Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services

作者: Erwin Adi , Zubair Baig , Philip Hingston

DOI: 10.1016/J.JNCA.2017.04.015

关键词: HTTP/2Web serverInternet accessPre-play attackAdversaryDenial-of-service attackComputer networkComputer securityComputer scienceTraffic analysisWeb service

摘要: A malicious attack that can prevent establishment of Internet connections to web servers is termed as a Denial Service (DoS) attack; volume and intensity which rapidly growing thanks the readily available tools ever-increasing network bandwidths. Contemporary are increasingly vulnerable such attacks. With emergence HTTP/2 successor HTTP/1.x, existing techniques for detecting DoS attacks will not be entirely effective. Though nearly 90% all contemporary yet have migrated HTTP/2, modelling detection essential impending kind from adversary class. This study presents model traffic directed towards servers. The research conducted also extends previous studies provided models against services, present novel stealthy variant disrupt routine covertly. analysis in this employed four machine learning techniques, namely Nave Bayes, Decision Tree, JRip Support Vector Machines, properties shown through having higher percentages False Alarms. Results obtained simulation show promise, arguments put forth on how future work extend proposed create further may cause severe service disruptions.

参考文章(36)
Qijun Gu, Peng Liu, Denial of Service Attacks Handbook of Computer Networks. pp. 454- 468 ,(2012) , 10.1002/9781118256107.CH29
Hamza Rahmani, Nabil Sahli, Farouk Kamoun, Distributed denial-of-service attack detection scheme-based joint-entropy Security and Communication Networks. ,vol. 5, pp. 1049- 1061 ,(2012) , 10.1002/SEC.392
Erwin Adi, Zubair Baig, Chiou Peng Lam, Philip Hingston, Low-Rate Denial-of-Service Attacks against HTTP/2 Services 2015 5th International Conference on IT Convergence and Security (ICITCS). pp. 1- 5 ,(2015) , 10.1109/ICITCS.2015.7292994
William W. Cohen, Fast Effective Rule Induction Machine Learning Proceedings 1995. pp. 115- 123 ,(1995) , 10.1016/B978-1-55860-377-6.50023-2
S. Bradner, Key words for use in RFCs to Indicate Requirement Levels RFC. ,vol. 2119, pp. 1- 3 ,(1997)
Mrutyunjaya Panda, Ajith Abraham, Manas Ranjan Patra, None, Hybrid intelligent systems for detecting network intrusions Security and Communication Networks. ,vol. 8, pp. 2741- 2749 ,(2015) , 10.1002/SEC.592
Shui Yu, Song Guo, Ivan Stojmenovic, Can we beat legitimate cyber behavior mimicking attacks from botnets international conference on computer communications. pp. 2851- 2855 ,(2012) , 10.1109/INFCOM.2012.6195714
Wei Zhou, Weijia Jia, Sheng Wen, Yang Xiang, Wanlei Zhou, None, Detection and defense of application-layer DDoS attacks in backbone web traffic Future Generation Computer Systems. ,vol. 38, pp. 36- 46 ,(2014) , 10.1016/J.FUTURE.2013.08.002
Jaeyeon Jung, Balachander Krishnamurthy, Michael Rabinovich, Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites the web conference. pp. 293- 304 ,(2002) , 10.1145/511446.511485
Mohammed A. Saleh, Azizah Abdul Manaf, A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks The Scientific World Journal. ,vol. 2015, pp. 238230- 238230 ,(2015) , 10.1155/2015/238230