DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 4 Issue 1 Date of Publication:   June 2015

A Detection System for Denial Of Service Attacks Using Triangle Area Map Based Multivariate Correlation Analysis

V. Balaji,V.Jeyabalaraja

Page(s):   42-45 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.004.001.010 Publisher:   Integrated Intelligent Research (IIR)

Modern Computing Systems such as Web servers, databases, cloud environmentetc, are vulnerable to attackers in the web. One of the most commonly known type of threats is Denial-of- Service (DoS) attacks causes heavy loses and damages to these systems. In this paper, we present detection system to analyze DoS attack that uses Multivariate Correlation Analysis (MCA) for determining network traffic characterization by analyzing the distinct correlation between network traffic features. Our MCA-based approach employs the mechanism of widely used detection method anomaly-based detection in attack identification. Thus making it quite easy to detect known as well as unknown attacks by learning patterns of legitimate network traffic. Furthermore a triangle area based approach is used along to enhance the process of MCA. The proposed system is effectively mapped and calculated using KDD Cup 99 Dataset.