References
References
References
Newsletter
ACM SIGCOMM Computer Communication Review Homepage archive
Volume 34 Issue 2, April 2004
Pages 39-53
Christos Douligeris, ,
Aikaterini Mitrokotsa
http://www.rbsv.eu/courses/rmtw/mtrl/SM.pdf
8 https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf [8]
9 http://resources.infosecinstitute.com/layer-seven-ddos-attacks/ [9]
2013 Xie et al.[35] proposed a scheme that primarily detects web [33]
Xie et proxy based DDoS attacks using Hidden semi Markov Model.
al. [33] The authors captured temporal and spatial localities to
model web proxies access behaviour using the server logs.
The scheme offers traffic intensity and web content
independent defence approach against proxy based attacks.
However with the increase in number of users, the model is
likely to give expensive results.
[38]
[39]
References
[1] J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense
mechanisms, SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 39
53, Apr. 2004.
[2] C. Douligeris and A. Mitrokotsa, DDoS attacks and defense mechanisms:
classification and state-of-the-art, Comput. Netw., vol. 44, no. 5, pp.
643666, Apr. 2004.
[3] J. M. Gregory, G. Prier, and P. Reiher, Attacking DDoS at the source, in
In Proceedings of the IEEE International Conference on Network
Protocols, 2002.
[4] Roland Dobbins, Breaking the Bank, 2015.
[5] S. M. Specht and R. B. Lee, Distributed Denial of Service: Taxonomies of
Attacks, Tools, and Countermeasures., in ISCA PDCS, 2004, pp. 543
550.
[6] A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B.
Schwartz, S. T. Kent, and W. T. Strayer, Single-packet IP traceback,
IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 721734, 2002.
[7] Barbara Kitchenham and Stuart Charters, Guidelines for performing
Systematic Literature Reviews in Software Engineering, School of
Computer Science and Mathematics, Keele University, EBSE-2007-01, Jul.
2007.
[8] Wong Onn Chee and Tom Brennan, H.....t.....t....p....p....o....s....t, 2010.
[9] Layer Seven DDoS Attacks, InfoSec Institute. [Online]. Available:
http://resources.infosecinstitute.com/layer-seven-ddos-attacks/.
[Accessed: 05-Sep-2014].
[10] J. Jung, B. Krishnamurthy, and M. Rabinovich, Flash Crowds and Denial
of Service Attacks: Characterization and Implications for CDNs and Web
Sites, in Proceedings of the 11th International Conference on World
Wide Web, New York, NY, USA, 2002, pp. 293304.
[11] L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, CAPTCHA: Using Hard
AI Problems for Security, in Advances in Cryptology EUROCRYPT
2003, E. Biham, Ed. Springer Berlin Heidelberg, 2003, pp. 294311.
[12] W. Yen and M.-F. Lee, Defending application DDoS with constraint
random request attacks, in Communications, 2005 Asia-Pacific
Conference on, 2005, pp. 620624.
[13] S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, DDoS-Resilient
Scheduling to Counter Application Layer Attacks Under Imperfect
Detection, in INFOCOM 2006. 25th IEEE International Conference on
Computer Communications. Proceedings, 2006, pp. 113.
[14] T. Yatagai, T. Isohara, and I. Sasase, Detection of HTTP-GET flood Attack
Based on Analysis of Page Access Behavior, in IEEE Pacific Rim
Conference on Communications, Computers and Signal Processing,
2007. PacRim 2007, 2007, pp. 232235.
[15] J. Yu, Z. Li, H. Chen, and X. Chen, A Detection and Offense Mechanism to
Defend Against Application Layer DDoS Attacks, in Third International
Conference on Networking and Services, 2007. ICNS, 2007, pp. 5454.
[16] M. Srivatsa, A. Iyengar, J. Yin, and L. Liu, Mitigating application-level
denial of service attacks on Web servers: A client-transparent approach,
ACM Trans. Web, vol. 2, no. 3, pp. 15:115:49, Jul. 2008.
[17] Y. Xie and S. Yu, A Large-Scale Hidden Semi-Markov Model for Anomaly
Detection on User Browsing Behaviors, IEEE/ACM Transactions on
Networking, vol. 17, no. 1, pp. 5465, Feb. 2009.
