Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Web page request behavior analysis for threshold based HTTP GET Flooding attack detection

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Yangseo-
dc.contributor.authorKim, Ikkyun-
dc.contributor.authorIm, Eul Gyu-
dc.date.accessioned2022-07-16T08:40:05Z-
dc.date.available2022-07-16T08:40:05Z-
dc.date.created2021-05-13-
dc.date.issued2013-08-
dc.identifier.issn1343-4500-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/162198-
dc.description.abstractThe HTTP GET Flooding attack is one of the most frequently tried distributed denial-of-service (DDoS) attack. Especially, the sophisticated HTTP GET Flooding attack is very popular and has very similar traffic characteristics to normal one. So, it is quite difficult to detect it. Even though several detection algorithms are developed for the attack, they need lots of system resources [12, 13]. Sometimes due to the time consuming processes the whole performance of DDoS defense systems is degraded and it becomes another problem. For that, we propose a threshold based HTTP GET Flooding attack detection algorithm. Usually, threshold based detection methods can't detect the sophisticated DDoS attacks, but the proposed method develop a new threshold based on the HTTP GET request behavior analysis. In this algorithm, for behavior based threshold generation, we calculate the Average Inter-GET-Request-Packet- Exist-TS-Gap (AIGG) based on two special time periods. Also, the proposed algorithm doesn't need to analyze every HTTP GET request packet, so it needs less CPU resources than the algorithms which have to analyze all the request packets.-
dc.language영어-
dc.language.isoen-
dc.publisherInternational Information Institute Ltd.-
dc.titleWeb page request behavior analysis for threshold based HTTP GET Flooding attack detection-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, Eul Gyu-
dc.identifier.scopusid2-s2.0-84887894975-
dc.identifier.bibliographicCitationInformation (Japan), v.16, no.8 B, pp.6025 - 6039-
dc.relation.isPartOfInformation (Japan)-
dc.citation.titleInformation (Japan)-
dc.citation.volume16-
dc.citation.number8 B-
dc.citation.startPage6025-
dc.citation.endPage6039-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthorDDoS attack-
dc.subject.keywordAuthorHTTP GET Flooding-
dc.subject.keywordAuthorHTTP GET request behavior analysis-
dc.subject.keywordAuthorNetwork security-
dc.subject.keywordAuthorThreshold based-
Files in This Item
There are no files associated with this item.
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE