoS) attacks are one type of aggressive and menacing intrusive behavior to online servers. DoS attacks severely degrade the availability of a victim, which can be a host, a router, or an entire network. They impose intensive computation tasks to the victim by exploiting its system vulnerability or flooding it with huge amount of useless packets. The victim can be forced out of service from a few minutes to even several days. This causes serious damages to the services running on the victim. Therefore, effective detection of DoS attacks is essential to the protection of online services. Work on DoS attack detection mainly focuses on the development of network-based detection mechanisms. Detection systems based on these mechanisms monitor traffic transmitting over the protected networks. These mechanisms release the protected online servers from monitoring attacks and ensure that the servers can dedicate themselves to provide quality services with minimum delay in response. Moreover, network-based detection systems are loosely coupled with operating systems running on the host machines which they are protecting. As a result, the configurations of network based detection systems are less complicated than that of 17

host-based detection systems. Generally, network-based detection systems can be classified into two main categories, namely 1.misuse based detection systems 2.anomaly-based detection systems Misuse-based detection systems detect attacks by monitoring network activities and looking for matches with the existing attack signatures. In spite of having high detection rates to known attacks and low false positive rates, misuse-based detection systems are easily evaded by any new attacks and even variants of the existing attacks. Furthermore, it is a complicated and labour intensive task to keep signature database updated because signature generation is a manual process and heavily involves network security expertise. Research community, therefore, started to explore a way to achieve novelty-tolerant detection systems and developed a more advanced concept, namely anomaly based detection. Owing to the principle of detection, which monitors and flags any network activities presenting significant deviation from legitimate traffic profiles as suspicious objects, anomaly-based detection techniques show more promising in detecting zero-day intrusions that exploit previous unknown system vulnerabilities. Moreover, it is not constrained by the expertise in network security, due to the fact that the profiles of legitimate behaviours are developed based on techniques, such as data mining machine learning and statistical analysis. However, these proposed systems commonly suffer from high false positive rates because the correlations between features/attributes are intrinsically neglected or the techniques do not manage to fully exploit these correlations. Recent studies have focused on feature correlation analysis. Yu et al. proposed an algorithm to discriminate DDoS attacks from flash crowds by analyzing the flow correlation coefficient among suspicious flows. A covariance matrix based approach was designed in to mine the multivariate correlation for sequential samples. Although the approach improves detection accuracy, it is vulnerable to attacks that linearly change all monitored features. In addition, this approach can only label an entire group of observed samples as legitimate or attack traffic but not the individuals in the group. To deal with the above problems, an approach based on triangle area was presented in to generate better discriminative features. However, this approach has dependency on prior knowledge of malicious behaviours. More recently, Jamdagni et al. developed a refined geometrical structure based analysis technique, where Mahalanobis distance was used to extract the correlations between the selected packet payload features. This approach also successfully avoids the above problems, but it works with network packet payloads. In Tan et al. proposed a more sophisticated non-payload based DoS detection approach using Multivariate Correlation Analysis (MCA). Following this emerging idea, we present a new MCA-based detection system to protect online services against DoS attacks in this paper, which is built upon our previous work in. The file server has become the victim of a denial-of-service (DoS) attack. Because multiple routers and servers are involved in the attack, this is known as distributed DoS (DDoS) attack. A DDoS attack usually involves the hijacking of several computers and routers to use as agents of the attack. 2. Objective Denial of service (DoS) attacks are characterized by an explicit attempt to prevent the legitimate use of a service. These attacks are one of the major threats against the availability in the Internet. Perpetrators of DoS attacks typically target various sites and services and their impact varies from minor inconvenience to users of a web site to serious financial losses for companies that rely on their online availability to do business. High-profile servers such as web servers of banks, credit card payment gateways, root name servers, famous search engines (e.g., Yahoo, Google), government s web servers, broadcasting news servers, commercial servers (e.g., ebay, Amazon), social sites (e.g., Twitter, Face book), critical infrastructure servers (e.g., power plants), etc., are the most likely targets for perpetrator of DoS attacks. 18

