共 3 条
HTTP-sCAN: detecting HTTP-flooding attaCk by modeling multi-feAtures of web browsing behavior from Noisy dataset
被引:0
|作者:
Wang, Jin
[1
,2
]
Zhang, Min
[1
]
Yang, Xiaolong
[1
]
Long, Keping
[1
]
Zhou, Chimin
[3
]
机构:
[1] Uni Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing, Peoples R China
[2] Chengdu Univ, Network Ctr, Chengdu 610106, Peoples R China
[3] Sichuan Radio & TV Univ, Ctr Informat Technol, Chengdu 610073, Peoples R China
基金:
中国国家自然科学基金;
关键词:
IP network;
DDoS;
Relative Entropy;
Cluster algorithm;
D O I:
暂无
中图分类号:
TN [电子技术、通信技术];
学科分类号:
0809 ;
摘要:
HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests. Recent research tends to detect the attacks with the anomaly-based approaches, which detect the HTTP-flooding by modeling the behavior of normal web users. However, most of the existing anomaly-based detection approaches usually cannot filter the web crawling traces of the unknown search bots mixed in the normal web browsing logs. These web-crawling traces can bias the detection model in the training phase, thus further influencing the performance of the anomaly-based detection schemes. This paper proposes a novel anomaly-based HTTP-flooding detection scheme (HTTP-sCAN), which can eliminate the influence of the web-crawling traces with the cluster algorithm. The simulation results show that HTTP-sCAN is immune to the interferences of unknown search sessions, and can detect all HTTP-flooding attacks.
引用
收藏
页码:677 / 682
页数:6
相关论文