Web DDoS Detection Schemes Based on Measuring User's Access Behavior with Large Deviation

被引:0
|
作者
Wang, Jin [1 ]
Yang, Xiaolong [1 ]
Long, Keping [1 ]
机构
[1] Univ Elect Sci & Technol China, Res Ctr Opt Internet & Mobile Informat Network, Chengdu 611731, Peoples R China
关键词
IP network; DDoS; Large deviation; Markov process;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Distributed denial-of-service (DDoS) attack seriously threatens the survivability of web services. It attempts to exhaust a server's resources (e. g., I/O bandwidth, CPU, and memory resources) to the extent that no resource is available for requests from legitimate users. Recently, some attackers launch web DDoS attack from the application layer (i.e., web app-DDoS), which can evade most of the existing detection approaches that mainly focused on Bandwidth-Flooding DDoS and TCP SYN-Flooding DDoS. This paper discusses the detection of web app-DDoS, and present two different models to characterize user's web access behavior, i.e., click-ratio based model and Markov process based model. With these characterizations as reference, we adopt large deviation theory to estimate the probability that each ongoing user's access behavior is "consistent" with the corresponding reference characterization, and propose two different detection schemes, LD-IID and LD-MP, respectively. We also validate our schemes with simulations, and the simulation results show that LD-IID can detect attackers accurately, yet LD-MP has high false negatives.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Hybrid Technique for User's Web Page Access Prediction based on Markov Model
    Panchal, Priyanka S.
    Agravat, Urmi D.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [22] A METRIC FOR MEASURING WEB SEARCH RESULTS SATISFACTION INCORPORATING USER BEHAVIOR
    Yu, Jinxiu
    Lu, Yueming
    Zhang, Fangwei
    Sun, Songlin
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 583 - 586
  • [23] Identifying User Behavior by Analyzing Web Server Access Log File
    Suneetha, K. R.
    Krishnamoorthi, R.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04): : 327 - 332
  • [24] User behavior under the microscope - Can the behavior indicate a Web user's task?
    Gutschmidt, Anne
    Cap, Clemens H.
    WEBIST 2008: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2008, : 215 - 222
  • [25] Identification of trusted interactive behavior based on mouse behavior considering web User's emotions
    Yi, Qian
    Xiong, Shiquan
    Wang, Biao
    Yi, Shuping
    INTERNATIONAL JOURNAL OF INDUSTRIAL ERGONOMICS, 2020, 76
  • [26] ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS
    Jiang, Jianguo
    Yu, Qian
    Yu, Min
    Li, Gang
    Chen, Jiuming
    Liu, Kunying
    Liu, Chao
    Huang, Weiqing
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1565 - 1569
  • [27] Detection of Application Layer DDoS Attack by Modeling User Behavior Using Logistic Regression
    Yadav, Satyajit
    Selvakumar, S.
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [28] Hybrid recommendation algorithm based on Hamming clustering for user's access log and weighted user behavior
    Li, Tao
    Chen, Yan
    Zhu, Guoqing
    2018 15TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT (ICSSSM), 2018,
  • [29] A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior
    Sun, Degang
    Yang, Kun
    Shi, Zhixin
    Wang, Yan
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 65 - 72
  • [30] Feature Extraction and Construction of Application Layer DDoS Attack Based on User Behavior
    Liao Qin
    Li Hong
    Kang Songlin
    Liu Chuchu
    2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014, : 5492 - 5497