Journal of Big Data | |
An approach to application-layer DoS detection | |
Research | |
Joffrey L. Leevy1  Cliff Kemp1  Chad Calvert1  Taghi M. Khoshgoftaar1  | |
[1] Florida Atlantic University, 777 Glades Road, 33431, Boca Raton, FL, USA; | |
关键词: Application-layer DoS attack; Machine learning; HTTP GET; HTTP POST; Slow read DoS; Netflow; | |
DOI : 10.1186/s40537-023-00699-3 | |
received in 2022-06-16, accepted in 2023-02-02, 发布年份 2023 | |
来源: Springer | |
【 摘 要 】
With the massive resources and strategies accessible to attackers, countering Denial of Service (DoS) attacks is getting increasingly difficult. One of these techniques is application-layer DoS. Due to these challenges, network security has become increasingly more challenging to ensure. Hypertext Transfer Protocol (HTTP), Domain Name Service (DNS), Simple Mail Transfer Protocol (SMTP), and other application protocols have had increased attacks over the past several years. It is common for application-layer attacks to concentrate on these protocols because attackers can exploit some weaknesses. Flood and “low and slow” attacks are examples of application-layer attacks. They target weaknesses in HTTP, the most extensively used application-layer protocol on the Internet. Our experiment proposes a generalized detection approach to identify features for application-layer DoS attacks that is not specific to a single slow DoS attack. We combine four application-layer DoS attack datasets: Slow Read, HTTP POST, Slowloris, and Apache Range Header. We perform a feature-scaling technique that applies a normalization filter to the combined dataset. We perform a feature extraction technique, Principal Component Analysis (PCA), on the combined dataset to reduce dimensionality. We examine ways to enhance machine learning techniques for detecting slow application-layer DoS attacks that employ these methodologies. The machine learners effectively identify multiple slow DoS attacks, according to our findings. The experiment shows that classifiers are good predictors when combined with our selected Netflow characteristics and feature selection techniques.
【 授权许可】
CC BY
© The Author(s) 2023
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO202305157605792ZK.pdf | 1722KB | download | |
40854_2023_458_Article_IEq19.gif | 1KB | Image | download |
Fig. 3 | 640KB | Image | download |
Fig. 1 | 96KB | Image | download |
Fig. 4 | 207KB | Image | download |
Fig. 2 | 2137KB | Image | download |
Fig. 1 | 2945KB | Image | download |
Fig. 8 | 710KB | Image | download |
Fig. 1 | 73KB | Image | download |
13690_2023_1029_Article_IEq11.gif | 1KB | Image | download |
【 图 表 】
13690_2023_1029_Article_IEq11.gif
Fig. 1
Fig. 8
Fig. 1
Fig. 2
Fig. 4
Fig. 1
Fig. 3
40854_2023_458_Article_IEq19.gif
【 参考文献 】
- [1]
- [2]
- [3]
- [4]
- [5]
- [6]
- [7]
- [8]
- [9]
- [10]
- [11]
- [12]
- [13]
- [14]
- [15]
- [16]
- [17]
- [18]
- [19]
- [20]
- [21]
- [22]
- [23]
- [24]
- [25]
- [26]
- [27]
- [28]
- [29]
- [30]
- [31]
- [32]
- [33]
- [34]
- [35]
- [36]
- [37]
- [38]
- [39]
- [40]
- [41]
- [42]
- [43]
- [44]
- [45]
- [46]
- [47]
- [48]
- [49]
- [50]
- [51]
- [52]
- [53]
- [54]
- [55]
- [56]
- [57]
- [58]