DoS attacks can be roughly divided into two categories: application- bug level and infrastructure level attacks. In application bug level attacks, the attacker for example renders a computing resource unavailable by modifying the system configuration, or overloads an application by sending it abusive workload which leads to the crashing of the application, or sends one or more careful crafted packets that exploit the application vulnerability in the target machine. The classical example of this type of attacks is the ping-of-death attack in which the attacker sends a ping packet larger than the maximum IPv4 packet size, which is 65,535 bytes. Historically, many operating systems could not handle such a ping packet and consequently operating systems crash, freeze, or reboot due to buffer overflow. Application-bug level attacks are generally treated through patching known vulnerabilities, security policies, etc. Infrastructure-level attacks, often take place in a distributed manner (distributed denial of service (DDoS) attacks) where an attacker employs a large number of hijacked zombie machines to attack the victim. In this attack, any zombie machine sends a flood of packets to overwhelm the bottleneck resources of the victim (e.g., network bandwidth, TCP buffers and CPU cycles). Infrastructure-level DDoS attacks are also well-known as DDoS flooding attacks. In infrastructure-level attacks, the attacker only needs to know the victim s IP address. This paper focuses only on infrastructurelevel attacks. 2.1 DDoS flooding attacks DDoS flooding attacks can be launched in two forms of attacks: direct attacks and reflector attacks. In direct attacks, the attacker directly sends a flood of bogus packets toward the victim through the zombie machines. Direct DDoS attacks are classified into two categories: network-layer DDoS attacks and application-layer DDoS attacks. Network-layer DDoS attacks encompass: TCP flood, UDP flood, ICMP flood and SYN flood. Application-layer DDoS attacks encompass: HTTP flood, HTTPS flood, FTP flood, etc. In reflector attacks, the attacker sends request messages to reflector machines through zombie machines, spoofing the source IP address of the victim server. As a result, the reflector machines send their replies to the given address causing packet flooding at that site which is the victim server. The well-known reflector attacks are ICMP ECHO reply flood, SYN ACK (RST) flood, DNS flood, Smurf attack [5] and Fraggle attack [6]. Fig. 1 shows direct DDoS and reflector DDoS attacks. We have provided a more complete literature about DDoS attacks including classification of DDoS attacks, attack toolkits, several statistical reports about DDoS attacks, evolution of DDoS attacks, etc., in [7]. Several countermeasures have been proposed since year 2000 when almost DDoS attacks started at that year [1]. Countermeasures against DDoS attacks roughly classified in three categories: survival techniques, proactive techniques and reactive techniques [8]. This paper presents a survey on all categories and evaluates each technique in depth. Although some surveys on DoS countermeasures have already been published, none of them analyzes countermeasures in detail and moreover none of them presents a countermeasure against each defence mechanism in the attacker s point of view. Mirkovic and Reiher [8] presented a taxonomy of DDoS attacks and defense mechanisms. Molsa [9] provided a tutorial on mitigating DDoS attacks. Chen et al. [10] discussed the characterization of defense mechanisms against DDoS attacks. Carl et al. [2] provided a survey on DoS detection techniques. 3. Classifying DDoS defense techniques based on defense points Based on the above discussion and the points of defense, defense methods can be classified in four categories: source-end, core-end, victim-end and distributed. 3.1 Source-end defense techniques These techniques are deployed at source-end points. These nodes autonomously detect malicious packets and then filter or rate-limit outgoing malicious packets toward a victim server. Source-end defense points are the best points to filter or 19

rate-limit malicious traffic because minimum damage occurs for legitimate traffic. Moreover, any source-end defense point experiences a small portion of traffic and consequently it needs minimum amount of resources (e.g., processing power and buffers) for the defense. However, distinguishing malicious traffic from legitimate traffic is a serious challenge. Moreover, a source-end defense technique cannot observe its own effect on suspicious traffic (e.g., rate-limit or filter) at the victim side simply because it has no interaction with the victim. Hence, the percentage of false positive and false negative could be high. D- WARD is an example of a source-end defense technique. 3.2 Core-end defense techniques In these techniques any core router independently tries to detect malicious traffic and then filter or rate-limit the traffic. As core routers handle a large volume and highly aggregated traffic, they are not likely points to detect and filter traffic for each possible victim, separately. In fact, due to large volume of network traffic, it is not likely that core routers assign a part of their CPU cycles or their memory to detect any possible DoS traffic and then filter the traffic based on an attack signature. Another challenge for these techniques is that discriminating malicious traffic from good traffic is not an easy task. Core routers are promising points to rate-limit traffic toward a victim server regardless of the type of traffic. The architecture proposed by Zhang and Parashar is an example of this type. 3.3 Victim-end defense techniques Victim-end defense points can easily discriminate DoS traffic from legitimate traffic. The major problem with victimend defense techniques is that victim-end defense points are not good points for rate-limiting or filtering attack traffic because the bandwidth might be saturated. Approaches proposed in are victim-end defense methods. 