DDoS attack detection mechanism in the application layer using user features

Silvia Bravo, D. Mauricio
{"title":"DDoS attack detection mechanism in the application layer using user features","authors":"Silvia Bravo, D. Mauricio","doi":"10.1109/INFOCT.2018.8356848","DOIUrl":null,"url":null,"abstract":"DDoS attacks are one of the most damaging computer aggressions of recent times. Attackers send large number of requests to saturate a victim machine and it stops providing its services to legitimate users. In general attacks are directed to the network layer and the application layer, the latter has been increasing due mainly to its easy execution and difficult detection. The present work proposes a low cost detection approach that uses the characteristics of the Web User for the detection of attacks. To do this, the features are extracted in real time using functions designed in PHP and JavaScript. They are evaluated by an order 1 classifier to differentiate a real user from a DDoS attack. A real user is identified by making requests interacting with the computer system, while DDoS attacks are requests sent by robots to overload the system with indiscriminate requests. The tests were executed on a computer system using requests from real users and attacks using the LOIC, OWASP and GoldenEye tools. The results show that the proposed method has a detection efficiency of 100%, and that the characteristics of the web user allow to differentiate between a real user and a robot.","PeriodicalId":376443,"journal":{"name":"2018 International Conference on Information and Computer Technologies (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information and Computer Technologies (ICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCT.2018.8356848","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

DDoS attacks are one of the most damaging computer aggressions of recent times. Attackers send large number of requests to saturate a victim machine and it stops providing its services to legitimate users. In general attacks are directed to the network layer and the application layer, the latter has been increasing due mainly to its easy execution and difficult detection. The present work proposes a low cost detection approach that uses the characteristics of the Web User for the detection of attacks. To do this, the features are extracted in real time using functions designed in PHP and JavaScript. They are evaluated by an order 1 classifier to differentiate a real user from a DDoS attack. A real user is identified by making requests interacting with the computer system, while DDoS attacks are requests sent by robots to overload the system with indiscriminate requests. The tests were executed on a computer system using requests from real users and attacks using the LOIC, OWASP and GoldenEye tools. The results show that the proposed method has a detection efficiency of 100%, and that the characteristics of the web user allow to differentiate between a real user and a robot.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DDoS攻击检测机制在应用层利用用户特性
DDoS攻击是近年来最具破坏性的计算机攻击之一。攻击者发送大量请求使受害机器饱和,并停止向合法用户提供服务。一般来说,攻击主要针对网络层和应用层,而应用层的攻击越来越多,主要是由于其易于执行和难以检测。本文提出了一种低成本的检测方法,该方法利用Web用户的特征来检测攻击。为此,使用PHP和JavaScript设计的函数实时提取特性。它们由1阶分类器进行评估,以区分真实用户和DDoS攻击。真正的用户是通过与计算机系统交互的请求来识别的,而DDoS攻击是机器人发送的请求,通过不加区分的请求使系统过载。测试在计算机系统上执行,使用真实用户的请求和使用LOIC、OWASP和GoldenEye工具的攻击。结果表明,该方法的检测效率为100%,并且可以根据网络用户的特征区分真实用户和机器人。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Modeling banking processes A taxonomy of IoT: Security and privacy threats DDoS attack detection mechanism in the application layer using user features Reinforcement learning for game personalization on edge devices Stylized line rendering for three-dimensional models
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1