A NOVEL APPROACH FOR DETECTING DDoS ATTACK IN H-IDS USING ASSOCIATION RULE

Author(s):  
R. Venkatesan ◽  
D. Rubidha Devi ◽  
R. Keerthana ◽  
A. Arjun Kumar
2020 ◽  
Vol 29 ◽  
pp. 674-677
Author(s):  
Divya Gautam ◽  
Vrinda Tokekar
Keyword(s):  

Author(s):  
Manvi Breja

<span>User profiling, one of the main issue faced while implementing the efficient question answering system, in which the user profile is made, containing the data posed by the user, capturing their domain of interest. The paper presents the method of predicting the next related questions to the first initial question provided by the user to the question answering search engine. A novel approach of the association rule mining is highlighted in which the information is extracted from the log of the previously submitted questions to the question answering search engine, using algorithms for mining association rules and predicts the set of next questions that the user will provide to the system in the next session. Using this approach, the question answering system keeps the relevant answers of the next questions in the repository for providing a speedy response to the user and thus increasing the efficiency of the system.</span>


2015 ◽  
Vol 36 ◽  
pp. 519-533 ◽  
Author(s):  
Gabriela Czibula ◽  
Istvan Gergely Czibula ◽  
Adela-Maria Sîrbu ◽  
Ioan-Gabriel Mircea

2019 ◽  
Vol 18 (03) ◽  
pp. 1950028
Author(s):  
Sheel Shalini ◽  
Kanhaiya Lal

Temporal Association Rule mining uncovers time integrated associations in a transactional database. However, in an environment where database is regularly updated, maintenance of rules is a challenging process. Earlier algorithms suggested for maintaining frequent patterns either suffered from the problem of repeated scanning or the problem of larger storage space. Therefore, this paper proposes an algorithm “Probabilistic Incremental Temporal Association Rule Mining (PITARM)” that uncovers the changed behaviour in an updated database to maintain the rules efficiently. The proposed algorithm defines two support measures to identify itemsets expected to be frequent in the successive segment in advance. It reduces unnecessary scanning of itemsets in the entire database through three-fold verification and avoids generating redundant supersets and power sets from infrequent itemsets. Implementation of pruning technique in incremental mining is a novel approach that makes it better than earlier incremental mining algorithms and consequently reduces search space to a great extent. It scans the entire database only once, thus reducing execution time. Experimental results confirm that it is an enhancement over earlier algorithms.


Micromachines ◽  
2021 ◽  
Vol 12 (9) ◽  
pp. 1019
Author(s):  
Yen-Hung Chen ◽  
Yuan-Cheng Lai ◽  
Kai-Zhong Zhou

The Deterministic Network (DetNet) is becoming a major feature for 5G and 6G networks to cope with the issue that conventional IT infrastructure cannot efficiently handle latency-sensitive data. The DetNet applies flow virtualization to satisfy time-critical flow requirements, but inevitably, DetNet flows and conventional flows interact/interfere with each other when sharing the same physical resources. This subsequently raises the hybrid DDoS security issue that high malicious traffic not only attacks the DetNet centralized controller itself but also attacks the links that DetNet flows pass through. Previous research focused on either the DDoS type of the centralized controller side or the link side. As DDoS attack techniques are evolving, Hybrid DDoS attacks can attack multiple targets (controllers or links) simultaneously, which are difficultly detected by previous DDoS detection methodologies. This study, therefore, proposes a Flow Differentiation Detector (FDD), a novel approach to detect Hybrid DDoS attacks. The FDD first applies a fuzzy-based mechanism, Target Link Selection, to determine the most valuable links for the DDoS link/server attacker and then statistically evaluates the traffic pattern flowing through these links. Furthermore, the contribution of this study is to deploy the FDD in the SDN controller OpenDayLight to implement a Hybrid DDoS attack detection system. The experimental results show that the FDD has superior detection accuracy (above 90%) than traditional methods under the situation of different ratios of Hybrid DDoS attacks and different types and scales of topology.


2011 ◽  
Vol 1 (2) ◽  
pp. 33-40
Author(s):  
Qing LI ◽  
LeJun CHI ◽  
ZhaoXin ZHANG
Keyword(s):  

2019 ◽  
Vol 8 (4) ◽  
pp. 1869-1873

The self-configuring type of network in which the sensor node are deployed in such a manner that they can join or leave the network when they want is known as wireless sensor network. The nodes start communicating with each other in order to transmit important information within the network. As this type of network is decentralized in nature there are numerous malicious nodes which might enter the network. There are so many attacks possible on WSN, in Distributed Denial of Service (DDOS) attacks, malicious nodes adapts many attacks such as flooding attack, black hole attack and warm hole attack, to halt the overall functioning of network. The risks are even more when we talk about military and industrial applications. The DDoS is an active type of attack. When the DDoS attack occurs in the network, it minimizes the lifetime of the network and also increases the overall energy consumption of the network. In order to detect the malicious nodes from the network which cause the DDoS attack, a novel approach is to be proposed in this research work.


Sign in / Sign up

Export Citation Format

Share Document