Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4568
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSood, Shauryaen_US
dc.contributor.authorHubballi, Neminathen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:34:51Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:34:51Z-
dc.date.issued2021-
dc.identifier.citationSood, S., Saikia, M., & Hubballi, N. (2021). WiP: Slow rate HTTP attack detection with Behavioral parameters doi:10.1007/978-3-030-92571-0_2en_US
dc.identifier.isbn9783030925703-
dc.identifier.issn0302-9743-
dc.identifier.otherEID(2-s2.0-85122014067)-
dc.identifier.urihttps://doi.org/10.1007/978-3-030-92571-0_2-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4568-
dc.description.abstractHypertext Transfer Protocol (HTTP) is vulnerable to slow rate Denial of Service (DoS) attacks. Here an adversary deliberately reads and sends data slowly thereby prolonging the connection duration. Multiple such slow connections will cripple the web server and prevent servicing legitimate requests. The simplest detection methods which use x number of malicious requests in y window period can be easily evaded. In this paper, we identify few behavioral parameters whose values change when such attacks are launched. We also identify the relationship between these parameters by estimating the correlation between them. Using these parameters and their correlation, we describe a detection method. In this detection method, evaluation is done based on the number of messages sent to prolong the connection. A very high number of such messages is a direct indication of an attack. When the number of such messages are in a range below this threshold, such intervals are verified with other behavioral parameters for detecting attacks. This two stage detection method will make the evasion harder for an adversary. We evaluate the proposed method with experiments done in a testbed and a live web sever and show that it has good detection performance. © 2021, Springer Nature Switzerland AG.en_US
dc.language.isoenen_US
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.sourceLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.subjectDenial-of-service attacken_US
dc.subjectHypertext systemsen_US
dc.subjectApplication layer attacken_US
dc.subjectApplication layersen_US
dc.subjectAttack detectionen_US
dc.subjectBehavioral parametersen_US
dc.subjectDenial of Serviceen_US
dc.subjectDenialof- service attacksen_US
dc.subjectDetection methodsen_US
dc.subjectProtocol attacksen_US
dc.subjectSlow rate denial of serviceen_US
dc.subjectWeb serversen_US
dc.subjectHTTPen_US
dc.titleWiP: Slow Rate HTTP Attack Detection with Behavioral Parametersen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: