Fuzzy Request Set Modelling for Detecting Multiplexed Asymmetric DDoS Attacks on HTTP/2 servers

被引:8
|
作者
Praseed, Amit [1 ]
Thilagam, P. Santhi [2 ]
机构
[1] Indian Inst Informat Technol Sri City, Dept Comp Sci & Engn, Chittoor, India
[2] Natl Inst Technol Karnataka, Dept Comp Sci & Engn, Surathkal, India
关键词
Application layer; DDoS; Asymmetric workload; Multiplexing; Server push; Http; 2; Detection; Fuzzy multiset; MEMBERSHIP FUNCTIONS; MULTISETS; SYSTEM;
D O I
10.1016/j.eswa.2021.115697
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The introduction of HTTP/2 has led to a dramatic change in web traffic. The steady flow of requests in HTTP/1.1 has been replaced by bursts of multiple requests, largely due to the introduction of multiplexing in HTTP/2 which allows users to send multiple requests through a single connection. This feature was introduced in order to reduce the page loading time by multiplexing a web page and its associated resources in a single connection. While this feature has significantly improved user experience, it can be misused to launch sophisticated application layer DDoS attacks against HTTP/2 servers. Instead of the intended use of multiplexing, attackers can force the web server to process multiple random requests simultaneously, leading to increased server usage. The use of computationally intensive requests can further exacerbate the situation. These attacks, called Multiplexed Asymmetric Attacks, pose a dangerous threat to HTTP/2 servers and stem from the lack of verification of the multiplexed requests. In this work, an approach to model an HTTP/2 request set as a fuzzy multiset is presented. The proposed approach uses a combination of relative cardinality and request workload to detect multiplexed AL-DDoS attacks. Experiments on open source datasets demonstrate that the proposed approach is able to detect multiplexed AL-DDoS attacks with an accuracy of around 95%, while maintaining a low False Positive Rate (FPR) of around 3%.
引用
收藏
页数:8
相关论文
共 15 条
  • [1] Multiplexed Asymmetric Attacks: Next-Generation DDoS on HTTP/2 Servers
    Praseed, Amit
    Thilagam, P. Santhi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1790 - 1800
  • [2] HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 Request Flood DDoS Attacks
    Beckett, David
    Sezer, Sakir
    2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 107 - 112
  • [3] Attacking Websites: Detecting and Preventing HTTP Request Smuggling Attacks
    Huang, Qi-Xian
    Chiu, Min-Yi
    Chen, Ying-Feng
    Sun, Hung-Min
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [4] HTTP/2 Tsunami: Investigating HTTP/2 Proxy Amplification DDoS Attacks
    Beckett, David
    Sezer, Sakir
    2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 127 - 132
  • [5] Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling
    Jazi, Hossein Hadian
    Gonzalez, Hugo
    Stakhanova, Natalia
    Ghorbani, Ali A.
    COMPUTER NETWORKS, 2017, 121 : 25 - 36
  • [6] Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection
    Nam, Seung Yeob
    Djuraev, Sirojiddin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2512 - 2531
  • [7] Identifying HTTP DDoS Attacks Using Self Organizing Map and Fuzzy Logic in Internet Based Environments
    Sree, T. Raja
    Bhanu, S. Mary Saira
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 259 - 269
  • [8] Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics
    Siaterlis, C
    Maglaris, V
    10TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2005, : 469 - 475
  • [9] Preventing DDoS attacks on internet servers exploiting P2P systems
    Sun, Xin
    Torres, Ruben
    Rao, Sanjay
    COMPUTER NETWORKS, 2010, 54 (15) : 2756 - 2774
  • [10] Request diversion: a novel mechanism to counter P2P-based DDoS attacks
    Al-Duwairi, Basheer
    Mustafa, Abdul-Raheem Masoud
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2010, 5 (1-2) : 55 - 64