scispace - formally typeset
Proceedings ArticleDOI

Detection Methods of Slow Read DoS Using Full Packet Capture Data

TLDR
This paper uses Full Packet Capture (FPC) datasets for detecting Slow Read DoS attacks with machine learning methods and demonstrates that FPC features are discriminative enough to detect such attacks.
Abstract
Detecting Denial of Service (DoS) attacks on web servers has become extremely popular with cybercriminals and organized crime groups. A successful DoS attack on network resources reduces availability of service to a web site and backend resources, and could easily result in a loss of millions of dollars in revenue depending on company size. There are many DoS attack methods, each of which is critical to providing an understanding of the nature of the DoS attack class. There has been a rise in recent years of application-layer DoS attack methods that target web servers and are challenging to detect. An attack may be disguised to look like legitimate traffic, except it targets specific application packets or functions. Slow Read DoS attack is one type of slow HTTP attack targeting the application-layer. Slow Read attacks are often used to exploit weaknesses in the HTTP protocol, as it is the most widely used protocol on the Internet. In this paper, we use Full Packet Capture (FPC) datasets for detecting Slow Read DoS attacks with machine learning methods. All data collected originates in a live network environment. Our approach produces FPC features taken from network packets at the IP and TCP layers. Experimental results show that the machine learners were quite successful in identifying the Slow Read attacks with high detection and low false alarm rates using FPC data. Our experiment evaluates FPC datasets to determine the accuracy and efficiency of several detection models for Slow Read attacks. The experiment demonstrates that FPC features are discriminative enough to detect such attacks.

read more

Citations
More filters
Journal ArticleDOI

An approach to application-layer DoS detection

TL;DR: In this paper , the authors proposed a generalized detection approach to identify features for application-layer DoS attacks that is not specific to a single slow DoS attack, and combine four application layer attack datasets: Slow Read, HTTP POST, Slowloris, and Apache Range Header.
Proceedings ArticleDOI

HTTP Low and Slow DoS Attack Detection using LSTM based deep learning

TL;DR: In this paper , an LSTM deep learning-based approach was proposed for detecting low and slow DoS attacks, which achieved an impressive accuracy of 0.99 on the CIC DoS dataset and a synthetically generated dataset.
Journal ArticleDOI

Attack Behavior Approach in Slow HTTP DoS Detection

TL;DR: In this paper , TCP/IP packet analyzed, and behavior based to detect Slow HTTP DoS attack is proposed. But its detection is complicated and many detections analysis and studies have been conducted.
References
More filters
Book

Data Mining: Practical Machine Learning Tools and Techniques

TL;DR: This highly anticipated third edition of the most acclaimed work on data mining and machine learning will teach you everything you need to know about preparing inputs, interpreting outputs, evaluating results, and the algorithmic methods at the heart of successful data mining.
Journal ArticleDOI

The WEKA data mining software: an update

TL;DR: This paper provides an introduction to the WEKA workbench, reviews the history of the project, and, in light of the recent 3.6 stable release, briefly discusses what has been added since the last stable version (Weka 3.4) released in 2003.
Posted ContentDOI

A Reliable Communication Framework and Its Use in Internet of Things (IoT)

TL;DR: The author represents a framework to deal with reliability issues to enable the adoption of IoT devices and finds the improvement in reliability.
Book

Applied Network Security Monitoring: Collection, Detection, and Analysis

Chris Sanders, +1 more
TL;DR: This book is about equipping you with the right tools for collecting the data you need, detecting malicious activity, and performing the analysis that will help you understand the nature of an intrusion.
Related Papers (5)