2021
DOI: 10.32890/jict2021.20.3.1
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks

Abstract: Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. Researchers have been able to develop several techniques to curb volumetric DDoS which overwhelms the target with a large number of request packets. However, compared to slow DDoS, limited number of research has been executed on mitigating slow DDoS. Attackers have resorted to slow DDoS because it mimic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 49 publications
0
3
0
Order By: Relevance
“…ML algorithms such as SVM, NB, artificial neural network (ANN), and KNN are used along with feature selection methods based on thresholds. To identify attacks, Studies [20], [21] used Chi-square test and information gain feature selection mechanisms, as well as NB, SVM, C4.5, K-NN, K-means, fuzzy C-means, and a number of other models. A system that extracts only important attributes from network traffic in a computer network is proposed in [22].…”
Section: Literature Surveymentioning
confidence: 99%
“…ML algorithms such as SVM, NB, artificial neural network (ANN), and KNN are used along with feature selection methods based on thresholds. To identify attacks, Studies [20], [21] used Chi-square test and information gain feature selection mechanisms, as well as NB, SVM, C4.5, K-NN, K-means, fuzzy C-means, and a number of other models. A system that extracts only important attributes from network traffic in a computer network is proposed in [22].…”
Section: Literature Surveymentioning
confidence: 99%
“…There are many ML techniques and algorithm classifier and method has been applied to increase DDoS attack detection. Akanji [12] uses Genetic algorithm and SVM and NetFlow dataset to detect a slow HTTP DDoS attack. Awan [13] use Random Forest, MLP and Scikit with SparkML dataset to get the DDoS attack detection in real-time.…”
Section: Related Work On ML Techniquesmentioning
confidence: 99%
“…Its ability to transmit data or information across platforms is due to its utilization of an environment distinct from other apps. The hypertext transfer protocol (HTTP) protocol is used by multi-platform applications because it facilitates multi-platform data interchange, such as web apps that can be accessed from all current devices [2]. Web application developers can use the API (Application Programming Interface) to connect the two applications using HTTP methods like get, post, put, and delete.…”
Section: Introductionmentioning
confidence: 99%