2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions) 2015
DOI: 10.1109/icrito.2015.7359289
|View full text |Cite
|
Sign up to set email alerts
|

Detection of application layer DDoS attack by modeling user behavior using logistic regression

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…False positive rates were compared with the Packet Threshold Algorithm-Support Vector Machine (PTA-SVM) model proposed by [18], Efficient Data Adapted Decision Tree (EDADT) proposed by [19], Lightweight detection algorithm proposed by [20], Modified K-means proposed by [21], and a logistic regression model proposed by [22]. The false positive rate for the proposed model was 0, outperforming the algorithms it was compared with, as shown in Figure 19.…”
Section: Test Results and Discussionmentioning
confidence: 99%
“…False positive rates were compared with the Packet Threshold Algorithm-Support Vector Machine (PTA-SVM) model proposed by [18], Efficient Data Adapted Decision Tree (EDADT) proposed by [19], Lightweight detection algorithm proposed by [20], Modified K-means proposed by [21], and a logistic regression model proposed by [22]. The false positive rate for the proposed model was 0, outperforming the algorithms it was compared with, as shown in Figure 19.…”
Section: Test Results and Discussionmentioning
confidence: 99%
“…They explained that a malware requires to establish connection to Command and Control (C&C) server which has shorter request message. Saleh and Abdul Manaf [ 32 ] combined non-HTTP features with “user-agent”, “accept” and “host” while Yadav and Selvakumar [ 33 ] also adopted non-HTTP features to be combined with request headers known as “User-Agent” and “Referrer” in providing solutions to detect HTTP DDoS attacks. Malicious request traffic has a specific pattern which can be recognized through detection.…”
Section: Http Manipulationmentioning
confidence: 99%
“…Critical inspection against researchers who employed more than one dataset showed that they also executed their experiments to obtain the dataset. Old datasets should be avoided as they contain obsolete and meaningless data [9], while retrieving real cutting-edge attack dataset is challenging as they are unavailable publicly [46].…”
Section: Datasetmentioning
confidence: 99%