New Features of User's Behavior to Distributed Denial of Service Attacks Detection in Application Layer

被引:0
|
作者
Bravo, Silvia [1 ]
Mauricio, David [2 ]
机构
[1] Tech Univ Cotopaxi, Fac Engn Sci, Latacunga, Ecuador
[2] Natl Univ San Marcos, Lima, Peru
关键词
DDoS; user's behavior; application layer; attack detection;
D O I
10.3991/ijoe.v14i12.9439
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Distributed Denial of Service (DDoS) attacks are a threat to the security of red. In recent years, these attacks have been directed especially towards the application layer. This phenomenon is mainly due to the large number of existing tools for the generation of this type of attack. The highest detection rate achieved by a method in the application capacity is 98.5%. Therefore, the problem of detecting DDoS attacks persists. In this work an alternative of detection based on the dynamism of the web user is proposed. To do this, evaluate the user's characteristics, mouse functions and right click. For the evaluation, a data set of 11055 requests was used, from which the characteristics were extracted and entered into a classification algorithm. To that end, it can be applied once in Java for the classification of real users and DDoS attacks. The results showed that the evaluated characteristics achieved an efficiency of 100%. Therefore, it is concluded that these characteristics show the dynamism of the user and can be used in a detection method of DDoS attacks.
引用
收藏
页码:164 / 178
页数:15
相关论文
共 50 条
  • [21] Honeypots for distributed Denial of Service Attacks
    Weiler, N
    [J]. WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 109 - 114
  • [22] A Taxonomy of Distributed Denial of Service Attacks
    De Donno, Michele
    Giaretta, Alberto
    Dragoni, Nicola
    Spognardi, Angelo
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2017), 2017, : 100 - 107
  • [23] An Examination of Distributed Denial of Service Attacks
    Bartholemy, Alex
    Chen, Weifeng
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY (EIT), 2015, : 274 - 279
  • [24] Using transient behavior of TCP in mitigation of distributed denial of service attacks
    Kalantari, M
    Gallicchio, K
    Shayman, MA
    [J]. PROCEEDINGS OF THE 41ST IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-4, 2002, : 1422 - 1427
  • [25] Distributed Denial of Service Attacks Detection Using Support Vector Machine
    Ahmad, Iftikhar
    Abdullah, Azween B.
    Alghamdi, Abdullah S.
    Hussain, Muhammad
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (01): : 127 - 134
  • [26] A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks
    Lam, Ho-Yu
    Li, Chi-Pan
    Chanson, Samuel T.
    Yeung, Dit-Yan
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2165 - 2170
  • [27] DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning
    Asad, Muhammad
    Asim, Muhammad
    Javed, Talha
    Beg, Mirza O.
    Mujtaba, Hasan
    Abbas, Sohail
    [J]. COMPUTER JOURNAL, 2020, 63 (07): : 983 - 994
  • [28] Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach
    Samom, Premson Singh
    Taggu, Amar
    [J]. APPLIED SOFT COMPUTING AND COMMUNICATION NETWORKS, 2021, 187 : 75 - 87
  • [29] DeepDetect: Detection of distributed denial of service attacks using deep learning
    Asad, Muhammad
    Asim, Muhammad
    Javed, Talha
    Beg, Mirza O.
    Mujtaba, Hasan
    Abbas, Sohail
    [J]. Asim, Muhammad (muhammad.asim@nu.edu.pk), 1600, Oxford University Press (63): : 983 - 994
  • [30] Application of entropy formulas in detection of denial-of-service attacks
    Basicevic, Ilija
    Ocovaj, Stanislav
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (15)