3 research outputs found

    Towards applying FCM with DBSCAN for Detecting DDoS Attack in Cloud Infrastructure to Improve Data Transmission Rate

    Get PDF
    Cloud is a pay-to-use technology which can be used to offer IT resources instead of buying computer hardware. It is time saving and cheaper technology. This paper analyzes the DDoS attack on cloud infrastructure and can be detected by using FCM with DBSCAN hybrid algorithm that classifies the clusters of data packets and detects the outlier in that particular data packet. The experimental outcome shows that the enhanced hybrid approach has better results in detecting the DDoS attack. The DDoS attack targets the main host of the cloud infrastructure by sending unwanted packets. This attack is a major threat to the network security. The FCM with DBSCAN hybrid approach detects outliers and also assigns one specific data point in clusters to detect DDoS attack in cloud infrastructure. By using this hybrid approach the data can be grouped as clusters and the data beyond the noise level can also be detected. This algorithm helps in identifying the data that are vulnerable to DDoS attack. This detection helps in improving the data transmission rate

    Estimation of communication-delays through adaptive synchronization of chaos

    Full text link
    This paper deals with adaptive synchronization of chaos in the presence of time-varying communication-delays. We consider two bidirectionally coupled systems that seek to synchronize through a signal that each system sends to the other one and is transmitted with an unknown time-varying delay. We show that an appropriate adaptive strategy can be devised that is successful in dynamically identifying the time-varying delay and in synchronizing the two systems. The performance of our strategy with respect to the choice of the initial conditions and the presence of noise in the communication channels is tested by using numerical simulations. Another advantage of our approach is that in addition to estimating the communication-delay, the adaptive strategy could be used to simultaneously identify other parameters, such as e.g., the unknown time-varying amplitude of the received signal.Comment: Accepted for publication in Chaos, Solitons & Fractal
    corecore