首页> 外文会议>IEEE International Conference on System, Computation, Automation and Networking >A NOVEL APPROACH FOR DETECTING DDoS ATTACK IN H-IDS USING ASSOCIATION RULE
【24h】

A NOVEL APPROACH FOR DETECTING DDoS ATTACK IN H-IDS USING ASSOCIATION RULE

机译:一种使用关联规则检测H-ID中DDOS攻击的新方法

获取原文

摘要

Across the globe, all the companies are marching towards data security and data protection. Prevention measures are taken to secure their database from an intruder. As the technology grows rapidly for information/data security, the intruders also use various techniques to exploit data on other side. Distributed Denial of Service (DDoS) attack is used to override the security of targeted system, where the attacker seeks to make a terminal unavailable to its authorized users temporarily by sending "n" number of packets over the network. The triggered DDoS attack interrupts any normal operation in a network and not letting the legitimate users to access the machine. Simply, the DDoS floods the targeted machine not to do any further actions. This examination is conveyed to distinguish DDoS attack in OSSEC HIDS, and successful measures to decrease false positive rate. "OSSEC (HIDS)"[1] has brought together, cross stage design enabling different frameworks to be effortlessly observed, overseen and simple to get the recorded logs. The extracted report was analyzed with "ASSOCIATION RULE" using Weka open source tool.
机译:在全球范围内,所有公司都在进行数据安全和数据保护。采取预防措施从入侵者保护其数据库。由于该技术迅速增长信息/数据安全性,入侵者还使用各种技术来利用其他方面的数据。分布式拒绝服务(DDOS)攻击用于覆盖目标系统的安全性,其中攻击者旨在通过在网络上发送“n”数据包暂时向其授权用户进行终端不可用。触发的DDOS攻击中断网络中的任何正常操作,而不会让合法用户访问该计算机。简单地,DDOS泛滥目标机器不做任何进一步的行动。该检查被传达以区分DDOS攻击在OSSEC HIDS中,并成功降低误率的措施。 “OSSEC(HIDS)”[1]汇集在一起​​,跨舞台设计能够毫不费力地观察到不同的框架,监督和简单以获得录制的日志。使用Weka开源工具用“关联规则”分析提取的报告。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号