首页> 外文OA文献 >HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 Request Flood DDoS Attacks
【2h】

HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 Request Flood DDoS Attacks

机译:HTTP / 2 Cannon:对HTTP / 1和HTTP / 2请求泛洪DDoS攻击的实验分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Distributed Denial of Service (DDoS) attack sare a frequent cyber attack vector which cause significant damage to computer systems. Hypertext Transfer Protocol(HTTP), which is the core communication protocol of the internet, has had a major upgrade and is released as RFC 7540. This latest version, HTTP/2, has begun tobe deployed in live systems before comprehensive security studies have been carried out on its risk from DDoS. In this piece of research we explore using experimental methodology, the DDoS risk posed by the upgraded functionality of the HTTP/2 protocol, in particular its risk from a flood attack. Our results show that a website implementing HTTP/2, scales up the flood attack magnitude, increasing the risk from DDoS.
机译:分布式拒绝服务(DDoS)攻击是一种频繁的网络攻击媒介,会对计算机系统造成重大破坏。超文本传输​​协议(HTTP)是Internet的核心通信协议,已进行了重大升级,并以RFC 7540的形式发布。在进行全面的安全研究之前,该最新版本的HTTP / 2已开始在实时系统中部署。承担DDoS带来的风险。在这项研究中,我们将使用实验方法来探讨HTTP / 2协议升级功能带来的DDoS风险,尤其是泛洪攻击的风险。我们的结果表明,实施HTTP / 2的网站会扩大洪水攻击的规模,从而增加DDoS的风险。

著录项

  • 作者

    Beckett David; Sezer Sakir;

  • 作者单位
  • 年度 2017
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号