Web DDoS Detection Schemes Based on Measuring User's Access Behavior with Large Deviation

被引:0
|
作者
Wang, Jin [1 ]
Yang, Xiaolong [1 ]
Long, Keping [1 ]
机构
[1] Univ Elect Sci & Technol China, Res Ctr Opt Internet & Mobile Informat Network, Chengdu 611731, Peoples R China
关键词
IP network; DDoS; Large deviation; Markov process;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Distributed denial-of-service (DDoS) attack seriously threatens the survivability of web services. It attempts to exhaust a server's resources (e. g., I/O bandwidth, CPU, and memory resources) to the extent that no resource is available for requests from legitimate users. Recently, some attackers launch web DDoS attack from the application layer (i.e., web app-DDoS), which can evade most of the existing detection approaches that mainly focused on Bandwidth-Flooding DDoS and TCP SYN-Flooding DDoS. This paper discusses the detection of web app-DDoS, and present two different models to characterize user's web access behavior, i.e., click-ratio based model and Markov process based model. With these characterizations as reference, we adopt large deviation theory to estimate the probability that each ongoing user's access behavior is "consistent" with the corresponding reference characterization, and propose two different detection schemes, LD-IID and LD-MP, respectively. We also validate our schemes with simulations, and the simulation results show that LD-IID can detect attackers accurately, yet LD-MP has high false negatives.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Fast Detection and Mitigation to DDoS Web Attack based on Access Frequency
    Tran, Thang M.
    Khanh-Van Nguyen
    2019 IEEE - RIVF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES (RIVF), 2019, : 136 - 141
  • [2] Web Access to Large Audiovisual Assets Based on User Preferences
    K. Karpouzis
    G. Moschovitis
    K. Ntalianis
    S. Ioannou
    S. Kollias
    Multimedia Tools and Applications, 2004, 22 : 215 - 234
  • [3] Web access to large audiovisual assets based on user preferences
    Karpouzis, K
    Moschovitis, G
    Ntalianis, K
    Ioannou, S
    Kollias, S
    MULTIMEDIA TOOLS AND APPLICATIONS, 2004, 22 (03) : 215 - 234
  • [4] Http-flood DDoS detection scheme based on large deviation and performance analysis
    Yang, X.-L. (yxl@uestc.edu.cn), 1600, Chinese Academy of Sciences (23):
  • [5] Access Control to Web Pages Based on User Browsing Behavior
    Liu, Chang
    He, Jingsha
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1016 - 1020
  • [6] Anomaly Detection for DDoS Attacks via Behavior Profiles Deviation Degree
    Liu, Yun
    Jiang, Siyu
    Huang, Jiuming
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3145 - 3150
  • [7] Behavior Spectrum: An Effective Method for User's Web Access Behavior Monitoring and Measurement
    Qin, Tao
    Li, Wei
    Guan, Xiaohong
    Liu, Zhaoli
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 961 - 966
  • [8] The Prediction of Web User's Behavior Based on Web Usage Mining
    Bai Xiaoli
    Chen Fei
    2010 ETP/IITA CONFERENCE ON TELECOMMUNICATION AND INFORMATION (TEIN 2010), 2010, : 32 - 35
  • [9] User Behavior Anomaly Detection for Application Layer DDoS Attacks
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Calvert, Chad
    Kemp, Clifford
    2017 IEEE 18TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI 2017), 2017, : 154 - 161
  • [10] User Behaviour Modelling Based DDoS Attack Detection
    Cepheli, Ozge
    Buyukcorak, Saliba
    Kurt, Gunes Karabulut
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 2186 - 2189