3.4 Distributed defense techniques As discussed above source-end points are promising points to rate-limit or filter malicious traffic; core-end points are promising points to only rate-limit traffic regardless of type of traffic and finally victim-end points are promising points to detect and discriminate DoS traffic from legitimate traffic. Hence, a cooperative mechanism between source-end and victim-end, or between core-end and victim-end, or between source-end, core-end and victim-end can be favourite defense techniques against DDoS attacks. Victim-end points can detect DoS traffic, generate an attack signature, generate good traffic signature and then ask upstream routers (e.g., source-end points) to rate-limit or filter traffic according to the signature. Distributed defenses seem a proper solution to tackling DDoS threats. However, they are infrastructural solutions that need cooperation from multiple ISPs and administrative domains. Security and authenticating the communication channels also are hard problems that should be solved. 4. Classifying DDoS defense techniques based on reaction time Based on the reaction time to DDoS attacks, the countermeasures can be classified into three categories: survival, proactive and reactive. Survival techniques suggest that the victim server tackles DDoS attacks by enlarging bottleneck resources. Proactive techniques prevent happening of DDoS attacks by some modifications in gateway routers, core routers, etc. Reactive techniques fight with DDoS attacks after happening of DDoS attacks. known techniques in each category. Generally, network-based detection systems can be classified into two main categories, namely misuse-based detection systems and anomaly-based detection systems. Misuse-based detection systems detect attacks by monitoring network activities and looking for matches with the existing attack signatures. In spite of having high detection rates to known attacks and low false positive rates, misuse-based detection systems are easily evaded by any new attacks and even variants of the existing attacks. Furthermore, it is a complicated and labour intensive task to keep signature database updated because signature generation is a 20

manual process and heavily involves network security expertise. Most existing IDS are optimized to detect attacks with high accuracy. However, they still have various disadvantages that have been outlined in a number of publications and a lot of work has been done to analyze IDS in order to direct future research. Besides others, one drawback is the large amount of alerts produced. In this paper, we present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. Our MCA-based DoS attack detection system employs the principle of anomaly-based detection in attack recognition. The DoS attack detection system presented in this paper employs the principles of MCA and anomaly-based detection. They equip our detection system with capabilities of accurate characterization for traffic behaviours and detection of known and unknown attacks respectively. A triangle area technique is developed to enhance and to speed up the process of MCA. A statistical normalization technique is used to eliminate the bias from the raw data. More detection accuracy Less false alarm Accurate characterization for traffic behaviours and detection of known and unknown attacks respectively 5. System Architecture: The whole detection process consists of three major steps as shown in Fig. 1. The sample-by-sample detection mechanism is involved in the whole detection phase (i.e., Steps 1, 2 and 3). In Step 1, basic features are generated from ingress network traffic to the internal network where protected servers reside in and are used to form traffic records for a well-defined time interval. Monitoring and analyzing at the destination network reduce the overhead of detecting malicious activities by concentrating only on relevant inbound traffic. This also enables our detector to provide protection which is the best fit for the targeted internal network because legitimate traffic profiles used by the detectors are developed for a smaller number of network services. The detailed process can be found in [17]. Step 2 is Multivariate Correlation Analysis, in which the Triangle Area Map Generation module is applied to extract the correlations between two distinct features within each traffic record coming from the first step or the traffic record normalized by the Feature Normalization module in this step (Step 2). The occurrence of network intrusions cause changes to these correlations so that the changes can be used as indicators to identify the intrusive activities. All the extracted correlations, namely triangle areas stored in Triangle Area Maps (TAMs), are then used to replace the original basic features or the normalized features to represent the traffic records. This provides higher discriminative information to differentiate between legitimate and illegitimate traffic records. Our MCA method and the feature normalization technique are explained in Sections 3 and 5.2 respectively. In Step 3, the anomalybased detection mechanism [3] is adopted in Decision Making. It facilitates the detection of any DoS attacks without requiring any attack relevant knowledge. Furthermore, the labor-intensive attack analysis and the frequent update of the attack signature database in the case of misuse-based detection are avoided. Meanwhile, the mechanism enhances the robustness of the proposed detectors and makes them harder to be evaded because attackers need to generate attacks that match the normal traffic profiles built by a specific detection algorithm. This, however, is a labor-intensive task and requires expertise in the targeted detection algorithm. Specifically, two phases (i.e., the Training Phase and the Test Phase ) are involved in Decision Making. The 21

