一种利用关联规则检测H-IDS中DDoS攻击的新方法

Ragav Venkatesan, D. Devi, R. Keerthana, A. Kumar
{"title":"一种利用关联规则检测H-IDS中DDoS攻击的新方法","authors":"Ragav Venkatesan, D. Devi, R. Keerthana, A. Kumar","doi":"10.1109/ICSCAN.2018.8541174","DOIUrl":null,"url":null,"abstract":"Across the globe, all the companies are marching towards data security and data protection. Prevention measures are taken to secure their database from an intruder. As the technology grows rapidly for information/data security, the intruders also use various techniques to exploit data on other side. Distributed Denial of Service (DDoS) attack is used to override the security of targeted system, where the attacker seeks to make a terminal unavailable to its authorized users temporarily by sending \"n\" number of packets over the network. The triggered DDoS attack interrupts any normal operation in a network and not letting the legitimate users to access the machine. Simply, the DDoS floods the targeted machine not to do any further actions. This examination is conveyed to distinguish DDoS attack in OSSEC HIDS, and successful measures to decrease false positive rate. \"OSSEC (HIDS)\"[1] has brought together, cross stage design enabling different frameworks to be effortlessly observed, overseen and simple to get the recorded logs. The extracted report was analyzed with \"ASSOCIATION RULE\" using Weka open source tool.","PeriodicalId":378798,"journal":{"name":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A NOVEL APPROACH FOR DETECTING DDoS ATTACK IN H-IDS USING ASSOCIATION RULE\",\"authors\":\"Ragav Venkatesan, D. Devi, R. Keerthana, A. Kumar\",\"doi\":\"10.1109/ICSCAN.2018.8541174\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Across the globe, all the companies are marching towards data security and data protection. Prevention measures are taken to secure their database from an intruder. As the technology grows rapidly for information/data security, the intruders also use various techniques to exploit data on other side. Distributed Denial of Service (DDoS) attack is used to override the security of targeted system, where the attacker seeks to make a terminal unavailable to its authorized users temporarily by sending \\\"n\\\" number of packets over the network. The triggered DDoS attack interrupts any normal operation in a network and not letting the legitimate users to access the machine. Simply, the DDoS floods the targeted machine not to do any further actions. This examination is conveyed to distinguish DDoS attack in OSSEC HIDS, and successful measures to decrease false positive rate. \\\"OSSEC (HIDS)\\\"[1] has brought together, cross stage design enabling different frameworks to be effortlessly observed, overseen and simple to get the recorded logs. The extracted report was analyzed with \\\"ASSOCIATION RULE\\\" using Weka open source tool.\",\"PeriodicalId\":378798,\"journal\":{\"name\":\"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCAN.2018.8541174\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCAN.2018.8541174","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

在全球范围内,所有公司都在朝着数据安全和数据保护的方向迈进。采取了预防措施来保护他们的数据库免受入侵者的攻击。随着信息/数据安全技术的快速发展,入侵者也在使用各种技术来利用另一端的数据。分布式拒绝服务(DDoS)攻击用于覆盖目标系统的安全性,攻击者通过网络发送“n”个数据包,试图使其授权用户暂时无法使用终端。触发的DDoS攻击会中断网络中的任何正常操作,并且不允许合法用户访问计算机。简单地说,DDoS会淹没目标机器,使其不做任何进一步的操作。阐述了在OSSEC HIDS中如何识别DDoS攻击,以及降低误报率的有效措施。“OSSEC (HIDS)”[1]汇集了跨阶段设计,使不同的框架可以毫不费力地观察,监督和简单地获得记录的日志。提取的报告使用Weka开源工具“ASSOCIATION RULE”进行分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A NOVEL APPROACH FOR DETECTING DDoS ATTACK IN H-IDS USING ASSOCIATION RULE
Across the globe, all the companies are marching towards data security and data protection. Prevention measures are taken to secure their database from an intruder. As the technology grows rapidly for information/data security, the intruders also use various techniques to exploit data on other side. Distributed Denial of Service (DDoS) attack is used to override the security of targeted system, where the attacker seeks to make a terminal unavailable to its authorized users temporarily by sending "n" number of packets over the network. The triggered DDoS attack interrupts any normal operation in a network and not letting the legitimate users to access the machine. Simply, the DDoS floods the targeted machine not to do any further actions. This examination is conveyed to distinguish DDoS attack in OSSEC HIDS, and successful measures to decrease false positive rate. "OSSEC (HIDS)"[1] has brought together, cross stage design enabling different frameworks to be effortlessly observed, overseen and simple to get the recorded logs. The extracted report was analyzed with "ASSOCIATION RULE" using Weka open source tool.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Improvised Algorithm For Computer Vision Based Cashew Grading System Using Deep CNN Fuzzy Based Active Filter For Power Quality Mitigation Access Level Privacy Protection for Security ANALYSING TWO DIMENSIONAL PROGRESSION OF CRACKS IN BUILDINGS USING SOFTWARE A Survey report of the firefighters on fire hazards of PV fire
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1