2019
DOI: 10.1155/2019/1283472
|View full text |Cite
|
Sign up to set email alerts
|

Review of Recent Detection Methods for HTTP DDoS Attack

Abstract: With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures. Web servers that run on Hypertext Transfer Protocol (HTTP) are exposed to denial-of-service (DoS) attacks. A sophisticated version of this attack known as distributed denial of service (DDOS) is among the most dangerous Internet attacks, with the ability to overwhelm a web server, thereby slowing it down and potentially taki… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
41
0
4

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 78 publications
(45 citation statements)
references
References 43 publications
0
41
0
4
Order By: Relevance
“…On the other hand, the HTTP POST processes input data through Forms GUI interface that requires more computation from the server. Therefore, the HTTP POST-DDoS attacks are more dangerous than the GET-DDoS attacks [28]. • XML-based DoS attacks: the majority of information technology workers and specialists in the field of cloud computing agree that security is the main concern for SOA (service-oriented architecture) and XML messages.…”
Section: Application Layer-based Attacksmentioning
confidence: 99%
“…On the other hand, the HTTP POST processes input data through Forms GUI interface that requires more computation from the server. Therefore, the HTTP POST-DDoS attacks are more dangerous than the GET-DDoS attacks [28]. • XML-based DoS attacks: the majority of information technology workers and specialists in the field of cloud computing agree that security is the main concern for SOA (service-oriented architecture) and XML messages.…”
Section: Application Layer-based Attacksmentioning
confidence: 99%
“…Jaafar et al 11 presented a new detection mechanism for APDDoS attack detection based on different criteria such as attach strategy, performance metrics, and data corpus. Zeebaree et al 15 conducted a comprehensive study on the APDDoS attack detection mechanism based on approaches and data.…”
Section: Research Findings Current Issues and Comparison With Othermentioning
confidence: 99%
“…This complexity has caused an extra challenge to the security of a web server. A few numbers of review papers in the context of APDDoS attack and detection have been presented before 11–15 . This review paper is different from the existing papers in several aspects: (1) APDDoS attack detection mechanisms are categorized based on approaches and methods where each category has its peculiar advantages and disadvantages.…”
Section: Introductionmentioning
confidence: 99%
“…Jafaar, et al, viewed 12 recent detection of DDoS attack at the application layer published between January 2014 and December 2018 [15]. Alomari, et al, present a comprehensive study to show the danger of Botnet-based DDoS attacks on application layer, especially on the web server and the increased incidents of such attacks that has evidently increased recently [16].…”
Section: Introductionmentioning
confidence: 99%