DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 4 Issue 1 Date of Publication:   June 2015

A Detection System for Denial Of Service Attacks Using Triangle Area Map Based Multivariate Correlation Analysis

V. Balaji,V.Jeyabalaraja

Page(s):   42-45 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.004.001.010 Publisher:   Integrated Intelligent Research (IIR)


  1. V. Paxson,   "Bro: A System for Detecting Network Intruders in Real-Time   ,1999
    View Artical

  2. P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and E. Vzquez,   "Anomaly-Based Network Intrusion Detection: Techniques, Systems aand Challenges",   Computers and Security   ,Vol.28   ,2009
    View Artical

  3. K. Lee, J. Kim, K.H. Kwon, Y. Han, and S. Kim,   "DDoS Attack Detection Method Using Cluster Analysis",   Expert Systems with Applications   ,2008
    View Artical

  4. A. Tajbakhsh, M. Rahmati, and A. Mirzaei,   "Intrusion Detection Using Fuzzy Association Rules",   Applied Soft Computing   ,2009
    View Artical

  5. C. Yu, H. Kai, and K. Wei-Shinn,   "Collaborative Detection of DDoS Attacks over Multiple Network Domains",   IEEE Trans. Parallel and Distributed Systems   ,Vol.18   ,2007
    View Artical

  6. J. Yu, H. Lee, M.-S. Kim, and D. Park,   "Traffic Flooding Attack Detection with SNMP MIB Using SVM   ,2008
    View Artical

  7. Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu,   "Triangle- Area- Based Multivariate Correlation Analysis for Effective Denialof-Service Attack Detect",   Proc. IEEE 11th Int?l Conf. Trust, Security and Pr   ,2012
    View Artical

  8. G. Thatte, U. Mitra, and J. Heidemann,   "Parametric Methods for Anomaly Detection in Aggregate Traffic",   IEEE/ACM Trans. Networking   ,Vol.19   ,2011
    View Artical

  9. S. Jin, et al,   "Network Intrusion Detection in Covariance Feature Space   ,Vol.40   ,2007
    View Artical

  10. J. Cheng, et al.,   "KDD Cup 2001 report   ,2002
    View Artical

  11. M. Tavallaee, E. Bagheri, L. Wei, and A.A. Ghorbani,   "A Detailed Analysis of the KDD Cup 99 Data Set   ,2009
    View Artical

  12. A. Tajbakhsh, M. Rahmati, and A. Mirzaei,   "Intrusion Detection Using Fuzzy Association Rules",   Applied Soft Computing   ,2009
    View Artical

  13. J. Cheng, et al.,   "KDD Cup 2001 report   ,2002
    View Artical