Detection of HTTP flooding attacks in multiple scenarios

作者: Debasish Das , Utpal Sharma , D. K. Bhattacharyya

DOI: 10.1145/1947940.1948047

关键词: Denial-of-service attackFlash crowdApplication layerFlooding attackFlooding (computer networking)Computer securityComputer science

摘要: HTTP GET flooding attack is considered to be one of the most successful attacks Application Layer Denial Service (App-DoS). Detection such difficult due its non-intrusive nature. This paper presents an effective method for detection App-DoS three different scenarios. The proposed was tested over real-life data-sets, i.e. KDD99, LBNL and our own data-set, has been found perform satisfactorily.

参考文章(9)
Yi Xie, Shun-Zheng Yu, Detecting Shrew HTTP Flood Attacks for Flash Crowds international conference on conceptual structures. pp. 640- 647 ,(2007) , 10.1007/978-3-540-72584-8_85
Juan M. Estévez-Tapiador, Pedro Garcı́a-Teodoro, Jesús E. Dı́az-Verdejo, Measuring normality in HTTP traffic for anomaly-based intrusion detection Computer Networks. ,vol. 45, pp. 175- 193 ,(2004) , 10.1016/J.COMNET.2003.12.016
Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu, Mitigating application-level denial of service attacks on Web servers ACM Transactions on the Web. ,vol. 2, pp. 1- 49 ,(2008) , 10.1145/1377488.1377489
Dina Katabi, Srikanth Kandula, Matthias Jacob, Arthur Berger, Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds networked systems design and implementation. pp. 287- 300 ,(2005) , 10.5555/1251203.1251224
G. Mori, J. Malik, Recognizing objects in adversarial clutter: breaking a visual CAPTCHA computer vision and pattern recognition. ,vol. 1, pp. 134- 141 ,(2003) , 10.1109/CVPR.2003.1211347
J.M. Estevez-Tapiador, P. Garcia-Teodoro, J.E. Diaz-Verdejo, Detection of Web-based attacks through Markovian protocol parsing international symposium on computers and communications. pp. 457- 462 ,(2005) , 10.1109/ISCC.2005.51
S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, E. Knightly, DDoS-shield: DDoS-resilient scheduling to counter application layer attacks IEEE ACM Transactions on Networking. ,vol. 17, pp. 26- 39 ,(2009) , 10.1109/TNET.2008.926503
Simon Byers, Aviel D. Rubin, David Kormann, Defending against an Internet-based attack on the physical world ACM Transactions on Internet Technology. ,vol. 4, pp. 239- 254 ,(2004) , 10.1145/1013202.1013203
Debasish Das, Utpal Sharma, D. K. Bhattacharyya, An intrusion detection mechanism based on feature based data clustering international conference on emerging technologies. pp. 172- 175 ,(2008) , 10.1109/ICET.2008.4777495