This paper is published in Volume-4, Issue-6, 2018
Area
Network Security
Author
Shital P. Jade
Org/Univ
D Y Patil College of Engineering, Ambi, Pune, Maharashtra, India
Keywords
DDoS, MCA, KDD Cup 99
Citations
IEEE
Shital P. Jade. Detecting distributed DOS attacks using Multivariate Correlation Analysis, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Shital P. Jade (2018). Detecting distributed DOS attacks using Multivariate Correlation Analysis. International Journal of Advance Research, Ideas and Innovations in Technology, 4(6) www.IJARIIT.com.
MLA
Shital P. Jade. "Detecting distributed DOS attacks using Multivariate Correlation Analysis." International Journal of Advance Research, Ideas and Innovations in Technology 4.6 (2018). www.IJARIIT.com.
Shital P. Jade. Detecting distributed DOS attacks using Multivariate Correlation Analysis, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Shital P. Jade (2018). Detecting distributed DOS attacks using Multivariate Correlation Analysis. International Journal of Advance Research, Ideas and Innovations in Technology, 4(6) www.IJARIIT.com.
MLA
Shital P. Jade. "Detecting distributed DOS attacks using Multivariate Correlation Analysis." International Journal of Advance Research, Ideas and Innovations in Technology 4.6 (2018). www.IJARIIT.com.
Abstract
This paper focuses on identification of DDoS using MCA technique. The intention of this paper is to identify DDoS attack. For that MCA technique use. MCA technique is useful for identification of DDoS attack. MCA is for accurate network of packet traffic. MCA technique uses the anomaly detection approach and triangle area base approach. Anomaly based approach is for finding known and unknown type of attack. Triangle area base approach is for improving the speed of MCA process. In this to test real world data for false positive rate.