Open Access Open Access  Restricted Access Subscription or Fee Access

An Enhanced Method for Reducing the Computational Complexity of Distributed Denial of Service using LAMSTAR Principal Component Analysis

Dr. M. Thangavel, Dr. M. Parameswari

Abstract


The security of computer networks plays a strategic role in modern computer systems. Distributed Denial of Services (DDOS) act as the ‘‘second line of defense’’ placed inside a protected network and looking for known or potential threats in network traffic and/or audit data recorded by hosts. The system is developed a Distributed Denial of Service attacks detection method using LAMSTAR neural network to classify observed system activities and compared the performance of LAMSTAR method. LAMSAR method gives better performance at the cost of testing time high Computational complexity and Training time than the other classification techniques. The system is further reduced the dimension of the data using principal component analysis by reducing  the Computational Complexity of LAMSTAR DDOS which in turn reduces the testing and training time with almost the same performance.


Keywords


Distributed Denial of Service, LAMSTAR, PCA, False Alarm Rate.

Full Text:

PDF

References


A.K.Ghosh, A.Schwartzbard, “Study in Using Neural Networks for Anomaly and Misuse Detection”, in Proc. 8th USENIX Security Symposium, pp 131-142, August 1999, Washington, D.C.

Abirami Muralidharan, J.Patrick Rousche, “Decoding of auditory cortex signals with a LAMSTAR neural network”, Neurological Research, Volume 27, pp. 4-10, January 2005.

D.Graupe and H. Kordylewski, “A Large Memory Storage and Retrieval Neural Network for Adaptive Retrieval and Diagnosis”, International Journal of Software Engineering and Knowledge Engineering, volume 8, pp.115-138, 1998.

D.Graupe, “Principles of Artificial Neural Networks”, pp. 191-222, World Scientific Publishing Co. Pte. Ltd., Singapore, 1997.

H. Kordylewski, “A Large Memory Storage and Retrieval Neural Network for Medical and Engineering Diagnosis/Fault Detection”, Doctor of Philosophy’s Thesis, University of Illinois at Chicago, TK- 99999-K629, 1998.

D.Graupe and H. Kordylewski, “A large scale memory (LAMSTAR) neural network for medical diagnosis”, in Proc. 19th Annual International Conference of the IEEE, Volume 3, Issue 30, Oct-2 Nov 1997 Page(s):1332 – 1335.

S.K.Chang, D.Graupe, K.Hasegawa, H.Kordylewski, “An Active Multimedia Information System for Information Retrieval, Discovery and Fusion”, International Journal of Software Engineering and Knowledge Engineering, volume 8, pp. 139-160, 1998.

http://kdd.ics.uci.edu//databases/Attack/Attack.html

Teuvo Kohonen , “The Self Organizing Map”, in Proc. IEEE, Volume 78, No. 9, pp 1464 – 1480, September 1990.

Srilatha Chebrolu, Ajith Abraham, Johnson P.Thomas, “Feature deduction and ensemble design of DDoS attack detection systems”, Elsevier Journal of Computers & Security” Vol. 24/4, pp. 295-307, 2005.

Itzhak Levin, KDD-99 Classifier Learning Contest LLSoft’s Results Overview, “SIGKDD Explorations. Copyright 2000 ACM SIGKDD”, Vol. 1, Issue 2, pp. 67 -75, January 2000.

www.ll.mit.edu/SST/lnknet/

www-ra.informatik.uni-tuebingen.de/ software/ JavaNNS/ welcome_e.html.

Dae-Ki Kang, “Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation”, in Proc. 6th IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, 2005.

D. Nguyen, A. Das, G. Memik, and A. Choudhary, “Reconfigurable Architecture for Network DDoS attack Detection Using Principal Component Analysis” In Proc. ACM/SIGDA 14th international symposium on Field programmable gate arrays, pp. 235 – 235, 2006.

M.-L. Shyu, S.-C. Chen, K. Sarinnapakorn, and L. Chang, “A novel anomaly detection scheme based on principal component classifier”, In Proc. IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM’03), pp 172–179, Nov. 2003.

I. T. Jolliffe, “Principal Component Analysis”, Springer Verlag, New York, NY, third edition, July 2002.

Jing Gao, Haibin Cheng, Pang Ming Tan, “A Novel Framework for Incorporating Labeled Examples into Anomaly Detection”, in Proc. Of the Siam Conference on Data Mining, April 2006.

Dima Novikov, Roman V. Yampolskiy, Leon Reznik, “Anomaly Detection Based DDoS attack Detection” in Proc. of the Third IEEE International Conference on Information Technology: New Generations (ITNG'06), pp. 420-425, 2005.

Richard Lippmann, “Passive Operating System Identification From TCP/IP Packet Headers” in Proc. of the Workshop on Data Mining for Computer Security (DMSEC), Lincoln Laboratory, Massachusetts, 2003.

Liberios Vokorokos, Anton Baley, Martin Chovenac, “DDoS attack detection system using self organizing map”, Acta Electrotechnica et Informatica , Vol. 6 No.1, pp.1-6, 2006.

Chaker Katar, “Combining Multiple Techniques for DDoS attack Detection”, International Journal of Computer Science and Network Security, Vol. 6 No.2B, February 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.