An ontology approach for proactive detection of HTTP flood DoS attack

被引:3
作者
Kshirsagar, Deepak [1 ,2 ]
Kumar, Sandeep [1 ]
机构
[1] Indian Inst Technol Roorkee, Dept Comp Sci & Engn, Roorkee, Uttarakhand, India
[2] Coll Engn Pune, Dept Comp Engn & IT, Pune, Maharashtra, India
关键词
HTTP flood; Ontology; Semantic rule; Intrusion detection; SECURITY; CLASSIFICATION; COLLECTION;
D O I
10.1007/s13198-021-01170-3
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In the current digital era, the consumer uses web applications for banking, e-commerce, and sharing information with others. These web applications are suffered from different types of attacks. The hacker intelligently uses multiple attack vectors to generate attacks with the help of tools. Therefore, intelligent intrusion detection plays an essential role in security. This paper presents an ontology-based intrusion detection framework to detect Denial of Service (DoS) attacks at the application level. The system proposes the ontology model and semantic rule for the detection of an HTTP flood attack. The system is implemented and tested on the GoldenEye DoS dataset with the help of semantic rules. The system provides early detection of DoS attacks in two seconds and improved detection rate using a time winodw threshold mechanism in the semantic rule. The system also achieves a higher detection rate of 94.89% without threshold in semantic rule to detect DoS attack. Finally, the system is compared with related traditional DoS detection systems.
引用
收藏
页码:840 / 847
页数:8
相关论文
共 36 条
[1]  
Ajayi O, 2020, 2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), P100, DOI [10.1109/cscloud-edgecom49738.2020.00025, 10.1109/CSCloud-EdgeCom49738.2020.00025]
[2]   OSCIDS: An Ontology based SCADA Intrusion Detection Framework [J].
Al Balushi, Abdullah ;
McLaughlin, Kieran ;
Sezer, Sakir .
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, :327-335
[3]   OMAMIDS: Ontology Based Multi-AgentModel Intrusion Detection Systemfor DetectingWeb Service Attacks [J].
Anusha, K. ;
Sathiyamoorthy, E. .
JOURNAL OF APPLIED SECURITY RESEARCH, 2016, 11 (04) :489-508
[4]  
Arogundade OT, 2020, INT J ELECTRON SECUR, V12, P323
[5]  
Bist M, 2016, PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), P579, DOI 10.1109/NGCT.2016.7877481
[6]  
Bourekkache S., 2019, J DIGIT INFORM MANAG, V17, P133, DOI DOI 10.6025/JDIM/2019/17/3/133-144
[7]   Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic [J].
David, Jisa ;
Thomas, Ciza .
COMPUTERS & SECURITY, 2019, 82 :284-295
[8]   Security and service assurance issues in Cloud environment [J].
Deshpande P. ;
Sharma S.C. ;
Peddoju S.K. ;
Abraham A. .
International Journal of System Assurance Engineering and Management, 2018, 9 (1) :194-207
[9]  
Deshpande P, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), P632, DOI 10.1109/CCAA.2015.7148450
[10]   Ontology-based knowledge representation for malware individuals and families [J].
Ding, Yuxin ;
Wu, Rui ;
Zhang, Xiao .
COMPUTERS & SECURITY, 2019, 87