Proceedings of the 2014 International Conference on Mechatronics, Electronic, Industrial and Control Engineering

Principal Analysis and Defense Technologies of Application Layer DDos Attacks

Authors
Shouliang Lai, Meiyan Wang
Corresponding Author
Shouliang Lai
Available Online November 2014.
DOI
10.2991/meic-14.2014.127How to use a DOI?
Keywords
application layer; DDos attack; analysis; defense; internet
Abstract

With DDoS attack detection underlying technology continues to mature and improve more and more application-layer DDoS attack. Due to the complexity of the application layer protocols, application-layer DDoS attack is subtler and more destructive, more difficult to detect. Flow characteristics of the network traffic characteristics and access through the application layer DDoS attack in normal user, the request is using by a fixed time interval within the time window as a feature and page. Through normal user and boot access exhibit some different characteristics of the session clustering analysis to detect the attack, after experiments show that the detection algorithm has better detection performance. A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. The approach with the traditional alignment Net-DDoS attack planned divergent samples is belonging to a network level, and therefore, and it can be used as necessary to fill the existing DDoS protection systems in high-rise for the Web service of supplied security guarantees.

Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2014 International Conference on Mechatronics, Electronic, Industrial and Control Engineering
Series
Advances in Engineering Research
Publication Date
November 2014
ISBN
10.2991/meic-14.2014.127
ISSN
2352-5401
DOI
10.2991/meic-14.2014.127How to use a DOI?
Copyright
© 2014, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Shouliang Lai
AU  - Meiyan Wang
PY  - 2014/11
DA  - 2014/11
TI  - Principal Analysis and Defense Technologies of Application Layer DDos Attacks
BT  - Proceedings of the 2014 International Conference on Mechatronics, Electronic, Industrial and Control Engineering
PB  - Atlantis Press
SP  - 564
EP  - 568
SN  - 2352-5401
UR  - https://doi.org/10.2991/meic-14.2014.127
DO  - 10.2991/meic-14.2014.127
ID  - Lai2014/11
ER  -