2018
DOI: 10.3991/ijoe.v14i12.9439
|View full text |Cite
|
Sign up to set email alerts
|

New Features of User’s Behavior to Distributed Denial of Service Attacks Detection in Application Layer

Abstract: Distributed Denial of Service (DDoS) attacks are a threat to the security of red. In recent years, these attacks have been directed especially towards the application layer. This phenomenon is mainly due to the large number of existing tools for the generation of this type of attack. The highest detection rate achieved by a method in the application capacity is 98.5%. Therefore, the problem of detecting DDoS attacks persists. In this work an alternative of detection based on the dynamism of the web user is pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 43 publications
(30 reference statements)
0
1
0
Order By: Relevance
“…The 2019 Coronavirus pandemic transformed the cyber security ecosystem by creating a "New Normal" in the cyberwar [4]. Enterprise systems, educational institutions, and organizations of all sizes moved their workforce to work from home without the adequate security apparatus in place [5][6][7][8]. This enterprise cyber-threat landscape is a collection of threats within the ecosystem, with information on identified vulnerability assets, risks, adversaries, and observed trends [9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…The 2019 Coronavirus pandemic transformed the cyber security ecosystem by creating a "New Normal" in the cyberwar [4]. Enterprise systems, educational institutions, and organizations of all sizes moved their workforce to work from home without the adequate security apparatus in place [5][6][7][8]. This enterprise cyber-threat landscape is a collection of threats within the ecosystem, with information on identified vulnerability assets, risks, adversaries, and observed trends [9][10][11].…”
Section: Introductionmentioning
confidence: 99%