2019
DOI: 10.1109/access.2019.2950820
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices

Abstract: Application-layer distributed denial of service (AL-DDoS) attacks are becoming critical threats to websites because the stealth of AL-DDoS attacks makes many intrusion prevention systems ineffective. To detect AL-DDoS attacks aimed at websites, we propose a novel statistical model called the RM (rhythm matrix). Although the original features from the network layer are adopted, the access trajectory, including requested objects and corresponding dwell-time values, can be abstracted and accumulated into an RM. W… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 43 publications
0
4
0
Order By: Relevance
“…Dynamically selected algorithms from the framework classification algorithms are ready to detect different DDoS ways that use fussy logic [11]. Utility Layered Distribution Service Denial (UL-DDoS) Attacks and Al-DDoS attack's magic can make many intrusion prevention methods ineffective and pose a significant threat to websites [12].…”
Section: Related Workmentioning
confidence: 99%
“…Dynamically selected algorithms from the framework classification algorithms are ready to detect different DDoS ways that use fussy logic [11]. Utility Layered Distribution Service Denial (UL-DDoS) Attacks and Al-DDoS attack's magic can make many intrusion prevention methods ineffective and pose a significant threat to websites [12].…”
Section: Related Workmentioning
confidence: 99%
“…A Denial of Service (DDoS) attack is a malicious distributed attack on an online network that becomes disabled for users, and this DDoS attack will burden and paralyze server services [27][28][29][30]. The distribution of DDoS in a global attack will infiltrate various devices, which are often referred to as botnets.…”
Section: Distributed Denial Of Service (Ddos)mentioning
confidence: 99%
“…A statistical model called the RM (rhythm matrix) was proposed in [18] to detect application layer DDoS attack. The RM model can detect DDoS attacks according to the increase of the abnormality degree in the RM and distinguish flash crowds from application layer DDoS attacks.…”
Section: Related Workmentioning
confidence: 99%