User Behavior Anomaly Detection for Application Layer DDoS Attacks

被引:22
|
作者
Najafabadi, Maryam M. [1 ]
Khoshgoftaar, Taghi M. [1 ]
Calvert, Chad [1 ]
Kemp, Clifford [1 ]
机构
[1] Florida Atlantic Univ, Boca Raton, FL 33431 USA
来源
2017 IEEE 18TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI 2017) | 2017年
基金
美国国家科学基金会;
关键词
Application Layer DDoS Attacks; Anomaly Detection; PCA-subspace;
D O I
10.1109/IRI.2017.44
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed Denial of Service (DDoS) attacks are a popular and inexpensive form of cyber attacks. Application layer DDoS attacks utilize legitimate application layer requests to overwhelm a web server. These attacks are a major threat to Internet applications and web services. The main goal of these attacks is to make the services unavailable to legitimate users by overwhelming the resources on a web server. They look valid in connection and protocol characteristics, which makes them difficult to detect. In this paper, we propose a detection method for the application layer DDoS attacks, which is based on user behavior anomaly detection. We extract instances of user behaviors requesting resources from HTTP web server logs. We apply the Principle Component Analysis (PCA) subspace anomaly detection method for the detection of anomalous behavior instances. Web server logs from a web server hosting a student resource portal were collected as experimental data. We also generated nine different HTTP DDoS attacks through penetration testing. Our performance results on the collected data show that using PCAsubspace anomaly detection on user behavior data can detect application layer DDoS attacks, even if they are trying to mimic a normal user's behavior at some level.
引用
收藏
页码:154 / 161
页数:8
相关论文
共 50 条
  • [21] Application of Anomaly Detection for Detecting Anomalous Records of Terroris Attacks
    Meng, Xi
    Zhao, Shenhe
    Mo, Haowen
    Li, Jianqiang
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 70 - 75
  • [22] A Flow-Based Anomaly Detection Approach With Feature Selection Method Against DDoS Attacks in SDNs
    El Sayed, Mahmoud Said
    Le-Khac, Nhien-An
    Azer, Marianne A.
    Jurcut, Anca D.
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (04) : 1862 - 1880
  • [23] Detecting zero-day attacks using context-aware anomaly detection at the application-layer
    Duessel, Patrick
    Gehl, Christian
    Flegel, Ulrich
    Dietrich, Sven
    Meier, Michael
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (05) : 475 - 490
  • [24] Detecting zero-day attacks using context-aware anomaly detection at the application-layer
    Patrick Duessel
    Christian Gehl
    Ulrich Flegel
    Sven Dietrich
    Michael Meier
    International Journal of Information Security, 2017, 16 : 475 - 490
  • [25] A methodology to detect temporal regularities in user behavior for anomaly detection
    Seleznyov, A
    TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 339 - 352
  • [26] An anomaly intrusion detection method by clustering normal user behavior
    Oh, SH
    Lee, WS
    COMPUTERS & SECURITY, 2003, 22 (07) : 596 - 612
  • [27] Contextual Sequence-Based User Behavior Anomaly Detection
    Gonzales, Omar
    Yang, Kwangsoo
    Huang, Shihong
    IEEE ACCESS, 2025, 13 : 35539 - 35554
  • [28] DDoS Attacks Detection by Means of Statistical Models
    Andrysiak, Tomasz
    Saganowski, Lukasz
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER RECOGNITION SYSTEMS, CORES 2015, 2016, 403 : 797 - 806
  • [29] An anomaly detection model of user behavior based on similarity clustering
    Hu, Shuai
    Xiao, Zhihua
    Rao, Qiang
    Liao, Rongtao
    PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), 2018, : 835 - 838
  • [30] Traffic Anomaly Detection in DDos Flooding Attack
    Purwanto, Yudha
    Hendrawan, Kuspriyanto
    Rahardjo, Budi
    2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,