Behaviour Analysis of DDoS Attack and Its Detection
DOI:
https://doi.org/10.26438/ijcse/v6i5.139144Keywords:
DDOS (Distributed Denial of Service Attack), ODAM (One Dimensional Access Matrix), Layer 7, flash crowd, application layerAbstract
In recent times the internet is growing exponentially. Many important services and records are available on different websites of the government and as well as of private sectors. A valid user becomes irritated when websites become unavailable when needed. Human being accesses only those web pages in which they are interested in. Some flash crowd occurs on specific time or events. Attacker’s main aim is not to browse specific web pages of valid users’ interest but to fail the web server so that authentic users could not avail web services. The DDoS attack becomes difficult to detect when this attack imitates the behaviour of irritating and non-professional users. There is need to analyze the behaviour of sophisticated DDoS attacks using advanced tools of DDoS attack at Layer 7. This paper analyzes tool of DDoS attacks using their log records and checks behaviour of DDoS attacks and stores its pattern in ODAM (One Dimensional Access Matrix). It also proposes an efficient algorithm to detect DDoS attacks at the application layer.
References
R. Kroszner and J. Munn, “Federal Financial Institutions Examination Council” Distrib. denial Serv., no. 703, pp. 2–4, 2008.
S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly, “DDoS-shield: DDoS-resilient scheduling to counter application layer attacks” IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 26–39, 2009.
J. Yu, Z. Li, H. Chen, and X. Chen, “A detection and offense mechanism to defend against application layer DDoS attacks,” 3rd Int. Conf. Netw. Serv. 2007, 2007.
J. Yu, C. Fang, L. Lu, and Z. Li, “Mitigating application layer distributed denial of service attacks via effective trust management,” IET Commun., vol. 4, no. 16, pp. 1952–1962, 2010.
C. Ye, K. Zheng, and C. She, “Application layer DDoS detection using clustering analysis” Proc. 2012 2nd Int. Conf. Comput. Sci. Netw. Technol., pp. 1038–1041, 2012.
C. Ye and K. Zheng, “Detection of application layer distributed denial of service,” Proc. 2011 Int. Conf. Comput. Sci. Netw. Technol., pp. 310–314, 2011.
B. Meng, W. Andi, X. Jian, “DDOS Attack Detection System Based on Analysis of Users' Behaviours for Application Layer”, Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), 2017 IEEE International Conference on, pp. 596-599, July 2017.
M. M. Najafabadi, T. M. Khoshgoftaar, C. Calvert, C. Kemp ,“User Behaviour Anomaly Detection for Application Layer DDoS Attacks” , IEEE International Conference on Information Reuse and Integration (IRI), pp. 154-161, 2017.
Mahadev, V. Kumar, K. Kumar,“Classification of DDoS Attack Tool and Its Handling Techniques and Strategy at Application Layer", IEEE International Conference on Advances in Computing Communication and Automation (ICACCA), Oct 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
