Mitigation of HTTP-GET flood Attack
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 11
Abstract
An HTTP GET flood is a volumetric attack that does not use malformed packets, spoofing or reflection techniques. HTTP flood attacks may be one of the most advanced non-vulnerability threats facing web servers today. It is very hard for network security devices to distinguish between legitimate HTTP traffic and malicious HTTP traffic, and if not handled correctly, it could cause a high number of false-positive detections. Rate-based detection engines are also not successful at detecting HTTP flood attacks, as the traffic volume of HTTP floods may be under detection thresholds. Because of this, it is necessary to use several parameters detection including rate-based and rate-invariant. Denial of Service attacks to web services is called HTTPGET flood attack and threats of them increase day by day. In this type of attacks, malicious clients send a large number of HTTP-GET requests to the target web server automatically. Since these HTTP-GET requests have legitimate formats and are sent via normal TCP connections, an intrusion detection system (IDS) cannot detect them. In this paper, we propose mitigation techniques of HTTP-GET flood based on log file.
Authors and Affiliations
Hally Khatri, Akanksha Gupta, Dheeraj Pal
Spatiotemporal Traffic Prediction using Semantic Traffic Analytics and Reasoning(STAR) With Big Data Environment
In Urban Mobility Report, delays due to heavy traffic costing Americans $78 billion in the form of 4.2 billion lost hours and 2.9 billion gallons of wasted fuel. In addition, 2/3 of traffic delays are caused not by recu...
Analysis of Contamination of Ground Water Due to Dump Yard: Case Study of Bhandewadi Dump Yard, Nagpur, India
In developing countries and modern cities, generation of waste is increasing day by day due to modernization in lifestyle of people. Proper collection of waste and its management, treatment and disposal is a measure con...
slugIntelligent Data Mining Techniques in Cancer Disease Pattern Detection
Technology plays a very crucial role for healthcare. Information technologies provides computerized patients records, computerized decision and support tools, computer based hospital information, telemedici...
Construction of control chart based on six sigma initiatives for Cumulative – Sum
A control chart is a statistical device used for the study and control of repetitive process. W.A. Shewhart [6] of Bell Telephone Laboratories suggested control charts based on the 3 sigma limits. Now the companies in d...
Denoising Of Speech Signals Using Wavelets
In this paper, we introduced two wavelet i.e. daubechies and symlet techniques for denoising purpose based upon rigrsure, heursure, minimaxi and sqtwolog threshold rules for speech signals.