Normal Profile Generation module is operated in the Training Phase to generate profiles for various types of legitimate traffic records, and the generated normal profiles are stored in a database. The Tested Profile Generation module is used in the Test Phase to build profiles for individual observed traffic records. Then, the tested profiles are handed over to the Attack Detection module, which compares the individual tested profiles with the respective stored normal profiles. A threshold-based classifier is employed in the Attack Detection module to distinguish DoS attacks from legitimate traffic. 6. Multivariate Correlation Analysis DoS attack traffic behaves differently from the legitimate network traffic, and the behavior of network traffic is reflected by its statistical properties. To well describe these statistical properties, we present a novel Multivariate Correlation Analysis (MCA) approach in this section. This MCA approach employs triangle area for extracting the correlative information between the features within an observed data object (i.e., a traffic record). The details are presented in the following. A denialof-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root name servers. The term is generally used with regards to computer networks, but is not limited to this field, for example, it is also used in reference to CPU resource management. One common method of attack involves saturating the target (victim) machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately. Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet Service Providers. They also commonly constitute violations of the laws of individual nations. 7. Conclusion This paper has presented a MCA-based DoS attack detection system which is powered by the triangle-areabased MCA technique and the anomaly-based detection technique. The former technique extracts the geometrical correlations hidden in individual pairs of two distinct features within each network traffic record, and offers more accurate characterization for network traffic behaviors. The latter technique facilitates our system to be able to distinguish both known and unknown DoS attacks from legitimate network traffic. Evaluation has been conducted using KDD Cup 99 dataset to verify the effectiveness and performance of the proposed DoS attack detection system. The influence of original (non-normalized) and normalized data has been studied in the paper. The results have revealed that when working with non-normalized data, our detection system achieves maximum 95.20% detection accuracy although it does not work well in identifying Land, Neptune and Teardrop attack records. The problem, however, can be solved by utilizing statistical normalization technique to eliminate the bias from the data. The results of evaluating with the normalized data have shown a more encouraging detection accuracy of 99.95% and nearly 100.00% DRs for the various DoS attacks. Besides, the comparison result has proven that our detection system outperforms two state-of-the-art approaches in terms of detection accuracy. Moreover, the computational complexity and the time cost of the proposed detection system have been analyzed. 22

The proposed system achieves equal or better performance in comparison with the two state-of-the-art approaches. To be part of the future work, we will further test our DoS attack detection system using real world data and employ more sophisticated classification techniques to further alleviate the false positive rate. Acknowledgement facilities References The author is thankful to sophisticated Test and instrumentation center, Erode,Tamil Nadu,For providing system [1] V. Paxson, Bro: A System for Detecting Network Intruders in Realtime, Computer Networks, vol. 31, pp. 2435-2463, 1999 [2] P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and E. Vzquez, Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges, Computers & Security, vol. 28, pp. 18-28, 2009. [3] D. E. Denning, An Intrusion-detection Model, IEEE Transactions on Software Engineering, pp. 222-232, 1987. [4] K. Lee, J. Kim, K. H. Kwon, Y. Han, and S. Kim, DDoS attack detection method using cluster analysis, Expert Systems with Applications, vol. 34, no. 3, pp. 1659-1665, 2008. [5] A. Tajbakhsh, M. Rahmati, and A. Mirzaei, Intrusion detection using fuzzy association rules, Applied Soft Computing, vol. 9, no. 2, pp. 462-469, 2009. [6] J. Yu, H. Lee, M.-S. Kim, and D. Park, Traffic flooding attack detection with SNMP MIB using SVM, Computer Communications, vol. 31, no. 17, pp. 4212-4219, 2008. [7] W. Hu, W. Hu, and S. Maybank, AdaBoost-Based Algorithm for Network Intrusion Detection, Trans. Sys. Man Cyber. Part B, vol. 38, no. 2, pp. 577-583, 2008. [8] C. Yu, H. Kai, and K. Wei-Shinn, Collaborative Detection of DDoS Attacks over Multiple Network Domains, Parallel and Distributed Systems, IEEE Transactions on, vol. 18, pp. 1649-1662, 2007. [9] G. Thatte, U. Mitra, and J. Heidemann, Parametric Methods for Anomaly Detection in Aggregate Traffic, Networking, IEEE/ACM Transactions on, vol. 19, no. 2, pp. 512-525, 2011. [10] S. T. Sarasamma, Q. A. Zhu, and J. Huff, Hierarchical Kohonenen Net for Anomaly Detection in Network Security, Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, vol. 35, pp. 302-312, 2005. 23