2018
DOI: 10.1016/j.cose.2017.09.009
|View full text |Cite
|
Sign up to set email alerts
|

Slow rate denial of service attacks against HTTP/2 and detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
48
0
2

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 64 publications
(50 citation statements)
references
References 12 publications
0
48
0
2
Order By: Relevance
“…Ideally, the cost of the defense system should be less than the losses occurred due to the EDoS attack. The total cost is calculated using Equation (14) in three situations: (a) non-attack, (b) when defense system is inactive (attack), and (c) when defense system is active (attack). The total associated cost is based on the utilization of computing, memory, storage, and network resources.…”
Section: Cost Estimationmentioning
confidence: 99%
See 1 more Smart Citation
“…Ideally, the cost of the defense system should be less than the losses occurred due to the EDoS attack. The total cost is calculated using Equation (14) in three situations: (a) non-attack, (b) when defense system is inactive (attack), and (c) when defense system is active (attack). The total associated cost is based on the utilization of computing, memory, storage, and network resources.…”
Section: Cost Estimationmentioning
confidence: 99%
“…So far, many variants of sophisticated attacks have been introduced, namely, Shrew attack, 11,12 Reduction-of-Quality (RoQ) attack, 13 Low Rate DDoS Attack against Application Server (LoRDAS), 14,15 and EDoS attack. [16][17][18] These attacks have slightly less traffic volume than the detection threshold.…”
mentioning
confidence: 99%
“…These three categories are generated using specific vulnerabilities in POST and GET request methods. Although these attacks were created first to target vulnerabilities of HTTP/1.1, they are still effective on the updated HTTP/2 [30]. A detailed categorization of slow HTTP DDoS attacks can be found in [31].…”
Section: Http Ddos Attacksmentioning
confidence: 99%
“…Figure 1 [9] show the transfer of frames which are usually done during the normal working of HTTP/2 protocol.…”
Section: Http/2 Protocol Overviewmentioning
confidence: 99%
“…• 1 st Payload from Client to Server: Once the TCP connection is established after the 3-way handshake, client will send Connection Preface, SETTINGS frame and WINDOW UPDATE frame on a stream with identification number 0 while the HEADERS frame is sent on another stream with identification number 1. Both these streams are a part of the 1 st HTTP/2 payload [9]. • 2 nd Payload from Server to Client: As soon as the server receives the 1 st HTTP/2 payload, it confirms the SETTINGS frame by sending an empty SETTINGS frame on the stream 0 as an acknowledgement.…”
Section: Http/2 Protocol Overviewmentioning
confidence: 99%