[18] G. Oikonomou and J. Mirkovic, Modeling Human Behavior for Defense
Against Flash-crowd Attacks, in Proceedings of the 2009 IEEE
International Conference on Communications, Piscataway, NJ, USA, 2009,
pp. 625630.
[19] J. Yu, C. Fang, L. Lu, and Z. Li, Mitigating application layer distributed
denial of service attacks via effective trust management, IET
communications, vol. 4, no. 16, pp. 19521962, 2010.
[20] S. Wen, W. Jia, W. Zhou, W. Zhou, and C. Xu, CALD: Surviving Various
Application-Layer DDoS Attacks That Mimic Flash Crowd, in 2010 4th
International Conference on Network and System Security (NSS), 2010,
pp. 247254.
[21] P. Du and A. Nakao, OverCourt: DDoS mitigation through credit-based
traffic segregation and path migration, Computer Communications, vol.
33, no. 18, pp. 21642175, Dec. 2010.
[22] Y. Xuan, I. Shin, M. T. Thai, and T. Znati, Detecting Application Denial-of-
Service Attacks: A Group-Testing-Based Approach, IEEE Transactions on
Parallel and Distributed Systems, vol. 21, no. 8, pp. 12031216, Aug.
2010.
[23] D. Das, U. Sharma, and D. K. Bhattacharyya, Detection of HTTP Flooding
Attacks in Multiple Scenarios, in Proceedings of the 2011 International
Conference on Communication, Computing & Security, New York,
NY, USA, 2011, pp. 517522.
[24] S. B. Ankali and D. V. Ashoka, Detection architecture of application layer
DDoS attack for internet, Int. J. Advanced Networking and Applications,
vol. 3, no. 01, pp. 984990, 2011.
[25] Y. S. Choi, J. T. Oh, J. S. Jang, and I. K. Kim, Timeslot Monitoring Model for
application layer DDoS attack detection, in 2011 6th International
Conference on Computer Sciences and Convergence Information
Technology (ICCIT), 2011, pp. 677679.
[26] S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, Discriminating DDoS
Attacks from Flash Crowds Using Flow Correlation Coefficient, IEEE
Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp.
10731080, Jun. 2012.
[27] C. Ye, K. Zheng, and C. She, Application layer ddos detection using
clustering analysis, in 2012 2nd International Conference on Computer
Science and Network Technology (ICCSNT), 2012, pp. 10381041.
[28] S. Sivabalan and P. J. Radcliffe, A novel framework to detect and block
DDoS attack at the application layer, in 2013 IEEE TENCON Spring
Conference, 2013, pp. 578582.
[29] T. Ni, X. Gu, H. Wang, and Y. Li, Real-Time Detection of Application-Layer
DDoS Attack Using Time Series Analysis, Journal of Control Science and
Engineering, vol. 2013, p. e821315, Sep. 2013.
[30] J. Wang, M. Zhang, X. Yang, K. Long, and C. Zhou, HTTP-sCAN: Detecting
HTTP-flooding attaCk by modeling multi-features of web browsing
behavior from noisy dataset, in 2013 19th Asia-Pacific Conference on
Communications (APCC), 2013, pp. 677682.
[31] L. C. Giralte, C. Conde, I. M. de Diego, and E. Cabello, Detecting denial
of service by modelling web-server behaviour, Computers & Electrical
Engineering, vol. 39, no. 7, pp. 22522262, Oct. 2013.
[32] Y. Xie, S. Tang, X. Huang, C. Tang, and X. Liu, Detecting latent attack
behavior from aggregated Web traffic, Computer Communications, vol.
36, no. 8, pp. 895907, May 2013.
[33] Y. Xie, S. Tang, Y. Xiang, and J. Hu, Resisting Web Proxy-Based HTTP
Attacks by Temporal and Spatial Locality Behavior, IEEE Transactions on
Parallel and Distributed Systems, vol. 24, no. 7, pp. 14011410, 2013.
[34] J. Wang, X. Yang, M. Zhang, K. Long, and J. Xu, HTTP-SoLDiER: An HTTP-
flooding attack detection scheme with the large deviation principle, Sci.
