Analyse and Detect the IP Spoofing Attack in Web Log Files Using BPNN for Classification

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-42 Number-2
Year of Publication : 2016
Authors : Vedna Sharma, Monika Thakur
  10.14445/22312803/IJCTT-V42P120

MLA

Vedna Sharma, Monika Thakur  "Analyse and Detect the IP Spoofing Attack in Web Log Files Using BPNN for Classification". International Journal of Computer Trends and Technology (IJCTT) V42(2):117-123, December 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Web security has become the essential part for the security of user data on web server because in the commercial world speed and ease in the commercial transactions becomes a key-driver in the growth of rapid business. Client interaction with the web-sites generates a huge amount of web access data stored in the web access logs. This information can be used in e-commerce to conduct an evaluation of possessed web-site pages as one of the efforts to understand the need of user. In this proposal, we address the problem of IP spoofing attack and also present the foundation and algorithms of our proposed framework which utilizes Improved Genetic Algorithm (IGA) for the protection of web log files and BPNN to classify the data. The evaluation of our system, utilizing the log file testing dataset, shows a better ratio of detecting attacks and a low false positives ratio. The whole work is taken place in the MATLAB 2013a environment.

References
[1] Sivakumar, J. "A Review on Semantic-Based Web Mining and its Applications." (2013).
[2] Ranjan, Roop, Sameena Naaz, and Neeraj Kaushik. "Web Miner: A Tool for Discovery of Usage Patterns From Web Data." International Journal on Computer Science and Engineering 5, no. 5 (2013): 286.
[3] Herrouz, Abdelhakim, Chabane Khentout, and Mahieddine Djoudi. "Overview of web content mining tools." arXiv preprint arXiv:1307.1024 (2013).
[4] Jafari, Maryam, Shahram Jamali, and Farzad Soleymani Sabzchi. "Discovering usersaccess patterns for web usage mining from web log files." Journal of Advances in Computer Research 4, no. 3 (2013): 25-32.
[5] Asrodia, Pallavi, and Hemlata Patel. "Network traffic analysis using packet sniffer." International Journal of Engineering Research and Applications 2, no. 3 (2012): 854-856.
[6] Lu, Wei, and Issa Traore. "Detecting new forms of network intrusion using genetic programming." Computational Intelligence 20, no. 3 (2004): 475-494.
[7] Neog, Tridiv Jyoti, and Dusmanta Kumar Sut. "Complement of an extended Fuzzy set." Int. Jr. of Computer Application (0975-8887) 29, no. 3 (2011).
[8] Michailidis, Emmanuel, Sokratis K. Katsikas, and Efstratios Georgopoulos. "Intrusion detection using evolutionary neural networks." In Informatics, 2008. PCI'08. Panhellenic Conference on, pp. 8-12. IEEE, 2008.
[9] Kaur, Dilpreet, AP Sukhpreet Kaur, Fatehgarh Sahib Punjab. "User Future Request Prediction Using KFCM in Web Usage Mining." International Journal of Advanced Research in Computer and Communication Engineering 2, no. 8 (2013).
[10] Neog, Tridiv Jyoti, and Dusmanta Kumar Sut. "Complement of an extended Fuzzy set." Int. Jr. of Computer Application (0975-8887) 29, no. 3 (2011).
[11] Muzumdar, Ketki, Ravi Mante, and Prashant Chatur. "Neural Network Approach for Web Usage Mining." IJRTE, ISSN (2013): 2277-3878.
[12] Neog, Tridiv Jyoti, and Dusmanta Kumar Sut. "Complement of an extended Fuzzy set." Int. Jr. of Computer Application (0975-8887) 29, no. 3 (2011).
[13] Kindy, Diallo Abdoulaye, and Al-Sakib Khan Pathan. "A detailed survey on various aspects of sql injection in web applications: Vulnerabilities, innovative attacks, and remedies." arXiv preprint arXiv:1203.3324 (2012).

Keywords
Web Log Files, BPNN, IP Spoofing and IGA.