User Behavior Anomaly Detection for Application Layer DDoS Attacks

被引:22
|
作者
Najafabadi, Maryam M. [1 ]
Khoshgoftaar, Taghi M. [1 ]
Calvert, Chad [1 ]
Kemp, Clifford [1 ]
机构
[1] Florida Atlantic Univ, Boca Raton, FL 33431 USA
来源
2017 IEEE 18TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI 2017) | 2017年
基金
美国国家科学基金会;
关键词
Application Layer DDoS Attacks; Anomaly Detection; PCA-subspace;
D O I
10.1109/IRI.2017.44
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks are a popular and inexpensive form of cyber attacks. Application layer DDoS attacks utilize legitimate application layer requests to overwhelm a web server. These attacks are a major threat to Internet applications and web services. The main goal of these attacks is to make the services unavailable to legitimate users by overwhelming the resources on a web server. They look valid in connection and protocol characteristics, which makes them difficult to detect. In this paper, we propose a detection method for the application layer DDoS attacks, which is based on user behavior anomaly detection. We extract instances of user behaviors requesting resources from HTTP web server logs. We apply the Principle Component Analysis (PCA) subspace anomaly detection method for the detection of anomalous behavior instances. Web server logs from a web server hosting a student resource portal were collected as experimental data. We also generated nine different HTTP DDoS attacks through penetration testing. Our performance results on the collected data show that using PCAsubspace anomaly detection on user behavior data can detect application layer DDoS attacks, even if they are trying to mimic a normal user's behavior at some level.
引用
收藏
页码:154 / 161
页数:8
相关论文
共 50 条
  • [1] Anomaly Detection for DDoS Attacks via Behavior Profiles Deviation Degree
    Liu, Yun
    Jiang, Siyu
    Huang, Jiuming
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3145 - 3150
  • [2] A review on statistical approaches for anomaly detection in DDoS attacks
    Nooribakhsh, Mahsa
    Mollamotalebi, Mahdi
    INFORMATION SECURITY JOURNAL, 2020, 29 (03): : 118 - 133
  • [3] A Review on Statistical Approaches for Anomaly Detection in DDoS Attacks
    Nooribakhsh, Mahsa
    Mollamotalebi, Mahdi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (06): : 13 - 26
  • [4] Anomaly Detection for DDoS Attacks Based on Gini Coefficient
    Liu, Yun
    Jiang, Siyu
    Huang, Jiuming
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED ICT AND EDUCATION, 2013, 33 : 649 - 654
  • [5] Tackling Application-layer DDoS Attacks
    Beitollahi, Hakem
    Deconinck, Geert
    ANT 2012 AND MOBIWIS 2012, 2012, 10 : 432 - 441
  • [6] Detection and defense of application-layer DDoS attacks in backbone web traffic
    Zhou, Wei
    Jia, Weijia
    Wen, Sheng
    Xiang, Yang
    Zhou, Wanlei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 38 : 36 - 46
  • [7] Exploring Realistic VANET Simulations for Anomaly Detection of DDoS Attacks
    Baharlouei, Hamideh
    Makanju, Adetokunbo
    Zincir-Heywood, Nur
    2022 IEEE 95TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-SPRING), 2022,
  • [8] A Novel Approach for Countering Application Layer DDoS Attacks
    Wang, Yadong
    Liu, Lianzhong
    Si, Chengxiang
    Sun, Bo
    2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 1814 - 1817
  • [9] DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks
    Ranjan, Supranamaya
    Swaminathan, Ram
    Uysal, Mustafa
    Nucci, Antonio
    Knightly, Edward
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (01) : 26 - 39
  • [10] SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks
    Wang, Chenxu
    Miu, Tony T. N.
    Luo, Xiapu
    Wang, Jinhe
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) : 559 - 573