Behaviour Analysis of DDoS Attack and Its Detection

Authors

  • Mahadev Dept. of Computer Science, Gurukula Kangri Vishwavidyalaya, Haridwar, India
  • Kumar V Dept. of Computer Science, Gurukula Kangri Vishwavidyalaya, Haridwar, India

DOI:

https://doi.org/10.26438/ijcse/v6i5.139144

Keywords:

DDOS (Distributed Denial of Service Attack), ODAM (One Dimensional Access Matrix), Layer 7, flash crowd, application layer

Abstract

In recent times the internet is growing exponentially. Many important services and records are available on different websites of the government and as well as of private sectors. A valid user becomes irritated when websites become unavailable when needed. Human being accesses only those web pages in which they are interested in. Some flash crowd occurs on specific time or events. Attacker’s main aim is not to browse specific web pages of valid users’ interest but to fail the web server so that authentic users could not avail web services. The DDoS attack becomes difficult to detect when this attack imitates the behaviour of irritating and non-professional users. There is need to analyze the behaviour of sophisticated DDoS attacks using advanced tools of DDoS attack at Layer 7. This paper analyzes tool of DDoS attacks using their log records and checks behaviour of DDoS attacks and stores its pattern in ODAM (One Dimensional Access Matrix). It also proposes an efficient algorithm to detect DDoS attacks at the application layer.

References

R. Kroszner and J. Munn, “Federal Financial Institutions Examination Council” Distrib. denial Serv., no. 703, pp. 2–4, 2008.

S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, “DDoS-shield: DDoS-resilient scheduling to counter application layer attacks” IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 26–39, 2009.

J. Yu, Z. Li, H. Chen, and X. Chen, “A detection and offense mechanism to defend against application layer DDoS attacks,” 3rd Int. Conf. Netw. Serv. 2007, 2007.

J. Yu, C. Fang, L. Lu, and Z. Li, “Mitigating application layer distributed denial of service attacks via effective trust management,” IET Commun., vol. 4, no. 16, pp. 1952–1962, 2010.

C. Ye, K. Zheng, and C. She, “Application layer DDoS detection using clustering analysis” Proc. 2012 2nd Int. Conf. Comput. Sci. Netw. Technol., pp. 1038–1041, 2012.

C. Ye and K. Zheng, “Detection of application layer distributed denial of service,” Proc. 2011 Int. Conf. Comput. Sci. Netw. Technol., pp. 310–314, 2011.

B. Meng, W. Andi, X. Jian, “DDOS Attack Detection System Based on Analysis of Users' Behaviours for Application Layer”, Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), 2017 IEEE International Conference on, pp. 596-599, July 2017.

M. M. Najafabadi, T. M. Khoshgoftaar, C. Calvert, C. Kemp ,“User Behaviour Anomaly Detection for Application Layer DDoS Attacks” , IEEE International Conference on Information Reuse and Integration (IRI), pp. 154-161, 2017.

Mahadev, V. Kumar, K. Kumar,“Classification of DDoS Attack Tool and Its Handling Techniques and Strategy at Application Layer", IEEE International Conference on Advances in Computing Communication and Automation (ICACCA), Oct 2016.

Downloads

Published

2025-11-13
CITATION
DOI: 10.26438/ijcse/v6i5.139144
Published: 2025-11-13

How to Cite

[1]
Mahadev and V. Kumar, “Behaviour Analysis of DDoS Attack and Its Detection”, Int. J. Comp. Sci. Eng., vol. 6, no. 5, pp. 139–144, Nov. 2025.

Issue

Section

Research Article