Detection of Application Layer Distributed Denial of Service

被引:0
|
作者
Ye, Chengxu [1 ]
Zheng, Kesong [2 ]
机构
[1] Qinghai Normal Univ, Sch Comp, Xi Ning, Peoples R China
[2] Sun Yat Sen Univ, Sch Informat Technol & Sci, Guangzhou, Guangdong, Peoples R China
关键词
Application layer DDoS; Zipf; Correlation analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the previous literatures, many methods were designed to defend agaist IP or TCP layers distributed denial of serveice attacks instead of the application layer. In this paper, we introduce a simple but effetive scheme to detect application layer based ddos attacks. A http request transition matrix is proposed to describe users browsing behavior. We assume normal human user will choose intersting pages and objects. And that forms a pattern - transition probabitlity from one page to another. But a bot can not know what are the popular pages for most people, it will randomly send requests to web server for one scenario so that its request sequence has a very small transition probability, i.e. the sequence is less correlative. At last, simulation experiments are conducted with dataset which shows the scheme is effective.
引用
收藏
页码:310 / 314
页数:5
相关论文
共 50 条
  • [1] New Features of User's Behavior to Distributed Denial of Service Attacks Detection in Application Layer
    Bravo, Silvia
    Mauricio, David
    [J]. INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (12) : 164 - 178
  • [2] The Distributed Denial of Service Attacks (DDoS) Prevention Mechanisms on Application Layer
    Bhosale, Karuna S.
    Nenova, Maria
    Iliev, Georgi
    [J]. 2017 13TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SYSTEMS AND SERVICES IN TELECOMMUNICATIONS (TELSIKS), 2017, : 136 - 139
  • [3] Behavior-based detection of application layer distributed denial of service attacks during flash events
    Saravanan, Renukadevi
    Shanmuganathan, Saraswathi
    Palanichamy, Yogesh
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2016, 24 (02) : 510 - 523
  • [4] A Survey of Defense Mechanisms Against Application Layer Distributed Denial of Service Attacks
    Wang, Yadong
    Liu, Lianzhong
    Sun, Bo
    Li, Yingbo
    [J]. PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 1034 - 1037
  • [5] A detection design for distributed denial of service attack
    Fujita, N
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS DEVELOPMENT I, 2002, : 78 - 82
  • [6] Distributed denial-of-service and intrusion detection
    Zhou, Xiaobo
    Xu, Cheng-Zhong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (03) : 819 - 822
  • [7] Distributed denial of service attacks and detection mechanisms
    Rafsanjani, Marjan Kuchaki
    Kazeminejad, Neda
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2014, 14 (06) : 329 - 345
  • [8] Mitigating application layer distributed denial of service attacks via effective trust management
    Department of Computer Science, National University of Defense Technology, China
    不详
    不详
    [J]. IET Commun., 16 (1952-1962):
  • [9] Mitigating application layer distributed denial of service attacks via effective trust management
    Yu, J.
    Fang, C.
    Lu, L.
    Li, Z.
    [J]. IET COMMUNICATIONS, 2010, 4 (16) : 1952 - 1962
  • [10] Distributed Detection and Response for the Mitigation of Distributed Denial of Service Attacks
    Grant, D. C.
    [J]. 2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 495 - 497