首页> 外文会议>Asia-Pacific Conference on Communications >HTTP-sCAN: Detecting HTTP-flooding attaCk by modeling multi-features of web browsing behavior from noisy dataset
【24h】

HTTP-sCAN: Detecting HTTP-flooding attaCk by modeling multi-features of web browsing behavior from noisy dataset

机译:HTTP-sCAN:通过对嘈杂的数据集中的Web浏览行为的多种功能建模,来检测HTTP泛洪攻击

获取原文

摘要

HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests. Recent research tends to detect the attacks with the anomaly-based approaches, which detect the HTTP-flooding by modeling the behavior of normal web users. However, most of the existing anomaly-based detection approaches usually cannot filter the web crawling traces of the unknown search bots mixed in the normal web browsing logs. These web-crawling traces can bias the detection model in the training phase, thus further influencing the performance of the anomaly-based detection schemes. This paper proposes a novel anomaly-based HTTP-flooding detection scheme (HTTP-sCAN), which can eliminate the influence of the web-crawling traces with the cluster algorithm. The simulation results show that HTTP-sCAN is immune to the interferences of unknown search sessions, and can detect all HTTP-flooding attacks.
机译:HTTP泛洪攻击通过发送大量HTTP Get请求来禁用受害Web服务器。最近的研究倾向于使用基于异常的方法来检测攻击,该方法通过对正常Web用户的行为进行建模来检测HTTP泛滥。但是,大多数现有的基于异常的检测方法通常无法过滤混合在普通Web浏览日志中的未知搜索引擎的Web爬行轨迹。这些在网上爬行的痕迹可能会使训练阶段的检测模型产生偏差,从而进一步影响基于异常的检测方案的性能。本文提出了一种新的基于异常的HTTP泛滥检测方案(HTTP-sCAN),该算法可以利用聚类算法消除网络爬行轨迹的影响。仿真结果表明,HTTP-sCAN不受未知搜索会话的干扰,并且可以检测到所有HTTP泛洪攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号