2018 International Conference on Information and Computer Technologies (ICICT) 2018
DOI: 10.1109/infoct.2018.8356848
|View full text |Cite
|
Sign up to set email alerts
|

DDoS attack detection mechanism in the application layer using user features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The critical analysis conducted in Section 8 extensively elaborate similarities and differences between each script. The usage of these attack scripts are publicly available, and have been mentioned and employed broadly by many earlier studies [ 2 , 35 , 36 , 39 , 40 , 42 , 43 , 44 ]. Although DDoS as services available as noted by Hameed and Ali [ 45 ], the usage of attack scripts to be executed in local area network is preferable as DDoS as services require transmission of attack traffic across the network which increases the possibility of the attack traffic to be detected and blocked by many intermediate networks managed by the internet service provider (ISP).…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The critical analysis conducted in Section 8 extensively elaborate similarities and differences between each script. The usage of these attack scripts are publicly available, and have been mentioned and employed broadly by many earlier studies [ 2 , 35 , 36 , 39 , 40 , 42 , 43 , 44 ]. Although DDoS as services available as noted by Hameed and Ali [ 45 ], the usage of attack scripts to be executed in local area network is preferable as DDoS as services require transmission of attack traffic across the network which increases the possibility of the attack traffic to be detected and blocked by many intermediate networks managed by the internet service provider (ISP).…”
Section: Methodsmentioning
confidence: 99%
“…The request headers adopted by HTTP DDoS are categorized as session flooding and request flooding which are capable of mimicking a genuine user request [ 35 , 36 , 37 , 38 ]. Aside from that, the attack has the same syntax and is delivered via multiple HTTP requests in different HTTP formats [ 35 ].…”
Section: Http Ddos Request Headersmentioning
confidence: 99%
“…e purpose of the AL-DDoS attack is to make the applications on the server unable to provide normal services to legitimate users and deny their access [8]. Intrusion Detection System (IDS) is one of the most effective detection and defense mechanisms for DDoS attacks [9]. IDS is an application-type system that monitors suspicious events in the network, generates reports, and forwards them to administrators for action.…”
Section: Ddos Attack and Detectionmentioning
confidence: 99%