2017 IEEE International Conference on Information Reuse and Integration (IRI) 2017
DOI: 10.1109/iri.2017.44
|View full text |Cite
|
Sign up to set email alerts
|

User Behavior Anomaly Detection for Application Layer DDoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(11 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…Tripathi and Hubballi [33] proposed the use of chi-square test in order to detect slow rate denial of service attacks against HTTP/2 protocol. In [34], Najafabadi et al proposed a detection method for the application layer DDoS attacks that worked extracting instances of user behaviors requesting resources from HTTP web server logs and using Principal Component Analysis (PCA) in order to detect anomalous behavior instances. Zolotukhin and Kokkonen [35] focused on detection of application-layer DoS attacks that utilize encrypted protocols by applying an anomaly-detection-based approach to statistics extracted from network packets headers using the stacked autoencoder algorithm.…”
Section: Specific Attack Detection/preventionmentioning
confidence: 99%
“…Tripathi and Hubballi [33] proposed the use of chi-square test in order to detect slow rate denial of service attacks against HTTP/2 protocol. In [34], Najafabadi et al proposed a detection method for the application layer DDoS attacks that worked extracting instances of user behaviors requesting resources from HTTP web server logs and using Principal Component Analysis (PCA) in order to detect anomalous behavior instances. Zolotukhin and Kokkonen [35] focused on detection of application-layer DoS attacks that utilize encrypted protocols by applying an anomaly-detection-based approach to statistics extracted from network packets headers using the stacked autoencoder algorithm.…”
Section: Specific Attack Detection/preventionmentioning
confidence: 99%
“…By comparing the anomaly score with a threshold, the system detected the anomaly behavior. Najafabadi et al [12] proposed PCA subspace anomaly detection method for application layer DDoS attacks, where the web server log was analyzed such as client IP field, URL field, and time field. TargetVue [19] detected anomalous users via an unsupervised learning model and visualized the results by analyzing time-adaptive local outlier factor and communication features as user behavior.…”
Section: User Behavior Anomaly Detectionmentioning
confidence: 99%
“…Moreover, Legg et al [10] proposed a tree-structure profiling approach to assess the user and role-based profile by obtaining the consistent representation of features. Principle Component Analysis (PCA) also was used for detecting anomalous behavior instances [11,12]. However, these methods only focused on using user behavior information for identifying anomaly but ignored the concept drift of user behavior; That is, user behavior changes over time, and the detection model based on user behavior needs to be updated regularly.…”
Section: Introductionmentioning
confidence: 99%
“…More recently attention has been brought to solutions specific to cloud and software‐defined networks . An important part of the research has been focused on anomaly intrusion detection techniques . Anomaly‐based detection techniques build on the principle that the traffic distribution of a service will deviate from its normal pattern under an attack.…”
Section: Introductionmentioning
confidence: 99%