2015
DOI: 10.1504/ijics.2015.073028
|View full text |Cite
|
Sign up to set email alerts
|

Application-layer denial of service attacks: taxonomy and survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…The attacker machine was connected to the Internet and was responsible for sending the web server a small number of attack (Attack-1 to 5) requests at regular intervals. Moreover, the attacker terminated a connection 4 from which an attack request was sent as soon as 100 seconds progressed after the connection establishment. This was to ensure that such attack requests did not deplete the server's connection queue space.…”
Section: Detection Phasementioning
confidence: 99%
See 1 more Smart Citation
“…The attacker machine was connected to the Internet and was responsible for sending the web server a small number of attack (Attack-1 to 5) requests at regular intervals. Moreover, the attacker terminated a connection 4 from which an attack request was sent as soon as 100 seconds progressed after the connection establishment. This was to ensure that such attack requests did not deplete the server's connection queue space.…”
Section: Detection Phasementioning
confidence: 99%
“…A PPLICATION layer Denial-of-Service (DoS) attacks are a newer class of DoS attacks that exploit vulnerabilities present in the application layer protocols such as HTTP, NTP, DHCP [1], [2], [3]. These attacks target specific services (e.g., web, mail, file transfer) running on a victim computer with a relatively slighter impact on the network resources [4], [5]. One famous example of application layer DoS attacks is the Slow Rate DoS attack.…”
Section: Introductionmentioning
confidence: 99%
“…This kind of attack results in the inability of legitimate users to access services and is thus denoted as DoS (Denial of Service) attacks [3]. Consider the following attack situation: A hacker can send several service inquiries to the enterprise to register with organization or obtain connection to some enterprises legitimate service instances.…”
Section: A Overview Of Ddos Attackmentioning
confidence: 99%
“…The detection of HTTP based application layer DDoS attacks are implemented with flow feature in distributed environments for diversified traffics. The authors [22] mainly focused on the slow rate DDoS attacks with HTTP requests targeting server HTTP. The bots from the botnet establishes a connections or sessions with incomplete GET or POST methods of HTTP requests to launch the slow rate attacks.…”
Section: Review Of Flow Based Intrusion Detectionmentioning
confidence: 99%