TY - GEN
T1 - DoS attacks prevention using IDS and data mining
AU - Keshri, Anand
AU - Singh, Sukhpal
AU - Agarwal, Mayank
AU - Nandiy, Sunit Kumar
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/7/2
Y1 - 2016/7/2
N2 - Denial of Service (DoS) attacks pose a serious threat to business companies. DoS attacks is hard to defend because of many different ways that hacker may strike. DoS attacks focus on certain applications. DoS attack targets to make the service out of resources, so that it becomes unavailable to the legitimate users. Due to unpredictable behaviour of hacker it is difficult to distinguish between legitimate and malicious network traffic. Moreover, as defence against these improve, attacks also evolve. New kind of unknown attacks continue to strike and it is not easy to detect them based on information of pre-existing attacks. DOS attacks typically aim websites or services such as card payment gateways, banks, and even domain name servers. In this paper, we discuss about DOS attacks and briefly view the different prevention schemes. Then we discussed DoS prevention using firewall and IDS and different approaches to IDS using Data Mining techniques. We used NSL-KDD dataset, refined version of kdd'99 cup data set for applying Data Mining algorithms and testing.
AB - Denial of Service (DoS) attacks pose a serious threat to business companies. DoS attacks is hard to defend because of many different ways that hacker may strike. DoS attacks focus on certain applications. DoS attack targets to make the service out of resources, so that it becomes unavailable to the legitimate users. Due to unpredictable behaviour of hacker it is difficult to distinguish between legitimate and malicious network traffic. Moreover, as defence against these improve, attacks also evolve. New kind of unknown attacks continue to strike and it is not easy to detect them based on information of pre-existing attacks. DOS attacks typically aim websites or services such as card payment gateways, banks, and even domain name servers. In this paper, we discuss about DOS attacks and briefly view the different prevention schemes. Then we discussed DoS prevention using firewall and IDS and different approaches to IDS using Data Mining techniques. We used NSL-KDD dataset, refined version of kdd'99 cup data set for applying Data Mining algorithms and testing.
UR - http://www.scopus.com/inward/record.url?scp=85027014073&partnerID=8YFLogxK
U2 - 10.1109/ICADW.2016.7942518
DO - 10.1109/ICADW.2016.7942518
M3 - Conference contribution
AN - SCOPUS:85027014073
T3 - 2016 International Conference on Accessibility to Digital World, ICADW 2016 - Proceedings
SP - 87
EP - 92
BT - 2016 International Conference on Accessibility to Digital World, ICADW 2016 - Proceedings
PB - Institute of Electrical and Electronics Engineers
T2 - 1st International Conference on Accessibility to Digital World, ICADW 2016
Y2 - 16 December 2016 through 18 December 2016
ER -