首页> 外文期刊>Journal of network and computer applications >User behavior analytics-based classification of application layer HTTP-GET flood attacks
【24h】

User behavior analytics-based classification of application layer HTTP-GET flood attacks

机译:基于用户行为分析的应用层HTTP-GET Flood攻击分类

获取原文
获取原文并翻译 | 示例
           

摘要

Web services are one of the most prominent forms of web presence exercised by the businesses to connect to their possible client base. GET flood attacks, commonly known as Application Layer DDoS attacks, are widely executed exploits that challenge almost all the web servers hosting such services on the Internet. The state-of-art literature provides many security mechanisms that are designed to handle such attacks, however, attackers constantly explore unique approaches for orchestrating covert GET flood attacks. The detection of such attacks requires user level monitoring due to a high resemblance among the browsing behaviors of legitimate users and modern-day sophisticated bots. In this paper, we propose four novel behavioral features to distinguish GET flood attack sources from the legitimate normal and flash traffic. Our work distinguishes itself from previous works by providing a comprehensive solution for the detection of 12 different strategies employed by an attacker to launch GET flood attacks. We build an experimental test bed supported by well-known software tools that replay the benchmark web logs and generate emulated attack traces pertaining to GET flood attack strategies. The datasets prepared during the course of this experimentation are evaluated through an exhaustive performance comparison of the selected set of machine learning classifiers. The obtained results evidently indicate significantly high detection accuracy (97.46%) with few false alarms using the SVM classifier.
机译:Web服务是企业为连接其可能的客户群而行使的最重要的Web呈现形式之一。 GET泛洪攻击,通常称为应用程序层DDoS攻击,是一种广泛执行的利用程序,几乎对在Internet上托管此类服务的所有Web服务器构成了挑战。最新的文献提供了旨在处理此类攻击的许多安全机制,但是,攻击者不断探索编排秘密GET Flood攻击的独特方法。由于合法用户的浏览行为与现代复杂的漫游器高度相似,因此检测到此类攻击需要对用户级别进行监视。在本文中,我们提出了四种新颖的行为特征,以区分GET Flood攻击源与合法的正常流量和Flash流量。我们的工作通过提供一种全面的解决方案来检测攻击者用来发起GET Flood攻击的12种不同策略,从而使其与以前的工作有所不同。我们构建了一个实验测试台,并由著名的软件工具支持,这些工具可以重播基准Web日志并生成与GET Flood攻击策略有关的模拟攻击踪迹。通过对选定的机器学习分类器进行详尽的性能比较,可以评估在实验过程中准备的数据集。获得的结果显然表明使用SVM分类器的检测准确率非常高(97.46%),几乎没有误报。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号