China Inf. Sci., pp. 115, Apr. 2014.
[35] W. Zhou, W. Jia, S. Wen, Y. Xiang, and W. Zhou, Detection and defense of
application-layer DDoS attacks in backbone web traffic, Future
Generation Computer Systems, vol. 38, pp. 3646, Sep. 2014.
[36] C. Xu, G. Zhao, G. Xie, and S. Yu, Detection on application layer DDoS
using random walk model, in 2014 IEEE International Conference on
Communications (ICC), 2014, pp. 707712.
[37] S. Yu, S. Guo, and I. Stojmenovic, Fool Me If You Can: Mimicking Attacks
and Anti-attacks in Cyberspace, IEEE Transactions on Computers, vol.
99, no. PrePrints, p. 1, 2013.
[38] Y. Xie and S. Yu, Monitoring the Application-Layer DDoS Attacks for
Popular Websites, IEEE/ACM Transactions on Networking, vol. 17, no. 1,
pp. 1525, Feb. 2009.
[39] A. Bhandari, K. Kumar, and A. L. Sangal, Performance Metrics for
Defense Framework against Distributed Denial of Service Attacks, IJNS,
vol. 6, 2014.
[1] J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS
defense mechanisms, SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp.
3953, Apr. 2004.
[12] W. Yen and M.-F. Lee, Defending application DDoS with constraint
random request attacks, in Communications, 2005 Asia-Pacific Conference
on, 2005, pp. 620624.
[15] J. Yu, Z. Li, H. Chen, and X. Chen, A Detection and Offense Mechanism
to Defend Against Application Layer DDoS Attacks, in Third International
Conference on Networking and Services, 2007. ICNS, 2007, pp. 5454.
[17] Y. Xie and S. Yu, A Large-Scale Hidden Semi-Markov Model for Anomaly
Detection on User Browsing Behaviors, IEEE/ACM Transactions on
Networking, vol. 17, no. 1, pp. 5465, Feb. 2009.
[19] J. Yu, C. Fang, L. Lu, and Z. Li, Mitigating application layer distributed
denial of service attacks via effective trust management, IET
communications, vol. 4, no. 16, pp. 19521962, 2010.
[20] S. Wen, W. Jia, W. Zhou, W. Zhou, and C. Xu, CALD: Surviving Various
Application-Layer DDoS Attacks That Mimic Flash Crowd, in 2010 4th
International Conference on Network and System Security (NSS), 2010, pp.
247254.
[27] C. Ye, K. Zheng, and C. She, Application layer ddos detection using
clustering analysis, in 2012 2nd International Conference on Computer
Science and Network Technology (ICCSNT), 2012, pp. 10381041.
[32] Y. Xie, S. Tang, X. Huang, C. Tang, and X. Liu, Detecting latent attack
behavior from aggregated Web traffic, Computer Communications, vol. 36,
no. 8, pp. 895907, May 2013.
[33] Y. Xie, S. Tang, Y. Xiang, and J. Hu, Resisting Web Proxy-Based HTTP
Attacks by Temporal and Spatial Locality Behavior, IEEE Transactions on
Parallel and Distributed Systems, vol. 24, no. 7, pp. 14011410, 2013.
[35] W. Zhou, W. Jia, S. Wen, Y. Xiang, and W. Zhou, Detection and defense
of application-layer DDoS attacks in backbone web traffic, Future Generation
Computer Systems, vol. 38, pp. 3646, Sep. 2014.
[36] C. Xu, G. Zhao, G. Xie, and S. Yu, Detection on application layer DDoS
using random walk model, in 2014 IEEE International Conference on
Communications (ICC), 2014, pp. 707712.
[1] J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense
mechanisms, SIGCOMM Comput. Commun. Rev., vol. 34, no. 2, pp. 39
53, 2004.
[2] C. Douligeris and A. Mitrokotsa, DDoS attacks and defense mechanisms:
classification and state-of-the-art, Computuer Networks, vol. 44, no. 5,
pp. 643666, 2004.
[3] J. M. Gregory, G. Prier, and P. Reiher, Attacking DDoS at the source, In
Proceedings of the IEEE International Conference on Network Protocols,
2002, pp. 312-321.
