Skip to main content

2016 | OriginalPaper | Buchkapitel

Identifying HTTP DDoS Attacks Using Self Organizing Map and Fuzzy Logic in Internet Based Environments

verfasst von : T Raja Sree, S Mary Saira Bhanu

Erschienen in: Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The increasing usage of internet resources may lead to more cyber crimes in the network domain. Among the various kinds of attacks, HTTP flooding is one of the major threats to uninterrupted and efficient internet services that depletes the application layer. It is hard to find out the traces of this attack because the attacker deletes all possible traces in the network. Thus, the only possible way to find the attack is from the trace log file located in the server. This paper proposes a method using Self Organizing Map (SOM) and fuzzy association rule mining to identify the attack. SOM is used to isolate the unknown patterns and to identify the suspicious source. The attacks are identified using fuzzy association rule mining. The statistical test has been carried out to measure the significance of features to identify the legitimate or intrusive behavior.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Sebyala, A.A., Olukemi, T., Sacks, L., Sacks, D.L.: Active platform security through intrusion detection using naive bayesian network for anomaly detection. In: International Symposium on Communications, pp. 1–5. London (2002) Sebyala, A.A., Olukemi, T., Sacks, L., Sacks, D.L.: Active platform security through intrusion detection using naive bayesian network for anomaly detection. In: International Symposium on Communications, pp. 1–5. London (2002)
3.
Zurück zum Zitat Oh, H., Chae, K.: Real-time intrusion detection system based on self-organized maps and feature correlations. In: 3rd International Conference on Convergence and Hybrid Information Technology ICCIT’08, vol. 2, pp. 1154–1158. IEEE Press, (2008) Oh, H., Chae, K.: Real-time intrusion detection system based on self-organized maps and feature correlations. In: 3rd International Conference on Convergence and Hybrid Information Technology ICCIT’08, vol. 2, pp. 1154–1158. IEEE Press, (2008)
4.
Zurück zum Zitat Konar, A., Joshi, R.C.: An efficient intrusion detection system using clustering combined with fuzzy logic. In: Ranka, S., Banerjee, A., Biswas, K., Dua, S., Mishra, P., Moona, R., Poon, S.H., Wang, C.-L. (eds.) Contemporary Computing 2010, LNCS, vol. 94, pp. 218–228. Springer, Heidelberg (2010) Konar, A., Joshi, R.C.: An efficient intrusion detection system using clustering combined with fuzzy logic. In: Ranka, S., Banerjee, A., Biswas, K., Dua, S., Mishra, P., Moona, R., Poon, S.H., Wang, C.-L. (eds.) Contemporary Computing 2010, LNCS, vol. 94, pp. 218–228. Springer, Heidelberg (2010)
5.
Zurück zum Zitat Byers, S., Rubin, A.D., Kormann, D.: Defending against an Internet-based attack on the physical world. ACM Trans. Internet Technol. (TOIT) 4(3), 239–254 (2004)CrossRef Byers, S., Rubin, A.D., Kormann, D.: Defending against an Internet-based attack on the physical world. ACM Trans. Internet Technol. (TOIT) 4(3), 239–254 (2004)CrossRef
6.
Zurück zum Zitat Beitollahi, H., Deconinck, G.: Analyzing well-known countermeasures against distributed denial of service attacks. J. Comput. Commun. 35, 1312–1332 (2012)CrossRef Beitollahi, H., Deconinck, G.: Analyzing well-known countermeasures against distributed denial of service attacks. J. Comput. Commun. 35, 1312–1332 (2012)CrossRef
7.
Zurück zum Zitat Bhuyan, M.H., Kashyap, H.J., Bhattacharyya, D.K., Kalita, J.K.: Detecting distributed denial of service attacks: methods, tools and future directions. J. Comput. 57, 537–556 (2014)CrossRef Bhuyan, M.H., Kashyap, H.J., Bhattacharyya, D.K., Kalita, J.K.: Detecting distributed denial of service attacks: methods, tools and future directions. J. Comput. 57, 537–556 (2014)CrossRef
8.
Zurück zum Zitat Siaterlis, C., Maglaris, V.: Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics. In: 10th IEEE Symposium on Computers and Communications ISCC, pp. 469–475. IEEE Press (2005) Siaterlis, C., Maglaris, V.: Detecting incoming and outgoing DDoS attacks at the edge using a single set of network characteristics. In: 10th IEEE Symposium on Computers and Communications ISCC, pp. 469–475. IEEE Press (2005)
9.
Zurück zum Zitat HTTP flood Attacks Danger and Security, http://security.radware.com/knowledge-center/DDoSPedia/http-flood/ HTTP flood Attacks Danger and Security, http://​security.​radware.​com/​knowledge-center/​DDoSPedia/​http-flood/​
10.
Zurück zum Zitat Yatagai, T., Isohara, T., Sasase, I.: Detection of HTTP-GET flood attack based on analysis of page access behavior. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 232–235. IEEE Press (2007) Yatagai, T., Isohara, T., Sasase, I.: Detection of HTTP-GET flood attack based on analysis of page access behavior. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, pp. 232–235. IEEE Press (2007)
11.
Zurück zum Zitat Pabarskaite, Z.: Enhancements of preprocessing, analysis and preparation techniques in web log mining. Vilnius Technikes, Vilnius (2009) Pabarskaite, Z.: Enhancements of preprocessing, analysis and preparation techniques in web log mining. Vilnius Technikes, Vilnius (2009)
12.
14.
Zurück zum Zitat Dusan, S., Natalija, V., An, A.: Detection of malicious and non-malicious website visitors using unsupervised neural network learning. J. Appl. Soft Comput. 13, 698–708 (2013)CrossRef Dusan, S., Natalija, V., An, A.: Detection of malicious and non-malicious website visitors using unsupervised neural network learning. J. Appl. Soft Comput. 13, 698–708 (2013)CrossRef
15.
Zurück zum Zitat Liao, N.: Network forensics based on fuzzy logic and expert system. J. Comput. Commun. 32, 1881–1892 (2009)CrossRef Liao, N.: Network forensics based on fuzzy logic and expert system. J. Comput. Commun. 32, 1881–1892 (2009)CrossRef
17.
Zurück zum Zitat Ishibuchi, H., Yamamoto, T., Nakashima, T.: Determination of rule weights of fuzzy association rules. In: The 10th IEEE International Conference on Fuzzy Systems, vol. 3, pp. 1555–1558. IEEE Press (2001) Ishibuchi, H., Yamamoto, T., Nakashima, T.: Determination of rule weights of fuzzy association rules. In: The 10th IEEE International Conference on Fuzzy Systems, vol. 3, pp. 1555–1558. IEEE Press (2001)
19.
Zurück zum Zitat OWASP HTTP GET DDoS attack. www.exploiterz.blogspot.in/2013/07/owasp-http-getpost-ddos-attacker-tool.html OWASP HTTP GET DDoS attack. www.exploiterz.blogspot.in/2013/07/owasp-http-getpost-ddos-attacker-tool.html
21.
Zurück zum Zitat Gupta, S.C., Kapoor, V.K.: Elements of Mathematical Statistics, 3rd edn. (2003) Gupta, S.C., Kapoor, V.K.: Elements of Mathematical Statistics, 3rd edn. (2003)
Metadaten
Titel
Identifying HTTP DDoS Attacks Using Self Organizing Map and Fuzzy Logic in Internet Based Environments
verfasst von
T Raja Sree
S Mary Saira Bhanu
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2529-4_27