Asian Journal of Computer Science and Information Technology http://innovativejournal.in/index.php/ajcsit ajcsit en-US <p><strong><span style="text-decoration: underline;">COPYRIGHT AGREEMENT AND AUTHORSHIP RESPONSIBILITY</span></strong></p><p><strong> </strong>All paper submissions must carry the following duly signed by all the authors:</p><p>“I certify that I have participated sufficiently in the conception and design of this work and the analysis of the data (wherever applicable), as well as the writing of the manuscript, to take public responsibility for it. I believe the manuscript represents valid work. I have reviewed the final version of the manuscript and approve it for publication. Neither has the manuscript nor one with substantially similar content under my authorship been published nor is being considered for publication elsewhere, except as described in an attachment. Furthermore I attest that I shall produce the data upon which the manuscript is based for examination by the editors or their assignees, if requested.”</p> ajcsiteditor2011@gmail.com (computer science and information technology) ajcsiteditor2011@gmail.com (santosh dutt) Thu, 21 Sep 2017 00:00:00 +0000 OJS 3.1.0.1 http://blogs.law.harvard.edu/tech/rss 60 Statistical Approach for Detecting Distributed Denial of Service Attacks http://innovativejournal.in/index.php/ajcsit/article/view/1302 <p>   Over the past decades, network security issues have been raised due to the rapid growth of internet. Security has been becomes an important challenge to secure the network from cyber-attacks. Various tools that are required for security purposes are firewalls, passwords, IDS for the detection of attacks and prevent it from sending out the harmful traffic to the traffic. This paper present statistical based intrusion detection technique based on chi square to detect DDoS attack by calculating the expected and observed frequencies. In this case traffic is containing in a dataset of certain interval. Traffic is contained from a backscatter dataset. This approach can effectively detect the DDoS attack.</p> Rajvirkaur Gauravdeep ##submission.copyrightStatement## http://innovativejournal.in/index.php/ajcsit/article/view/1302 Thu, 21 Sep 2017 00:00:00 +0000