2018
DOI: 10.1155/2018/1263123
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Cloud Computing services are often delivered through HTTP protocol. This facilitates access to services and reduces costs for both providers and end-users. However, this increases the vulnerabilities of the Cloud services face to HTTP DDoS attacks. HTTP request methods are often used to address web servers’ vulnerabilities and create multiple scenarios of HTTP DDoS attack such as Low and Slow or Flooding attacks. Existing HTTP DDoS detection systems are challenged by the big amounts of network traffic generate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(23 citation statements)
references
References 38 publications
0
22
0
1
Order By: Relevance
“…The critical analysis conducted in Section 8 extensively elaborate similarities and differences between each script. The usage of these attack scripts are publicly available, and have been mentioned and employed broadly by many earlier studies [ 2 , 35 , 36 , 39 , 40 , 42 , 43 , 44 ]. Although DDoS as services available as noted by Hameed and Ali [ 45 ], the usage of attack scripts to be executed in local area network is preferable as DDoS as services require transmission of attack traffic across the network which increases the possibility of the attack traffic to be detected and blocked by many intermediate networks managed by the internet service provider (ISP).…”
Section: Methodsmentioning
confidence: 99%
“…The critical analysis conducted in Section 8 extensively elaborate similarities and differences between each script. The usage of these attack scripts are publicly available, and have been mentioned and employed broadly by many earlier studies [ 2 , 35 , 36 , 39 , 40 , 42 , 43 , 44 ]. Although DDoS as services available as noted by Hameed and Ali [ 45 ], the usage of attack scripts to be executed in local area network is preferable as DDoS as services require transmission of attack traffic across the network which increases the possibility of the attack traffic to be detected and blocked by many intermediate networks managed by the internet service provider (ISP).…”
Section: Methodsmentioning
confidence: 99%
“…DDoS attack detection and mitigation scheme based on information-theoretic entropy and random forest (RF) is proposed in [14]. Simply, the proposed attack detection is based on setting a threshold that is calculated through traffic entropy.…”
Section: A Thresholding Approachmentioning
confidence: 99%
“…False-Positive Rate (FPR), also called specificity, is the ratio of normal observations to the total number of normal observations misclassified as attacks. It can be calculated using (14) as follows:…”
Section: Letmentioning
confidence: 99%
“…Botnets and instruction attacks are packaged with more sophisticated techniques to camouflage themselves within a network, thereby emulating network traffic generated by benign applications, using strong encryption schemes through the HTTPS protocol [2] and unusual responses between C and C servers that are further accentuated with the constant injection of random and noisy network packets. Beside this, improper configurations in various networks devices can also lead to a potential malware infection [3].…”
Section: Introductionmentioning
confidence: 99%