2016
DOI: 10.1002/sec.1611
|View full text |Cite
|
Sign up to set email alerts
|

HADM: detection of HTTP GET flooding attacks by using Analytical hierarchical process and Dempster–Shafer theory with MapReduce

Abstract: The exponential growth in Internet usage causes cyber attack incidents. Among the various kinds of attacks, HTTP GET flooding attack is one of the major threats to the Internet services, as it depletes the resources and services in the application layer. It is difficult to distinguish between the legitimate traffic and malicious traffic from log file traces because the request patterns of attacks are similar to legitimate clients. The various techniques used for the detection of HTTP GET flooding attack are pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 28 publications
0
13
0
Order By: Relevance
“…To validate the obtained results, the proposed approach is compared with the state-of-the-art HTTP DDoS detection methods given in [14][15][16][17][18]. For this purpose we used 60% of the dataset for training and 40% for testing as it is the commonly datasets splitting configuration used in the literature.…”
Section: Validation Of the Obtained Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…To validate the obtained results, the proposed approach is compared with the state-of-the-art HTTP DDoS detection methods given in [14][15][16][17][18]. For this purpose we used 60% of the dataset for training and 40% for testing as it is the commonly datasets splitting configuration used in the literature.…”
Section: Validation Of the Obtained Resultsmentioning
confidence: 99%
“…The performances of the entire proposed approach are assessed and compared with the performances of different classifiers tested directly on the dataset without the time sliding window entropy estimation algorithm. Furthermore, the obtained results of the proposed system are compared with the state-of-the-art HTTP DDoS detection methods given in [14][15][16][17][18].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…e continuity of such requests at a higher rate will collapse a web server as it is unable to process a valid HTTP GET request. Beitollahi and Deconinck [24] and Sree and Bhanu [25] mentioned that an HTTP GET flood attack can stress bandwidth and outbound traffic, memory, CPU cycles, and input and output devices.…”
Section: Web Server Architecturementioning
confidence: 99%