2015
DOI: 10.5120/ijca2015907209
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Approach and Mitigation Techniques on Application Layer DDoS Attack in Web Server

Abstract: Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the host base firewall. Filtering in application level can be computationally expensive and difficult to scale, while DDoS attacks still creating bogus positives that block legitimate users. In this paper, the authors show application layer Do… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 15 publications
0
3
0
2
Order By: Relevance
“…Denial of Service (DoS) atau Distributed Denial of Service (DDoS) merupakan serangan yang membanjiri server dengan mengirimkan permintaan yang sangat banyak sehingga menghabiskan sumber daya pada server tersebut sampai server tersebut tidak dapat menjalankan fungsi dan tugasnya dengan benar. Kemudian server yang tidak bisa menangani permintaan, maka akan mengalami penolakan layanan (denial of service) (Yeasir, Morshed and Fakrul, 2015).…”
Section: Denial Of Serviceunclassified
“…Denial of Service (DoS) atau Distributed Denial of Service (DDoS) merupakan serangan yang membanjiri server dengan mengirimkan permintaan yang sangat banyak sehingga menghabiskan sumber daya pada server tersebut sampai server tersebut tidak dapat menjalankan fungsi dan tugasnya dengan benar. Kemudian server yang tidak bisa menangani permintaan, maka akan mengalami penolakan layanan (denial of service) (Yeasir, Morshed and Fakrul, 2015).…”
Section: Denial Of Serviceunclassified
“…Measurement of the stress on the web server was employed by Yeasir et al (2015) to detect slow HTTP attacks. Once the attack was detected, a reverse proxy mechanism would handle all subsequent incoming traffic for the primary web server.…”
Section: ) Performance Model Detection Techniquesmentioning
confidence: 99%
“…However, with an increased number of attackers whose number of established connection was below the threshold, the ModSecurity mitigation mechanism was rendered ineffective since the attack could not be detected. Yeasir et al (2015) proposed handling requests on behalf of the client using a reverse proxy server that proved to be a good mitigation mechanism against slow header attacks. In their work, the reverse proxy cached the client request until it was complete before handing the completed request off to the web server.…”
Section: Sdn-based Attack Mitigation Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…DDoS deflate dan mod_evasive telah diuji untuk mitigasi serangan terhadap koneksi http, namun masih perlu dilakukan pengujian terhadap beberapa jenis serangan http menggunakan DDoS deflate dan mod_evasive [3]. Mod_evasive dapat bekerja pada sistem operasi windows dan linux dan mampu melakukan pencegahan serangan DoS berdasarkan parameter tertentu [4].…”
Section: Pendahuluanunclassified