期刊论文详细信息
Journal of Big Data
An approach to application-layer DoS detection
Research
Joffrey L. Leevy1  Cliff Kemp1  Chad Calvert1  Taghi M. Khoshgoftaar1 
[1] Florida Atlantic University, 777 Glades Road, 33431, Boca Raton, FL, USA;
关键词: Application-layer DoS attack;    Machine learning;    HTTP GET;    HTTP POST;    Slow read DoS;    Netflow;   
DOI  :  10.1186/s40537-023-00699-3
 received in 2022-06-16, accepted in 2023-02-02,  发布年份 2023
来源: Springer
PDF
【 摘 要 】

With the massive resources and strategies accessible to attackers, countering Denial of Service (DoS) attacks is getting increasingly difficult. One of these techniques is application-layer DoS. Due to these challenges, network security has become increasingly more challenging to ensure. Hypertext Transfer Protocol (HTTP), Domain Name Service (DNS), Simple Mail Transfer Protocol (SMTP), and other application protocols have had increased attacks over the past several years. It is common for application-layer attacks to concentrate on these protocols because attackers can exploit some weaknesses. Flood and “low and slow” attacks are examples of application-layer attacks. They target weaknesses in HTTP, the most extensively used application-layer protocol on the Internet. Our experiment proposes a generalized detection approach to identify features for application-layer DoS attacks that is not specific to a single slow DoS attack. We combine four application-layer DoS attack datasets: Slow Read, HTTP POST, Slowloris, and Apache Range Header. We perform a feature-scaling technique that applies a normalization filter to the combined dataset. We perform a feature extraction technique, Principal Component Analysis (PCA), on the combined dataset to reduce dimensionality. We examine ways to enhance machine learning techniques for detecting slow application-layer DoS attacks that employ these methodologies. The machine learners effectively identify multiple slow DoS attacks, according to our findings. The experiment shows that classifiers are good predictors when combined with our selected Netflow characteristics and feature selection techniques.

【 授权许可】

CC BY   
© The Author(s) 2023

【 预 览 】
附件列表
Files Size Format View
RO202305157605792ZK.pdf 1722KB PDF download
40854_2023_458_Article_IEq19.gif 1KB Image download
Fig. 3 640KB Image download
Fig. 1 96KB Image download
Fig. 4 207KB Image download
Fig. 2 2137KB Image download
Fig. 1 2945KB Image download
Fig. 8 710KB Image download
Fig. 1 73KB Image download
13690_2023_1029_Article_IEq11.gif 1KB Image download
【 图 表 】

13690_2023_1029_Article_IEq11.gif

Fig. 1

Fig. 8

Fig. 1

Fig. 2

Fig. 4

Fig. 1

Fig. 3

40854_2023_458_Article_IEq19.gif

【 参考文献 】
  • [1]
  • [2]
  • [3]
  • [4]
  • [5]
  • [6]
  • [7]
  • [8]
  • [9]
  • [10]
  • [11]
  • [12]
  • [13]
  • [14]
  • [15]
  • [16]
  • [17]
  • [18]
  • [19]
  • [20]
  • [21]
  • [22]
  • [23]
  • [24]
  • [25]
  • [26]
  • [27]
  • [28]
  • [29]
  • [30]
  • [31]
  • [32]
  • [33]
  • [34]
  • [35]
  • [36]
  • [37]
  • [38]
  • [39]
  • [40]
  • [41]
  • [42]
  • [43]
  • [44]
  • [45]
  • [46]
  • [47]
  • [48]
  • [49]
  • [50]
  • [51]
  • [52]
  • [53]
  • [54]
  • [55]
  • [56]
  • [57]
  • [58]
  文献评价指标  
  下载次数:2次 浏览次数:0次