2010
DOI: 10.1587/transcom.e93.b.1113
|View full text |Cite
|
Sign up to set email alerts
|

Group Testing Based Detection of Web Service DDoS Attackers

Abstract: SUMMARY The Distributed Denial of Service attack (DDoS) is one of the major threats to network security that exhausts network bandwidth and resources. Recently, an efficient approach Live Baiting was proposed for detecting the identities of DDoS attackers in web service using low state overhead without requiring either the models of legitimate requests nor anomalous behavior. However, Live Baiting has two limitations. First, the detection algorithm adopted in Live Baiting starts with a suspects list containing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…In the SYN flooding attack, the attacker send a high rate of half-open connection requests(SYN packets). These packets consume the server resources [35], [36], thus the services are denied which lead to failure of the server's main mission towards the legitimate users.…”
Section: B Ddos Flooding Attackmentioning
confidence: 99%
“…In the SYN flooding attack, the attacker send a high rate of half-open connection requests(SYN packets). These packets consume the server resources [35], [36], thus the services are denied which lead to failure of the server's main mission towards the legitimate users.…”
Section: B Ddos Flooding Attackmentioning
confidence: 99%
“…The DDoS attacks prevent legitimate users from using their service by exhausting network resources such as routers, links, and servers [5]. The DDoS attack starts when the attacker compromises relay hosts called masters, which in turn compromise attack machines called agents.…”
Section: Introductionmentioning
confidence: 99%
“…1. During attack time, the attacker sends a high rate of HTTP requests to the target server by using any possible request method to exhaust server resources (e.g., Sockets, CPU, memory, disk/database bandwidth, and I/O bandwidth) [5], [8]. Thus the server can not respond to any incoming legitimate requests.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…servers) through attacker or his slaves (agents). This huge number of requests exhausts the server resources and makes it unable to response to the incoming requests [6,7]. The available detection schemes for HTTP flooding attack in most cases depend on two techniques.…”
Section: Introductionmentioning
confidence: 99%