IJIMT 2010 Vol.1(2): 209-213  ISSN: 2010-0248
DOI: 10.7763/IJIMT.2010.V1.39

Defend against Anomaly Intrusion Detection using SWT Mechanism

M.Thangavel1, P.Thangaraj2 and K.Saravanan3

Abstract—In the fast growing internet commercial transaction base, attacks on Internet infrastructure, anomaly intrusion traffic attacks combined with traditional network intruders, have become one of the most serious threats to the network security. The proposed system of the traffic anomaly detection method is carried out on the principle traces of nonintrusive packet header data (statistical wavelet transform)obtained from the internet server traffic basement. Traffic is monitored at regular intervals to obtain a signal that can be analyzed through statistical techniques and compared to historical norms to detect anomalies. The proposed methodology of anomaly intrusion traffic detection envisions statistical non intrusive wavelet transform mechanisms for real-time data source extracted from NetCon server (Internet Service Provider popularly running at Erode Region) over a period of three months at various time intervals. The experimental results suggest that address spoofing by attackers, which imply that such attacks will be invisible to indirect back scatter measurement techniques. Further, at the detailed packet-level characterization (e.g., attack destination ports), there are significant differences between anomaly and traditional intrusion attack measurements. Thus, there is tremendous value in moving towards direct observations to better understand recent intrusion attacks. Traffic Anomaly intrusion measurements additionally provide information inaccessible to traditional network intrusion measurements, enabling us to better understand how to defend against attacks.

Index Terms—Traffic Anomaly, Intrusion Detection,Server Intruders, Traffic Attack and Net Con


Cite: M.Thangavel, Dr. P.Thangaraj and K.Saravanan, " Defend against Anomaly Intrusion Detection using SWT Mechanism," International Journal of Innovation, Management and Technology vol. 1, no. 2, pp. 209-213, 2010.

Copyright © 2008-2015. International Journal of Innovation, Management and Technology. All rights reserved.
E-mail: ijimt@ejournal.net