[4] Roland Dobbins, Breaking the Bank, 2015 [Online]. Available:
https://conference.apnic.net/data/37/breakingthebank.pdf.
[5] S. M. Specht and R. B. Lee, Distributed Denial of Service: Taxonomies of
Attacks, Tools, and Countermeasures., In Proceedings of the ISCA PDCS,
2004, pp. 543550.
[6] A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, B.
Schwartz, S. T. Kent, and W. T. Strayer, Single-packet IP traceback,
IEEE/ACM Transactions on Networking, vol. 10, no. 6, pp. 721734, 2002.
[7] Barbara Kitchenham and Stuart Charters, Guidelines for performing
Systematic Literature Reviews in Software Engineering, School of
Computer Science and Mathematics, Keele University, Jul. 2007.
[8] Wong Onn Chee and Tom Brennan, H.....t.....t....p....p....o....s....t, 2010
[Online]. Available:
https://www.owasp.org/images/4/43/Layer_7_DDOS.pdf.
[9] Layer Seven DDoS Attacks, InfoSec Institute, 2015 [Online]. Available:
http://resources.infosecinstitute.com/layer-seven-ddos-attacks/.
[10] J. Jung, B. Krishnamurthy, and M. Rabinovich, Flash Crowds and Denial
of Service Attacks: Characterization and Implications for CDNs and Web
Sites, In Proceedings of the 11th International Conference on World
Wide Web, 2002, pp. 293304.
[11] L. von Ahn, M. Blum, N. J. Hopper, and J. Langford, CAPTCHA: Using Hard
AI Problems for Security, in Advances in Cryptology EUROCRYPT
2003, E. Biham, Ed. Springer Berlin Heidelberg, 2003, pp. 294311.
[12] W. Yen and M.-F. Lee, Defending application DDoS with constraint
random request attacks, In Proceedings of the Asia-Pacific Conference
on Communications, 2005, pp. 620624.
[13] S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, DDoS-Resilient
Scheduling to Counter Application Layer Attacks Under Imperfect
Detection, In Proceedings of the 25th IEEE International Conference on
Computer Communications, 2006, pp. 113.
[14] T. Yatagai, T. Isohara, and I. Sasase, Detection of HTTP-GET flood Attack
Based on Analysis of Page Access Behavior, In Proceedings of the IEEE
Pacific Rim Conference on Communications, Computers and Signal
Processing, 2007, pp. 232235.
[15] J. Yu, Z. Li, H. Chen, and X. Chen, A Detection and Offense Mechanism to
Defend Against Application Layer DDoS Attacks, In Proceedings of the
International Conference on Networking and Services, 2007, pp. 5454.
[16] M. Srivatsa, A. Iyengar, J. Yin, and L. Liu, Mitigating application-level
denial of service attacks on Web servers: A client-transparent approach,
ACM Trans. Web, vol. 2, no. 3, pp. 15:115:49, Jul. 2008.
[17] Y. Xie and S. Yu, A Large-Scale Hidden Semi-Markov Model for Anomaly
Detection on User Browsing Behaviors, IEEE/ACM Transactions on
Networking, vol. 17, no. 1, pp. 5465, 2009.
[18] G. Oikonomou and J. Mirkovic, Modeling Human Behavior for Defense
Against Flash-crowd Attacks, In Proceedings of the IEEE International
Conference on Communications, 2009, pp. 625630.
[19] J. Yu, C. Fang, L. Lu, and Z. Li, Mitigating application layer distributed
denial of service attacks via effective trust management, IET
communications, vol. 4, no. 16, pp. 19521962, 2010.
[20] S. Wen, W. Jia, W. Zhou, W. Zhou, and C. Xu, CALD: Surviving Various
Application-Layer DDoS Attacks That Mimic Flash Crowd, In Proceedings
of the International Conference on Network and System Security, 2010,
pp. 247254.
[21] P. Du and A. Nakao, OverCourt: DDoS mitigation through credit-based
traffic segregation and path migration, Computer Communications, vol.
33, no. 18, pp. 21642175, 2010.
