2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing 2007
DOI: 10.1109/pacrim.2007.4313218
|View full text |Cite
|
Sign up to set email alerts
|

Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 71 publications
(39 citation statements)
references
References 3 publications
0
37
0
Order By: Relevance
“…We use the apachetop command on the server side to measure HTTP requests. Table II shows the efficiency of the method using XMLHttpRequest, our proposed Browser-based DDoS attacks without JavaScript and the F5attack [15] in the same environment.…”
Section: A Experiments Environmentmentioning
confidence: 99%
“…We use the apachetop command on the server side to measure HTTP requests. Table II shows the efficiency of the method using XMLHttpRequest, our proposed Browser-based DDoS attacks without JavaScript and the F5attack [15] in the same environment.…”
Section: A Experiments Environmentmentioning
confidence: 99%
“…DDoS attack detection based on the browsing order of webpages had been proposed [15]. The authors used correlation with time of browsing to the size of the webpage information for classifying the attack from that of the normal profile.…”
Section: Attack Scenariomentioning
confidence: 99%
“…The data sets in our check leverage IDS Snort 2.9 [20]. To generate an acceptable alert set, we used IDS Snort 2.9 in our experiments, which has the flexibility of providing alerts in a flat file [9].…”
Section: Accomplishment Experimentsmentioning
confidence: 99%