Abstract
Application layer based DDoS attacks have changed the way DoS attacks are taking place with more subtle level of attacking methods being imparted, which pose an ever-increasing challenge towards the emerging trends of internet based application systems development. Among the key range of attacks that take place, HTTP flood DDoS attacks are on high. In the case of DDoS attacks based on HTTP flood, unusual quantum of requests are sent to the servers within quick time interval and it affects the response and the performance levels of the server . There are numerous solutions in contemporary literature, pertaining to thwarting HTTP flood kind of attacks. It is imperative from the analysis that there are constraints in the existing models since the most of these models are user session based and/or packet flow patterns. The session based evolution models are vulnerable to botnets and packet flow pattern based models are vulnerable if attack sources are equipped with human resource and/or proxy servers. Hence, there is inherent need for improving the solutions towards addressing the HTTP flood kind of attacks over the system. The crux for such system is about ensuring that fast and early detection with minimal false alarming in streaming network transactions, and ensures that the genuine requests are not impacted. To address such a system, the model of Bio-Inspired Anomaly based HTTP-flood detection aimed, and the proposed model depicted in detail along with experimental inputs. Results attained from the process exemplify the significance and robustness of the model towards achieving the objectives considered for the solution.
Similar content being viewed by others
References
Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39–53.
Kumar, K., Joshi, R. C., & Singh, K. (2007). A distributed approach using entropy to detect DDoS attacks in ISP domain. In Signal processing, communications and networking. IEEE.
Singh, K., Singh, P., & Kumar, K. (2016). Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges. Computers and Security, 65, 344–372.
Udhayan, J., & R. Anitha. (2009). Demystifying and rate limiting ICMP hosted DoS/DDoS flooding attacks with attack productivity analysis. In Advance computing conference, 2009. IACC 2009. IEEE International. IEEE.
Chun-Tao, X., et al. (2012). An algorithm of detecting and defending CC attack in real time. In International conference on industrial control and electronics engineering (ICICEE), 2012. IEEE.
Specht, S. M., & Lee, R. B. (2004). Distributed denial of service: Taxonomies of attacks, tools, and countermeasures. In ISCA PDCS.
Byers, S., Rubin, A. D., & Kormann, D. (2004). Defending against an Internet-based attack on the physical world. ACM Transactions on Internet Technology (TOIT), 4(3), 239–254.
Estevez-Tapiador, J. M., García-Teodoro, P., & Díaz-Verdejo, J. E. (2005) Detection of web-based attacks through Markovian protocol parsing. In 10th IEEE Symposium on Computers and Communications (ISCC’05). IEEE.
Ishida, C., et al. (2005). Forecast techniques for predicting increase or decrease of attacks using Bayesian inference. In PACRIM. 2005 IEEE Pacific rim conference on communications, computers and signal processing, 2005. IEEE.
Cacheda, R. A., et al. (2007). QoS requirements for multimedia services. Resource management in satellite networks (pp. 67–94). New York: Springer.
Yang, X-S., & Deb S. (2009). Cuckoo search via Lévy flights. Nature & biologically inspired computing, 2009. NaBIC 2009. World Congress on. IEEE.
Real, R., & Vargas, J. M. (1996). The probabilistic basis of Jaccard’s index of similarity. Systematic Biology, 45(3), 380–385.
Yatagai, T., Takamasa I., & Iwao S. (2007). Detection of HTTP-GET flood attack based on analysis of page access behavior. In 2007 IEEE Pacific rim conference on communications, computers and signal processing. IEEE.
Jin, J., Nodar, Im, C., & Nam, S. Y. (2010). Mitigating HTTP GET flooding attacks through modified NetFPGA reference router. 1-st Asia NetFPGA Developers Workshop, June 13–14, Daejeon, Korea.
Xie, Y., & Yu, S.-Z. (2009). Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Transactions on Networking, 17(1), 15–25.
Lu, W-Z., & Yu, S. Z. (2016) An HTTP flooding detection method based on browser behavior. In 2006 international conference on computational intelligence and security, Vol. 2. IEEE.
