Publicación:
DDoS attack detection mechanism in the application layer using user features
DDoS attack detection mechanism in the application layer using user features
dc.contributor.author | Bravo S. | es_PE |
dc.contributor.author | Mauricio D. | es_PE |
dc.date.accessioned | 2024-05-30T23:13:38Z | |
dc.date.available | 2024-05-30T23:13:38Z | |
dc.date.issued | 2018 | |
dc.description | The authors thank the National Council of Science,Technology and Technological Innovation (CONCYTEC)-Peru and Technical University of Cotopaxi for the partial funding of this work and Professor Angel H. Moreno for their contributions to this work | |
dc.description.abstract | DDoS attacks are one of the most damaging computer aggressions of recent times. Attackers send large number of requests to saturate a victim machine and it stops providing its services to legitimate users. In general attacks are directed to the network layer and the application layer, the latter has been increasing due mainly to its easy execution and difficult detection. The present work proposes a low cost detection approach that uses the characteristics of the Web User for the detection of attacks. To do this, the features are extracted in real time using functions designed in PHP and JavaScript. They are evaluated by an order 1 classifier to differentiate a real user from a DDoS attack. A real user is identified by making requests interacting with the computer system, while DDoS attacks are requests sent by robots to overload the system with indiscriminate requests. The tests were executed on a computer system using requests from real users and attacks using the LOIC, OWASP and GoldenEye tools. The results show that the proposed method has a detection efficiency of 100%, and that the characteristics of the web user allow to differentiate between a real user and a robot. | |
dc.description.sponsorship | Consejo Nacional de Ciencia, Tecnología e Innovación Tecnológica - Concytec | |
dc.identifier.doi | https://doi.org/10.1109/INFOCT.2018.8356848 | |
dc.identifier.isbn | 9781538653845 | |
dc.identifier.scopus | 2-s2.0-85048376703 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12390/545 | |
dc.language.iso | eng | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.relation.ispartof | 2018 International Conference on Information and Computer Technologies, ICICT 2018 | |
dc.rights | info:eu-repo/semantics/openAccess | |
dc.subject | Websites | |
dc.subject | Network layers | es_PE |
dc.subject | Application layers | es_PE |
dc.subject | DDoS | es_PE |
dc.subject | Detection approach | es_PE |
dc.subject | Detection efficiency | es_PE |
dc.subject | Detection of attacks | es_PE |
dc.subject | dynamism user | es_PE |
dc.subject | features user | es_PE |
dc.subject | Denial-of-service attack | es_PE |
dc.subject.ocde | https://purl.org/pe-repo/ocde/ford#1.02.01 | |
dc.title | DDoS attack detection mechanism in the application layer using user features | |
dc.type | info:eu-repo/semantics/conferenceObject | |
dspace.entity.type | Publication | |
oairecerif.author.affiliation | #PLACEHOLDER_PARENT_METADATA_VALUE# | |
oairecerif.author.affiliation | #PLACEHOLDER_PARENT_METADATA_VALUE# |