2012
DOI: 10.1007/978-3-642-35416-8_19
|View full text |Cite
|
Sign up to set email alerts
|

AIGG Threshold Based HTTP GET Flooding Attack Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…When the content is received, the user reads the content of the web page. After a time interval the user requests another web page based on links in the first page [35]. This time interval, called Δ , is the time gap between the end of receiving the server' response and the start of the next request in the same stream.…”
Section: Slow Header Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…When the content is received, the user reads the content of the web page. After a time interval the user requests another web page based on links in the first page [35]. This time interval, called Δ , is the time gap between the end of receiving the server' response and the start of the next request in the same stream.…”
Section: Slow Header Attackmentioning
confidence: 99%
“…This enables the attacker to deny connection requests of legitimate users. Therefore, this attack type is able to cause a DoS by a small quantity of packets and in a short period of time [5,35,37]. This attack is hard to detect and mitigate because it implies that the bandwidth consumption and the Δ lie in normal ranges but generates the attack continuously and repeatedly.…”
Section: Slow Header Attackmentioning
confidence: 99%
“…Impenetrable prickles in direct HTTP traffic [2], [13] at a particular endpoint in cloud may be an indication of slow flooding DDOS attack especially when there is huge bounce rate and exit rate at the same time. This may be an indication of victimization of a particular cloud endpoint by distributed unknown sources which resemble DDOS characteristics due to its flooding [12], [18] nature. Detection of such scenario is a problem to be solved in this research work.…”
Section: Problem Statementmentioning
confidence: 99%
“…The attack scenarios describe the ways in which an attacker makes use of a vulnerability to obtain the credentials . The information about the credentials are reflected in the access log file on an Apache server.…”
Section: Experimental Analysismentioning
confidence: 99%