2016
DOI: 10.1007/s10994-016-5581-9
|View full text |Cite
|
Sign up to set email alerts
|

Learning to control a structured-prediction decoder for detection of HTTP-layer DDoS attackers

Abstract: We focus on the problem of detecting clients that attempt to exhaust server resources by flooding a service with protocol-compliant HTTP requests. Attacks are usually coordinated by an entity that controls many clients. Modeling the application as a structuredprediction problem allows the prediction model to jointly classify a multitude of clients based on their cohesion of otherwise inconspicuous features. Since the resulting output space is too vast to search exhaustively, we employ greedy search and techniq… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…PTrace controlled such attack sources from two aspects, packet filtering and malware tracing, to prevent the cloud from becoming a tool for DDOS attacks. Other studies such as [13] approach the problem of filtering by using a set of security services called filter trees. In the study, XML and HTTP based DDOS attacks are filtered out using five filters for detection and resolution.…”
Section: Related Workmentioning
confidence: 99%
“…PTrace controlled such attack sources from two aspects, packet filtering and malware tracing, to prevent the cloud from becoming a tool for DDOS attacks. Other studies such as [13] approach the problem of filtering by using a set of security services called filter trees. In the study, XML and HTTP based DDOS attacks are filtered out using five filters for detection and resolution.…”
Section: Related Workmentioning
confidence: 99%
“…Trace controlled such attack sources from two aspects, packet filtering and malware tracing, to prevent the cloud from becoming a tool for DDoS attacks. Other studies such as [13] approach the problem of filtering by using a set of security services called filter trees. In the study, XML and HTTP based DDOS attacks are filtered out using five filters for detection and resolution.…”
Section: Related Workmentioning
confidence: 99%
“…Table 1 shows the characteristics of the data flow of each client, the characteristics of IP packets in a time interval and the behavior patterns of each user. They are extracted at intervals of time when a client connects to a domain [51]. These characteristics are of the statistical type and record the client's access to system resources and the frequency with which each client requests a resource in the domain.…”
Section: Literature Review Of Featuresmentioning
confidence: 99%
“…[56] Users browsing process We see average and total length of such browsing sequences. [51] Variance of the entropy Variance of the entropy value, since the value of the variance provides the variations in the entropy value. [58] Web page requested In the case of an application level DDoS attack, the attack packets are in the form of web page requests.…”
Section: Http Get Request Countmentioning
confidence: 99%