Mitigation of HTTP-GET flood Attack
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 11
Abstract
An HTTP GET flood is a volumetric attack that does not use malformed packets, spoofing or reflection techniques. HTTP flood attacks may be one of the most advanced non-vulnerability threats facing web servers today. It is very hard for network security devices to distinguish between legitimate HTTP traffic and malicious HTTP traffic, and if not handled correctly, it could cause a high number of false-positive detections. Rate-based detection engines are also not successful at detecting HTTP flood attacks, as the traffic volume of HTTP floods may be under detection thresholds. Because of this, it is necessary to use several parameters detection including rate-based and rate-invariant. Denial of Service attacks to web services is called HTTPGET flood attack and threats of them increase day by day. In this type of attacks, malicious clients send a large number of HTTP-GET requests to the target web server automatically. Since these HTTP-GET requests have legitimate formats and are sent via normal TCP connections, an intrusion detection system (IDS) cannot detect them. In this paper, we propose mitigation techniques of HTTP-GET flood based on log file.
Authors and Affiliations
Hally Khatri, Akanksha Gupta, Dheeraj Pal
Hand: Health Analysis using Nadi Detection – A Pervasive Approach
In modern world the chronic diseases like cancer and its types, diabetes, obesity, heart strokes etc are much dependent on surgical treatments where the analysis is done only after scanning the body, X-rays or through t...
High Speed Reconfigurable Accelerator for Word Matching Stage of Blast In
BLAST (basic local alignment search tool) is one of the most popular sequence analysis tools used by molecular biologists. It is designed to efficiently find similar regions between two sequences that have biological si...
The ancillary reactive power service pricing in a Deregulated electricity market
The amount of real power that can be transferred in a power system depends on the reactive power/voltage support. Appropriate management of reactive power is indispensable for supporting power system reliability and sec...
Performance analysis of OADM based DWDM System
The Dense Wavelength Division Multiplexing (DWDM) system based on Optical Add-Drop Multiplexer (OADM) is presented. The effect of Loss on Q factor and BER for different fiber lengths is analyzed. Also the effect of Bit...
A Survey Paper on Phishing Attacks with New Unsupervised Learning Model
Phishing attacks are very sensitive issue now days as we are in the world of connectivity that is internet. More the internet user more the attackers are in existence. Every email or any type of personal communication r...