Dos Attack and Suspicious Activity Detection for a Book Application

Authors

  • Shruthi C. V  PG student, Computer Science ,Dr Ambedkar Institute of Technology, Bangalore, Karnataka, India
  • Mrs. Asha  Associate Professor, Computer Science, Dr.Embedkar Institute of Technology, Bangalore, Karnataka, India

Keywords:

Denial of Service, Log File, Cyber Crimes, Data mining, Association rules.

Abstract

Globally the internet is been accessed by several people within their restricted domains. When the client and server exchange message among each other, there is an activity that can be observed and tracked in detail of the activities that occur in a network that shows the, login and logout durations, the user’s behaviour etc. there are several types of attacks occurring from the internet. In this work the first focus is to provide product recommendations based on the collaborative filtering and content based recommendations. In personal setting the user in order to filter the products based on the transaction log maintained in terms of order information and order details. In Content based recommendations the recommendations related to the product are made based on the transactions performed by the end user. The Session tracking is performed for every click action and every navigation of the user and then behaviour based habitat file is generated. Two kinds of intrusion are detected one is behaviour change using Least Common Sub Square algorithm and then Dos Attack which is repeated action performed by the user within the limited time frame.

References

  1. Know Your Enemy: Learning About Security Threats, 2nd Edition. ISBN: 0321166469. The Honeypot Project 2004.
  2. M.Khan , S.K.Pradhan, M.A.Khaleel, "Outlier Detection for Business Intelligence using data mining techniques", International journal of Computer Applications ( 0975 -8887 ), Volume 106- No. 2, November 2014.
  3. Masud, M.M, Gao,J.Khan, "Peer to Peer Botnet Detection for Cyber Security: A Data Mining Approach". In proceedings: Cyber-security and information Intelligence research workshop. Oakridge national Laboratory, Oakridge May 2008.
  4. Internet Security Threat Report, Volume 21, April 2016, Symantec Crime Report.
  5. Ibrahim Salim, T.A.Razzack,"A study on IDS for Preventing denial of service attack using outliers techniques", 2nd IEEE international conference on Engineering and technology, March 2016.
  6. S.S Rao, SANS Institute Infosec Reading Room.,"Denial of service Attack and mitigation techniques: Real time implementation with detailed analysis", 2011.
  7. Data Mining:Concepts and Techniques, Third Edition, Jiawei Han and Micheline Kamber, ISBN-13, 9780123814791.
  8. Mining of Massive Data Sets, Anand Rajaraman, Jure Leskovec, Jeffrey D. Ullman,2014
  9. A. Klein, F. Ishikawa, and S. Honiden. Efficient heuristic approach with improved time complexity for qos-aware service composition. In ICWS, pages 436–443. IEEE, 2011.
  10. Tripathy, M.Khan, M.R.Patra, H.Fatima, P.Swain, "Dynamic web service composition with QoS clustering" IEEE , International Conference on Web services, 2014.

Downloads

Published

2018-07-30

Issue

Section

Research Articles

How to Cite

[1]
Shruthi C. V, Mrs. Asha, " Dos Attack and Suspicious Activity Detection for a Book Application, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.175-180, July-August-2018.