WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection

被引:1
|
作者
Sood, Shaurya [1 ]
Palod, Pritesh [1 ]
Hubballi, Neminath [1 ]
机构
[1] Indian Inst Technol Indore, Dept Comp Sci & Engn, Indore, India
来源
关键词
Denial of service; Multiplexed attacks; Application layer attacks; Performance impact; Detection method;
D O I
10.1007/978-3-031-23690-7_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Application layer Denial of Service attacks can severely impact the services and at worst render them useless. As many of these come in the form of flooding attacks, traditional detection methods work with thresholds. These are easy to evade using multiplexed attacks where multiple type of attacks are launched in parallel. In this paper, we study the impact of multiplexed attacks using carefully chosen behavioral parameters. Subsequently, we use the observations to propose detection methods. By experimenting with three types of attacks and their combinations against HTTP, we show that using the behavioral parameters, these attacks can be detected.
引用
收藏
页码:260 / 271
页数:12
相关论文
共 50 条
  • [41] Delays Have Dangerous Ends: Slow HTTP/2 DoS Attacks Into the Wild and Their Real-Time Detection Using Event Sequence Analysis
    Tripathi, Nikhil
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (03) : 1244 - 1256
  • [42] Two Types of Novel DoS Attacks Against CDNs Based on HTTP/2 Flow Control Mechanism
    Song, Hengxian
    Liu, Jing
    Yang, Jianing
    Lei, Xinyu
    Xue, Gang
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 467 - 487
  • [43] Detection of DoS/DDoS attack against HTTP Servers using Naive Bayesian
    Katkar, Vijay
    Zinjade, Amol
    Dalvi, Suyed
    Bafna, Tejal
    Mahajan, Rashmi
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 280 - 285
  • [44] Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services
    Adi, Erwin
    Baig, Zubair
    Hingston, Philip
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 91 : 1 - 13
  • [45] A Study on the Impact of Memory DoS Attacks on Cloud Applications and Exploring Real-Time Detection Schemes
    Li, Zhuozhao
    Sen, Tanmoy
    Shen, Haiying
    Chuah, Mooi Choo
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (04) : 1644 - 1658
  • [46] Deep-Learning Based Injection Attacks Detection Method for HTTP
    Zhao, Chunhui
    Si, Shuaijie
    Tu, Tengfei
    Shi, Yijie
    Qin, Sujuan
    MATHEMATICS, 2022, 10 (16)
  • [47] Detection of HTTP flooding attacks in cloud using fuzzy bat clustering
    Sree, T. Raja
    Bhanu, S. Mary Saira
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (13): : 9603 - 9619
  • [48] Detection of HTTP flooding attacks in cloud using fuzzy bat clustering
    T. Raja Sree
    S. Mary Saira Bhanu
    Neural Computing and Applications, 2020, 32 : 9603 - 9619
  • [49] Detection of HTTP Flooding Attacks in Cloud Using Dynamic Entropy Method
    Sree, T. Raja
    Bhanu, S. Mary Saira
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 6995 - 7014
  • [50] Benford's Law in the Detection of DoS Attacks on Industrial Systems
    Aleksandrova, E. B.
    Lavrova, D. S.
    Yarmak, A. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 954 - 962