2010 International Computer Symposium (ICS2010) 2010
DOI: 10.1109/compsym.2010.5685483
|View full text |Cite
|
Sign up to set email alerts
|

A detection scheme for flooding attack on application layer based on semantic concept

Abstract: With the development of the Internet, application programs on the web page become widespread. Information appearing on the web page has evolved from static presentation to dynamic presentation and even being interactive with the users. Some malicious users employ malicious browsing behaviors, such as flooding attack, to cause waste of resources and bandwidth of the host for the web page. Since the advent of cloud computing technology, flooding attack on the application layer no longer has the ability to cause … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Lin and Lee, et al [10], proposed a semantic based algorithm based on HTTP protocol and components of PHP dynamic pages. Mudhakar Srivatsa et al [11] introduced a client-transparent approach based on admission control and congestion control to protect Web server from application-layer DoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Lin and Lee, et al [10], proposed a semantic based algorithm based on HTTP protocol and components of PHP dynamic pages. Mudhakar Srivatsa et al [11] introduced a client-transparent approach based on admission control and congestion control to protect Web server from application-layer DoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The first type affects its computational capacity by consuming the system resources. The second type wastes the bandwidth by downloading large files from the web server repeatedly affecting its communication capability while the third type harms its security by using password guessing attacks and SQL Injections (L i n et al [28]). The flooding attacks against a static web page are generated either from botnet, computer virus or any other open Denial of Service tool (Y a t a g a i, I s o h a r a and S a s a s e [61]).…”
Section: Cloud Computing Securitymentioning
confidence: 99%