Detecting DDoS attack using a multilayer data mining techniques

العناوين الأخرى

طريقة لمنع هجمات الحرمان الموزعة باستخدام آليات التنقيب عن البيانات

مقدم أطروحة جامعية

al-Biltaji, Hibah Saqr Mahmud

مشرف أطروحة جامعية

Barhum, Tawfiq Sulayman

أعضاء اللجنة

al-Agha, Iyad Muhammad
Fatayir, Tamir Sad

الجامعة

الجامعة الإسلامية

الكلية

كلية تكنولوجيا المعلومات

دولة الجامعة

فلسطين (قطاع غزة)

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2015

الملخص الإنجليزي

Availability is one of the three main components of computer security, along with confidentiality and integrity.

One of the major threats to network security is Denial of Service (DDoS),which is a relatively simple, but very powerful technique to attack internet resources as well as system resources.

Distributed multiple agents consume some critical resources at the target within the short time and deny the service to legitimate clients .

Most current network intrusion detection systems employ signature-based methods or supervised-based methods which rely on labelled training data.

This training data is typically expensive to produce, these methods have difficulty in detecting new types of attack, Using unsupervised anomaly detection techniques , the system can be trained with unlabelled data and is capable of detecting previously “unseen" attacks.

In this research we multi-clustering method using data mining techniques by combination of clustering method (K-Mean(Km) ,K-Medoid(KD),K-Fast Mean(KFM)) as a multi clustering to be able for detecting anew DDoS attacks from unlabelled dataset depend on unsupervised behavior-anomaly detection approach, Davies_Bouldin index(DB) is used to evaluate the proposed method .

The results show that the proposed method has lower davies_bouldin index.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

عدد الصفحات

49

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Theoretical background.

Chapter Three : Related work.

Chapter Four : Research methodology.

Chapter Five : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

al-Biltaji, Hibah Saqr Mahmud. (2015). Detecting DDoS attack using a multilayer data mining techniques. (Master's theses Theses and Dissertations Master). Islamic University, Palestine (Gaza Strip)
https://search.emarefa.net/detail/BIM-688517

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

al-Biltaji, Hibah Saqr Mahmud. Detecting DDoS attack using a multilayer data mining techniques. (Master's theses Theses and Dissertations Master). Islamic University. (2015).
https://search.emarefa.net/detail/BIM-688517

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

al-Biltaji, Hibah Saqr Mahmud. (2015). Detecting DDoS attack using a multilayer data mining techniques. (Master's theses Theses and Dissertations Master). Islamic University, Palestine (Gaza Strip)
https://search.emarefa.net/detail/BIM-688517

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-688517