HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 Request Flood DDoS Attacks

被引:0
|
作者
Beckett, David [1 ]
Sezer, Sakir [1 ]
机构
[1] Queens Univ Belfast, CSIT, Belfast, Antrim, North Ireland
来源
2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST) | 2017年
关键词
DDoS; HTTP2; Flood; Attack; Apache; nghttp2; Nginx; Vulnerabilities;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Distributed Denial of Service (DDoS) attacks are a frequent cyber attack vector which cause significant damage to computer systems. Hypertext Transfer Protocol (HTTP), which is the core communication protocol of the internet, has had a major upgrade and is released as RFC 7540. This latest version, HTTP/2, has begun to be deployed in live systems before comprehensive security studies have been carried out on its risk from DDoS. In this piece of research we explore using experimental methodology, the DDoS risk posed by the upgraded functionality of the HTTP/2 protocol, in particular its risk from a flood attack. Our results show that a website implementing HTTP/2, scales up the flood attack magnitude, increasing the risk from DDoS.
引用
收藏
页码:107 / 112
页数:6
相关论文
共 50 条
  • [21] Http-flood DDoS detection scheme based on large deviation and performance analysis
    Yang, X.-L. (yxl@uestc.edu.cn), 1600, Chinese Academy of Sciences (23):
  • [22] Analysis of header usage patterns of HTTP request messages
    Calzarossa, Maria Carla
    Massari, Luisa
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 847 - 853
  • [23] An Analysis of HTTP Attacks on Home IoT Devices
    Moldovan, Francisc
    Satmarean, Paul
    Oprisa, Ciprian
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2020, : 81 - 86
  • [24] Performance Evaluation of Web Sites Using HTTP/1.1 and HTTP/2
    Druzgala, Michal
    Nowak, Ziemowit
    COMPUTER NETWORKS, CN 2018, 2018, 860 : 142 - 157
  • [25] How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push
    Zimmermann, Torsten
    Rueth, Jan
    Wolters, Benedikt
    Hohlfeld, Oliver
    2017 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS, 2017,
  • [26] HTTP2 Explained
    Stenberg, Daniel
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) : 120 - 128
  • [27] HTTP/2 Attacks Generation using 5Greplay
    Caccavale, Francesco G.
    Nguyen, Huu Nghia
    Cavalli, Ana R.
    Montes de Oca, Edgardo
    Mallouli, Wissam
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [28] HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN
    Mohammadi, Reza
    Lal, Chhagan
    Conti, Mauro
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 367 - 379
  • [29] HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN
    Reza Mohammadi
    Chhagan Lal
    Mauro Conti
    International Journal of Information Security, 2023, 22 : 367 - 379
  • [30] Secure Double-layered Defense against HTTP-DDoS Attacks
    Samir, Mohamad
    Aida, Hitoshi
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 572 - 577