Lee, J-S., et al. (2008). The activity analysis of malicious http-based botnets using degree of periodic repeatability. In International conference on security technology, 2008. SECTECH’08. IEEE.
Gulati, S., & Dhaliwal, A. (2013). Survey on ROQ attacks. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), 2(4), 25–54.
Dittrich, D., et al. (2004). Internet denial of service: Attack and defense mechanisms. London: Pearson Education.
Shevtekar, A., & Ansari, N. (2009). Is it congestion or a DDoS attack? IEEE Communications Letters, 13(7), 546–548.
Stevanovic, D., Vlajic, N., & An, A. (2013). Detection of malicious and non-malicious website visitors using unsupervised neural network learning. Applied Soft Computing, 13(1), 698–708.
Das, D., Sharma, U., & Bhattacharyya D. K. (2011). Detection of HTTP flooding attacks in multiple scenarios. In Proceedings of the 2011 international conference on communication, computing and security. ACM.
Baik, N-K, et al. (2008) Analysis and design of an intrusion tolerance node for application in traffic shaping. In International conference on control, automation and systems, 2008. ICCAS 2008. IEEE.
Chen, Y. W. (2000). Study on the prevention of SYN flooding by using traffic policing. In Network operations and management symposium, 2000. NOMS 2000. 2000 IEEE/IFIP. IEEE.
Garg, A., & Reddy, A. L. N. (2004). Mitigation of DoS attacks through QoS regulation. Microprocessors and Microsystems, 28(10), 521–530.
Ranjan, S., et al. (2009). DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. IEEE/ACM Transactions on Networking (TON), 17(1), 26–39.
Kandula, S., et al. (2005). Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In Proceedings of the 2nd conference on symposium on networked systems design & implementation, USENIX association Vol. 2..
Xie, Y., & Yu, S.-Z. (2009). A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors. IEEE/ACM Transactions on Networking (TON), 17(1), 54–65.
Ye, C., & Zheng, K. (2011). Detection of application layer distributed denial of service. In Computer science and network technology (ICCSNT), 2011 International Conference on. Vol. 1. IEEE.
Hameed, S., & Ali, U. (2015).On the efficacy of live DDoS detection with Hadoop. arXiv preprint arXiv:1506.08953.
Choi, J., et al. (2013). Detecting web based DDoS attack using map reduce operations in cloud computing environment. Journal of Internet Services and Information Security, 3(3/4), 28–37.
Choi, J., et al. (2014). A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment. Soft Computing, 18(9), 1697–1703.
Razzaq, A., et al.(2011). Foundation of semantic rule engine to protect web application attacks. In 2011 Tenth international symposium on autonomous decentralized systems. IEEE.
Ansarinia, M., et al. (2012). Ontology-based modeling of DDoS attacks for attack plan detection. In 2012 Sixth international symposium on telecommunications (IST). IEEE.
Shenbagam, J., & Salini, P. (2014). Vulnerability ontology for web applications to predict and classify attacks. In 2014 International conference on electronics, communication and computational engineering (ICECCE). IEEE.
Carmines, E. G., & Zeller, R. A. (1979). Reliability and validity assessment (Vol. 17). Singapore: Sage publications.
Kiran, S., Mohapatra, A., & Swamy, R. (2015). Experiences in performance testing of web applications with Unified Authentication platform using Jmeter. In 2015 international symposium on technology management and emerging technologies (ISTMET). IEEE.
NVIDIA (2015). PNY-NVIDIA-GeForce-GTX 960 4GB XLR8.pdf.
Nvidia, C. U. D. A. (2009). Programming guide, version 2.3.
Ihaka, R., & Gentleman, R. (1996). R: a language for data analysis and graphics. Journal of computational and graphical statistics, 5(3), 299–314.
Powers, D. M. (2011). Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation. Journal of Machine Learning Technologies, 2(1), 37–63.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Munivara Prasad, K., Rama Mohan Reddy, A. & Venugopal Rao, K. BIFAD: Bio-Inspired Anomaly Based HTTP-Flood Attack Detection. Wireless Pers Commun 97, 281–308 (2017). https://doi.org/10.1007/s11277-017-4505-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4505-8