Slowloris Attack Detection Using Adaptive Timeout-Based Approach

被引:1
|
作者
Talukdar, Kangkan [1 ]
Boro, Debojit [2 ]
机构
[1] Numaligarh Refinery Ltd, Numaligarh, Assam, India
[2] Tezpur Univ, Dept Comp Sci & Engn, Tezpur, Assam, India
关键词
Adaptive Timeout; DDoS Attack; Flooding attack; HTTP Protocol; Slowloris Attack; INTRUSION DETECTION; SYSTEM; SNORT;
D O I
10.22042/isecure.2023.392462.938
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks have become a critical threat to the Web with the increase in web-based transactions and application services offered by the Internet. With the vast resources and techniques readily available to the attackers, countering them has become more challenging. They are usually carried out at the network layer. Unlike traditional network-layer attacks, application-layer DDoS attacks can be more effective. It utilizes legitimate HTTP requests to inundate victim resources that are undetectable. Many methods exist in the literature to protect systems from IP and TCP layer DDoS attacks that do not work when encountering application-layer DDoS attacks. Most network-layer DDoS attacks are flooding attacks, but application-layer DDoS attacks can be flooding or protocol-specific vulnerability attacks. Various protocol-specific vulnerability attacks cannot be detected by traditional detection methods as they are designed to detect flooding attacks. One such attack is the slowloris attack. It targets web servers by exploiting an HTTP protocol vulnerability. In this paper, we propose a slowloris attack detection based on an adaptive timeout-based approach that contains two modules: a suspect determination module and an attacker verification module. The determination module determines suspects and sends them to the verification module, which verifies a suspect as an attacker. We have designed a detection algorithm that detects an attacker's IP address before it consumes all the resources. The experimental results substantiate its efficacy with low false alarms and high detection accuracy.(c) 2024 ISC. All rights reserved.
引用
收藏
页码:79 / 92
页数:14
相关论文
共 50 条
  • [1] Analysis of timeout-based adaptive wormhole routing
    Khonsari, A
    Sarbazi-Azad, H
    Ould-Khaoua, M
    [J]. NINTH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, PROCEEDINGS, 2001, : 275 - 282
  • [2] TCOT - A timeout-based mobile transaction commitment protocol
    Kumar, V
    Prabhu, N
    Dunham, MH
    Seydim, AY
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (10) : 1212 - 1218
  • [3] Timeout-based information forwarding protocol for wireless sensor networks
    Jeong, Wootae
    Nof, Shimon Y.
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2007, 3 (04): : 331 - 346
  • [4] Optimization of Timeout-based Power Management Policies for Network Interfaces
    Luiz, Saulo O. D.
    Perkusich, Angelo
    Cruz, Bruna M. J.
    Neves, Breno H. M.
    Araujo, Gabriela M. da S.
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2013, 59 (01) : 101 - 106
  • [5] Dynamic interference and timeout-based CAC scheme for multimedia cellular networks
    Bejaoui, T
    Vèque, V
    Tabbane, S
    [J]. VTC2005-SPRING: 2005 IEEE 61ST VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, PROCEEDINGS, 2005, : 2086 - 2091
  • [6] Statistical analysis of factors influencing the performance of the timeout-based testing model
    Kwak, C
    Yih, Y
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2003, 41 (05) : 1033 - 1044
  • [7] QoS of timeout-based self-tuned failure detectors in iSCSI
    Yang, Guang
    Zhou, JinLi
    Liu, Gang
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 768 - 773
  • [8] Design of timeout-based wireless microsensor network protocols: energy and latency considerations
    Jeong, Wootae
    Nof, Shimon Y.
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2009, 5 (03) : 142 - 152
  • [9] A timeout-based message ordering protocol for a lightweight software implementation of TMR systems
    Ezhilchelvan, PD
    Brasileiro, FV
    Speirs, NA
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2004, 15 (01) : 53 - 65
  • [10] Using Quadratic Discriminant Analysis by Intrusion Detection Systems for Port Scan and Slowloris Attack Classification
    Deolindo, Vinicius M.
    Dalmazo, Bruno L.
    da Silva, Marcus V. B.
    de Oliveira, Luiz R. B.
    Silva, Allan de B.
    Granville, Lisandro Zambenedetti
    Gaspary, Luciano P.
    Nobre, Jeferson Campos
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT III, 2021, 12951 : 188 - 200