首页> 外文会议>International Conference on Information Reuse and Integration for Data Science >Detection Methods of Slow Read DoS Using Full Packet Capture Data
【24h】

Detection Methods of Slow Read DoS Using Full Packet Capture Data

机译:使用完整数据包捕获数据的慢读DoS检测方法

获取原文

摘要

Detecting Denial of Service (DoS) attacks on web servers has become extremely popular with cybercriminals and organized crime groups. A successful DoS attack on network resources reduces availability of service to a web site and backend resources, and could easily result in a loss of millions of dollars in revenue depending on company size. There are many DoS attack methods, each of which is critical to providing an understanding of the nature of the DoS attack class. There has been a rise in recent years of application-layer DoS attack methods that target web servers and are challenging to detect. An attack may be disguised to look like legitimate traffic, except it targets specific application packets or functions. Slow Read DoS attack is one type of slow HTTP attack targeting the application-layer. Slow Read attacks are often used to exploit weaknesses in the HTTP protocol, as it is the most widely used protocol on the Internet. In this paper, we use Full Packet Capture (FPC) datasets for detecting Slow Read DoS attacks with machine learning methods. All data collected originates in a live network environment. Our approach produces FPC features taken from network packets at the IP and TCP layers. Experimental results show that the machine learners were quite successful in identifying the Slow Read attacks with high detection and low false alarm rates using FPC data. Our experiment evaluates FPC datasets to determine the accuracy and efficiency of several detection models for Slow Read attacks. The experiment demonstrates that FPC features are discriminative enough to detect such attacks.
机译:在网络犯罪分子和有组织犯罪集团中,检测Web服务器上的拒绝服务(DoS)攻击已变得非常流行。对网络资源的成功DoS攻击会降低网站和后端资源的服务可用性,并可能轻易导致数百万美元的收入损失,具体取决于公司规模。有很多DoS攻击方法,每种方法对于理解DoS攻击类别的性质都是至关重要的。近年来,针对Web服务器且难以检测的应用层DoS攻击方法有所增加。攻击可能会伪装成看起来像合法流量,但它针对特定的应用程序包或功能。慢读DoS攻击是针对应用层的一种慢HTTP攻击。慢读攻击通常用于利用HTTP协议中的弱点,因为它是Internet上使用最广泛的协议。在本文中,我们使用全包捕获(FPC)数据集通过机器学习方法检测慢读DoS攻击。收集的所有数据均来自实时网络环境。我们的方法从IP和TCP层的网络数据包中产生FPC功能。实验结果表明,机器学习者使用FPC数据成功地以高检测率和低误报率识别了慢读攻击。我们的实验评估FPC数据集,以确定针对慢速读取攻击的几种检测模型的准确性和效率。实验表明,FPC功能具有足够的判别能力,可以检测到此类攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号