Application layer DDoS detection using clustering analysis

被引:0
作者
Ye, Chengxu [1 ]
Zheng, Kesong [1 ]
She, Chuyu [1 ]
机构
[1] Qinghai Normal Univ, Sch Comp, Xining, Peoples R China
来源
PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012) | 2012年
关键词
application; ddos; cluster; browsing behavior;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many methods were designed in previous literatures to protect systems from IP and TCP layers distributed denial of service attacks instead of the application layer. However, they will not work well any more when encountering with application layer distributed denial of service. We will introduce clustering method to analysis application layer ddos in this paper. To capture users' browsing behavior, we cluster users' sessions. We consider bots' browsing behavior as abnormally behavior. That is, different from normal human behavior. We first extract four features from session to cluster users sessions-average size of objects requested in the session, request rate, average popularity of all objects in the session, average transition probability. Then, we use large amount of legitimate request sequence to get normal user browsing behavior models. Finally, conduct simulation experiments with attack dataset to validate the models.
引用
收藏
页码:1038 / 1041
页数:4
相关论文
共 13 条
[1]  
Borgatti S., 1994, Connections, V17, P78
[2]  
JIN C., 2003, CCS '03, P30
[3]  
Jung J., 2002, Proc. of the International World Wide Web Conference, P252
[4]  
Kantardzic M., 2002, DATA MINING CONCEPTS
[5]  
Lakhina Anukool, 2005, SIGCOMM 05 AUG 21 26
[6]  
Limwiwatkul L, 2004, IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2, P605
[7]   Attacking DDoS at the source [J].
Mirkovic, J ;
Prier, G ;
Reiher, P .
10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, :312-321
[8]  
Oikonomou G, 2009, P 3 INT C COMM DRESD, P14
[9]  
Park K., 2006, Proceedings of the annual conference on USENIX 06 Annual Technical Conference, P23
[10]  
Peng T, 2003, 2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, P482