Detection of HTTP-GET flood attack based on analysis of page access behavior

Takeshi Yatagai, Takamasa Isohara, Iwao Sasase

研究成果: Conference contribution

81 被引用数 (Scopus)

抄録

Recently, there are many denial-of-service (DoS) attacks by computer viruses or botnet. DoS attacks to web services are called HTTP-GET flood attack and threats of them increase day by day. In this type of attacks, malicious clients send a large number of HTTP-GET requests to the target web server automatically. Since these HTTP-GET requests have legitimate formats and are sent via normal TCP connections, an intrusion detection system (IDS) can not detect them. In this paper, we propose HTTP-GET flood detection techniques based on analysis of page access behavior.We propose two detection algorithms, one is focusing on a browsing order of pages and the other is focusing on a correlation with browsing time to page information size. We implement detection techniques and evaluate attack detection rates, i.e., false positive and false negative. The results show that our techniques can detect the HTTP-GET flood attack effectively.

本文言語English
ホスト出版物のタイトル2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Conference Proceedings, PACRIM
ページ232-235
ページ数4
DOI
出版ステータスPublished - 2007 12月 1
イベント2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM - Victoria, BC, Canada
継続期間: 2007 8月 222007 8月 24

出版物シリーズ

名前IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings

Other

Other2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM
国/地域Canada
CityVictoria, BC
Period07/8/2207/8/24

ASJC Scopus subject areas

  • 信号処理
  • コンピュータ ネットワークおよび通信

フィンガープリント

「Detection of HTTP-GET flood attack based on analysis of page access behavior」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル