Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS

View through CrossRef
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools. Researchers have been able to develop several techniques to curb volumetric DDoS which overwhelms the target with a large number of request packets. However, compared to slow DDoS, limited number of research has been executed on mitigating slow DDoS. Attackers have resorted to slow DDoS because it mimics the behaviour of a slow legitimate client thereby causing service unavailability. This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3. Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. Results obtained showed that the classifier had detection accuracy, Area Under Receiver Operating Curve (AUC), true positive rate, false positive rate and a false negative rate of 99.89%, 99.89%, 99.95%, 0.18%, and 0.05% respectively. Also, the algorithm for subsequent implementation of the selective adaptive bubble burst mitigation mechanism was presented. This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.
Title: MITIGATING SLOW HYPERTEXT TRANSFER PROTOCOL DISTRIBUTED DENIAL OF SERVICE ATTACKS IN SOFTWARE DEFINED NETWORKS
Description:
Distributed Denial of Service (DDoS) attacks has been one of the persistent forms of attacks on information technology infrastructure connected to public networks due to the ease of access to DDoS attack tools.
Researchers have been able to develop several techniques to curb volumetric DDoS which overwhelms the target with a large number of request packets.
However, compared to slow DDoS, limited number of research has been executed on mitigating slow DDoS.
Attackers have resorted to slow DDoS because it mimics the behaviour of a slow legitimate client thereby causing service unavailability.
This paper provides the scholarly community with an approach to boosting service availability in web servers under slow Hypertext Transfer Protocol (HTTP) DDoS attacks through attack detection using Genetic Algorithm and Support Vector Machine which facilitates attack mitigation in a Software-Defined Networking (SDN) environment simulated in GNS3.
Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier.
Results obtained showed that the classifier had detection accuracy, Area Under Receiver Operating Curve (AUC), true positive rate, false positive rate and a false negative rate of 99.
89%, 99.
89%, 99.
95%, 0.
18%, and 0.
05% respectively.
Also, the algorithm for subsequent implementation of the selective adaptive bubble burst mitigation mechanism was presented.
This study contributes to the ongoing research in detecting and mitigating slow HTTP DDoS attacks with emphasis on the use of machine learning classification and meta-heuristic algorithms.

Related Results

The Historical Evolution and Future Prospects of Hypertext
The Historical Evolution and Future Prospects of Hypertext
Hypertext is a digital technology that has evolved significantly since its inception in the 1940s. The origins of hypertext can be traced back to Vannevar Bush’s concept of the “Me...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Breast Carcinoma within Fibroadenoma: A Systematic Review
Breast Carcinoma within Fibroadenoma: A Systematic Review
Abstract Introduction Fibroadenoma is the most common benign breast lesion; however, it carries a potential risk of malignant transformation. This systematic review provides an ove...
Authoring a hypertext database — Experiences with HyperPAD
Authoring a hypertext database — Experiences with HyperPAD
In a hypertext database, the information is presented as a network of nodes connected by links. Such nodes may be text, graphics, audio, video, and even other software. Although hy...
PENGEMBANGAN HYPERTEXT SAINS KEARIFAN LOKAL BALI BERBASIS DATABASE
PENGEMBANGAN HYPERTEXT SAINS KEARIFAN LOKAL BALI BERBASIS DATABASE
Penelitian dan pengembangan ini bertujuan menghasilkan hypertext wahana komunikasi sains kearifan lokal Bali (SKLB) yang efektif.  Penelitian tahun/ tahap kedua ini melakukan ident...
Mitigating DDoS Attacks in Cloud Networks
Mitigating DDoS Attacks in Cloud Networks
Distributed Denial of Service (DDoS) attacks represent a significant and growing threat to cloud networks, capable of causing extensive service disruptions and substantial financia...
The construction of hypertext documents and databases
The construction of hypertext documents and databases
The availability of powerful desktop microcomputers has meant that the ideas underlying hypertext can now be implemented in readily available software packages. However, despite th...

Back to Top