期刊文献+

HTTP-sCAN:Detecting HTTP-Flooding Attack by Modeling Multi-Features of Web Browsing Behavior from Noisy Web-Logs 被引量:3

HTTP-sCAN:Detecting HTTP-Flooding Attack by Modeling Multi-Features of Web Browsing Behavior from Noisy Web-Logs
下载PDF
导出
摘要 HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks. HTTP-flooding attack disables the victimized web server by sending a large number of HTTP Get requests.Recent research tends to detect HTTP-flooding with the anomaly-based approaches,which detect the HTTP-flooding by modeling the behavior of normal web surfers.However,most of the existing anomaly-based detection approaches usually cannot filter the web-crawling traces from unknown searching bots mixed in normal web browsing logs.These web-crawling traces can bias the base-line profile of anomaly-based schemes in their training phase,and further degrade their detection performance.This paper proposes a novel web-crawling tracestolerated method to build baseline profile,and designs a new anomaly-based HTTP-flooding detection scheme(abbr.HTTP-sCAN).The simulation results show that HTTP-sCAN is immune to the interferences of unknown webcrawling traces,and can detect all HTTPflooding attacks.
出处 《China Communications》 SCIE CSCD 2015年第2期118-128,共11页 中国通信(英文版)
基金 supported by National Key Basic Research Program of China(973 program)under Grant No.2012CB315905 National Natural Science Foundation of China under grants 61172048,61100184,60932005 and 61201128 the Fundamental Research Funds for the Central Universities under Grant No ZYGX2011J007
关键词 Flooding攻击 Web服务器 检测性能 HTTP 网络日志 浏览行为 扫描 flooding攻击 IP network DDoS relative entropy cluster algorithm
  • 相关文献

参考文献26

  • 1CRAIG L. Botnets, DDoS and Ground Truth A Look at 5000 Operator Confirmed Attacks [R]. NANOG50, Oct. 2010, Atlanta, Georgia, USA.
  • 2JUNG J, KRISHNAMURTHY B, RABINOVlCH M. Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites[C]. Proc. IEEE WWW, pp. 252-262, May 2002, Honolulu, Hawaii, USA.
  • 3XIE Yi, YU Shunzheng. Monitoring the applica- tion-layer DDoS attacks for popular websites [J] IEEE/ACM Trans. On Networks, 2009, vol. 17(1), DO. 15-25.
  • 4RAN JAN S, SWAMINATHAN R, et al. DDoS-Re- silient scheduling to counter application layer attacks under imperfect detecting [J]. IEEE/ACM Trans. On Networks, 2009, vol. 17(1), pp. 26-39.
  • 5OIKONOMOU G, MIRKOVIC J. Modeling hu- man behavior for defense against flash-crowd attacks [C]. Proc. IEEE ICC, 2009, Dresden, Ger- man, pp. 1-7.
  • 6XIE YI, YU Shunzheng. A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors [J]. IEEE/ACM Trans on Networks, 2009, vol. 17(1), pp. 54-65.
  • 7WANG Jin, YANG Xiaolong, LONG Keping. Web DDoS Detection Schemes Based on Measuring User's Access Behavior with Large Deviation [C]. Proc. IEEE Globecom, Dec. 2011, Houston, TX, USA. pp: 1-5.
  • 8STEVANOVlC D, AN A., VLAJIC N. Detection of Malicious and Non-malicious Website Visitors Using Unsupervised Neural Network Learning [J]. Elsevier Applied Soft Computing, January 2013, Vol. 13(1), pp: 698-708.
  • 9LEE et al. Sequence-order-independent network profiling for detecting application layer DDoS attacks [J]. EURASIP Journal on Wireless Com- munications and Networking 2011 2011:50.
  • 10YATAGAI T, ISOHARA T, SASASE I. Detection of HTTP-GET flood attack based on analysis of page access behavior [C], in Proceedings IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing, 2007, Victo- ria, BC, pp: 232-235.

同被引文献5

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部