Detection of Application Layer Distributed Denial of Service

被引:0
|
作者
Ye, Chengxu [1 ]
Zheng, Kesong [2 ]
机构
[1] Qinghai Normal Univ, Sch Comp, Xi Ning, Peoples R China
[2] Sun Yat Sen Univ, Sch Informat Technol & Sci, Guangzhou, Guangdong, Peoples R China
关键词
Application layer DDoS; Zipf; Correlation analysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the previous literatures, many methods were designed to defend agaist IP or TCP layers distributed denial of serveice attacks instead of the application layer. In this paper, we introduce a simple but effetive scheme to detect application layer based ddos attacks. A http request transition matrix is proposed to describe users browsing behavior. We assume normal human user will choose intersting pages and objects. And that forms a pattern - transition probabitlity from one page to another. But a bot can not know what are the popular pages for most people, it will randomly send requests to web server for one scenario so that its request sequence has a very small transition probability, i.e. the sequence is less correlative. At last, simulation experiments are conducted with dataset which shows the scheme is effective.
引用
收藏
页码:310 / 314
页数:5
相关论文
共 50 条
  • [21] A Review on Detection Approaches for Distributed Denial of Service Attacks
    Chaudhari, Rutika S.
    Talmale, G. R.
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2019), 2019, : 323 - 327
  • [22] Denial of service and distributed denial of service - Today and tomorrow
    Meyer, L
    Penzhorn, WT
    [J]. 2004 IEEE AFRICON: 7TH AFRICON CONFERENCE IN AFRICA, VOLS 1 AND 2: TECHNOLOGY INNOVATION, 2004, : 959 - 964
  • [23] The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack
    Rikhotso, Vukosi
    Velempini, Mthulisi
    [J]. AD HOC NETWORKS AND TOOLS FOR IT, ADHOCNETS 2021, 2022, 428 : 63 - 71
  • [24] Distributed Denial of Service (DDoS) detection by traffic pattern analysis
    Theerasak Thapngam
    Shui Yu
    Wanlei Zhou
    S. Kami Makki
    [J]. Peer-to-Peer Networking and Applications, 2014, 7 : 346 - 358
  • [25] A novel mechanism for detection and prevention of Distributed Denial of Service attacks
    Lin Pingping
    Zhang Xiaosong
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 289 - 292
  • [26] Tensor based framework for Distributed Denial of Service attack detection
    Maranhao, Joao Paulo A.
    da Costa, Joao Paulo C. L.
    Javidi, Elnaz
    Borges de Andrade, Cesar A.
    de Sousa Jr, Rafael T.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 174
  • [27] THE SLOW HTTP DISTRIBUTED DENIAL OF SERVICE ATTACK DETECTION IN CLOUD
    Dhanapal, A.
    Nithyanandam, P.
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (02): : 285 - 297
  • [28] An integrated approach explaining the detection of distributed denial of service attacks
    Batchu, Raj Kumar
    Seetha, Hari
    [J]. COMPUTER NETWORKS, 2022, 216
  • [29] On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic
    Feng, Yebo
    Li, Jun
    Sisodia, Devkishen
    Reiher, Peter
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2211 - 2226
  • [30] Evaluation of Classification algorithms for Distributed Denial of Service Attack Detection
    Gohil, Maulik
    Kumar, Sathish
    [J]. 2020 IEEE THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE 2020), 2020, : 138 - 141