2013
DOI: 10.1007/s12652-013-0196-5
|View full text |Cite
|
Sign up to set email alerts
|

ConnectionScore: a statistical technique to resist application-layer DDoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(23 citation statements)
references
References 23 publications
0
23
0
Order By: Relevance
“…e continuity of such requests at a higher rate will collapse a web server as it is unable to process a valid HTTP GET request. Beitollahi and Deconinck [24] and Sree and Bhanu [25] mentioned that an HTTP GET flood attack can stress bandwidth and outbound traffic, memory, CPU cycles, and input and output devices.…”
Section: Web Server Architecturementioning
confidence: 99%
“…e continuity of such requests at a higher rate will collapse a web server as it is unable to process a valid HTTP GET request. Beitollahi and Deconinck [24] and Sree and Bhanu [25] mentioned that an HTTP GET flood attack can stress bandwidth and outbound traffic, memory, CPU cycles, and input and output devices.…”
Section: Web Server Architecturementioning
confidence: 99%
“…This way, the trace information collected from the accesses made by legitimate clients and bots from the first machine is likely to portray a real-world scenario. We took 150 bots, which were assigned a pool of unique IP address, to generate the bot traffic [39], [40]. This set of IP address is further used to differentiate between legitimate and bot requests in the access logs during processing.…”
Section: B Designmentioning
confidence: 99%
“…For example, the work in [22] adopt Adaptive Selective Verification (ASV) to detect slow-requesting HTTP-DDoS. Similarly, the work in [23] proposed using statistical analysis to build connection scores based on several traffic attributes, including the browsing behavior (e.g., requested page type and popularity). However, similar methods rely on content inspection to detect HTTP-DDoS.…”
Section: Related Workmentioning
confidence: 99%