2015
DOI: 10.1002/sec.1236
|View full text |Cite
|
Sign up to set email alerts
|

Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching

Abstract: Distributed Denial of Service attack (DDoS) has been one of the greatest threats to network security for years. In recent years, DDoS attackers turn to application layer, which makes DDoS attack detection systems based on net layer and transport layer lose their performance. In this layer, Web service is the most vulnerable application. In this study, we analyze the differentiation between users behaviors, as we extract two feature sequences from Web logs to represent characteristics of user behavior, and then… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(26 citation statements)
references
References 15 publications
0
25
0
1
Order By: Relevance
“…Table 3. Comparison of proposed system with existing works Works DR (%) FPR (%) Attack strategy * Liao Q et al [42] 99.80 0.33 3 Yadav S et al [43] 98.99 1.27 2 Wang J et al [29] 88.95 5.10 2 Liao et al [30] 89.25 0.04 4 Xie Y et al [9] 90.00 1.00 1 Our work 94.45 0.97 5 *Based on the taxonomy proposed in our previous work…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 3. Comparison of proposed system with existing works Works DR (%) FPR (%) Attack strategy * Liao Q et al [42] 99.80 0.33 3 Yadav S et al [43] 98.99 1.27 2 Wang J et al [29] 88.95 5.10 2 Liao et al [30] 89.25 0.04 4 Xie Y et al [9] 90.00 1.00 1 Our work 94.45 0.97 5 *Based on the taxonomy proposed in our previous work…”
Section: Discussionmentioning
confidence: 99%
“…Liao et al [30] proposed machine learning-based detection technique that used a support vector machine to identify presence of any attacks. The rhythm-matching algorithm is applied to identify similar patterns.…”
Section: Related Workmentioning
confidence: 99%
“…Liao et al [34] proposed a detection technique based on user access frequencies, speci cally focusing on request time interval and frequency request to detect DDoS attacks at the application layer. e time interval refers to the present and the next HTTP GET requests.…”
Section: Recent Detection Methods For Http Ddos Attackmentioning
confidence: 99%
“…DDoS attacks can take several forms, with different levels of sophistication. While SYN flooding attacks remain one of the dominant types of attacks, application‐layer botnet‐based DDoS attacks are becoming the norm these days . In these attacks, bots are instructed to establish full TCP connections with the targeted system and to request some content from or perform some computationally intensive task at the server.…”
Section: Background and Related Workmentioning
confidence: 99%
“…While SYN flooding attacks remain one of the dominant types of attacks, 19 application-layer botnet-based DDoS attacks are becoming the norm these days. 20,21 In these attacks, bots are instructed to establish full TCP connections with the targeted system and to request some content from or perform some computationally intensive task at the server. Typically, thousands or millions of bots would target the victim server simultaneously, resulting in high overload that leaves no room to serve legitimate requests.…”
Section: Ddos and Flash Crowd Eventsmentioning
confidence: 99%