[22] Y. Xuan, I. Shin, M. T. Thai, and T. Znati, Detecting Application Denial-of-
Service Attacks: A Group-Testing-Based Approach, IEEE Transactions on
Parallel and Distributed Systems, vol. 21, no. 8, pp. 12031216, 2010.
[23] D. Das, U. Sharma, and D. K. Bhattacharyya, Detection of HTTP Flooding
Attacks in Multiple Scenarios, In Proceedings of the International
Conference on Communication, Computing & Security, 2011, pp. 517
522.
[24] S. B. Ankali and D. V. Ashoka, Detection architecture of application layer
DDoS attack for internet, Int. J. Advanced Networking and Applications,
vol. 3, no. 01, pp. 984990, 2011.
[25] Y. S. Choi, J. T. Oh, J. S. Jang, and I. K. Kim, Timeslot Monitoring Model for
application layer DDoS attack detection, In Proceedings of the
International Conference on Computer Sciences and Convergence
Information Technology, 2011, pp. 677679.
[26] S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, Discriminating DDoS
Attacks from Flash Crowds Using Flow Correlation Coefficient, IEEE
Transactions on Parallel and Distributed Systems, vol. 23, no. 6, pp.
10731080, 2012.
[27] C. Ye, K. Zheng, and C. She, Application layer ddos detection using
clustering analysis, In Proceedings of the International Conference on
Computer Science and Network Technology, 2012, pp. 10381041.
[28] S. Sivabalan and P. J. Radcliffe, A novel framework to detect and block
DDoS attack at the application layer, In Proceedings of the IEEE
TENCON Spring Conference, 2013, pp. 578582.
[29] T. Ni, X. Gu, H. Wang, and Y. Li, Real-Time Detection of Application-Layer
DDoS Attack Using Time Series Analysis, Journal of Control Science and
Engineering, vol. 2013, id. 821315.
[30] J. Wang, M. Zhang, X. Yang, K. Long, and C. Zhou, HTTP-sCAN: Detecting
HTTP-flooding attaCk by modeling multi-features of web browsing
behavior from noisy dataset, In Proceedings of the Asia-Pacific
Conference on Communications, 2013, pp. 677682.
[31] L. C. Giralte, C. Conde, I. M. de Diego, and E. Cabello, Detecting denial
of service by modelling web-server behaviour, Computers & Electrical
Engineering, vol. 39, no. 7, pp. 22522262, 2013.
[32] Y. Xie, S. Tang, X. Huang, C. Tang, and X. Liu, Detecting latent attack
behavior from aggregated Web traffic, Computer Communications, vol.
36, no. 8, pp. 895907, 2013.
[33] Y. Xie, S. Tang, Y. Xiang, and J. Hu, Resisting Web Proxy-Based HTTP
Attacks by Temporal and Spatial Locality Behavior, IEEE Transactions on
Parallel and Distributed Systems, vol. 24, no. 7, pp. 14011410, 2013.
[34] J. Wang, X. Yang, M. Zhang, K. Long, and J. Xu, HTTP-SoLDiER: An HTTP-
flooding attack detection scheme with the large deviation principle, Sci.
China Inf. Sci., pp. 115, 2014.
[35] W. Zhou, W. Jia, S. Wen, Y. Xiang, and W. Zhou, Detection and defense of
application-layer DDoS attacks in backbone web traffic, Future
Generation Computer Systems, vol. 38, pp. 3646, 2014.
[36] C. Xu, G. Zhao, G. Xie, and S. Yu, Detection on application layer DDoS
using random walk model, In Proceedings of the IEEE International
Conference on Communications (ICC), 2014, pp. 707712.
[37] S. Yu, S. Guo, and I. Stojmenovic, Fool Me If You Can: Mimicking Attacks
and Anti-attacks in Cyberspace, IEEE Transactions on Computers, vol.
64, no. 1, 2013, pp.139-151.
[38] Y. Xie and S. Yu, Monitoring the Application-Layer DDoS Attacks for
Popular Websites, IEEE/ACM Transactions on Networking, vol. 17, no. 1,
pp. 1525, 2009.
[39] A. Bhandari, K. Kumar, and A. L. Sangal, Performance Metrics for
Defense Framework against Distributed Denial of Service Attacks,
International Journal of Network Security, vol. 6, 2014.