4.2 Article

Behavior-based detection of application layer distributed denial of service attacks during flash events

Publisher

Tubitak Scientific & Technological Research Council Turkey
DOI: 10.3906/elk-1308-188

Keywords

DDoS; flash crowd; flow similarity; security

Ask authors/readers for more resources

Distributed denial of service (DDoS) attacks are ever threatening to the developers and users of the Internet. DDoS attacks targeted at the application layer are especially difficult to be detected since they mimic the legitimate users' requests. The situation becomes more serious when they occur during flash events. A more sophisticated algorithm is required to detect such attacks during a flash crowd. A few existing works make use of flow similarity for differentiating flash crowds and DDoS, but flow characteristics alone cannot be used for effective detection. In this paper, we propose a novel mechanism for discriminating DDoS and flash crowds based on the combination of the parameters reflecting their behavioral differences. Flow similarity, client legitimacy, and web page requested are identified as the principal parameters and are used together for effective discrimination. The proposed mechanism is implemented on resilient proxies in order to protect the server from direct flooding and to improve the overall performance. The real datasets are used for simulation, and the results are presented to evaluate the performance of the proposed system. The results show that the proposed mechanism does effective detection with fewer false positives and false negatives.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Hardware & Architecture

Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multiserver Environment

Saraswathi Shunmuganathan, Renuka Devi Saravanan, Yogesh Palanichamy

CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE (2015)

Proceedings Paper Computer Science, Hardware & Architecture

An Effective Approach to Counter Application Layer DDoS Attacks

S. Renuka Devi, P. Yogesh

2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT) (2012)

No Data Available