Application Layer Distributed Denial of Service Attacks Defense Techniques : A review
Currently distributed denial of service (DDoS) is the most sever attack that effect on the internet convenience. The main goal of these attacks is to prevent normal users from accessing the internet services such as web servers. However the more challenge and difficult types to detect is application layer DDoS attacks because of using legitimate client to create connection with victims. In this paper we give a review on application layer DDoS attacks defense or detection mechanisms. Furthermore, we summarize several experimental approaches on detection techniques of application layer DDoS attacks. The main goal of this paper is to get a clear view and detailed summary of the recent algorithms, methods and techniques presented to tackle these serious types of attacks.
2. Prasad, K.M., A.R.M. Reddy, and K.V. Rao,(2017), BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web. Journal of King Saud University-Computer and Information Sciences.
3. Kalkan, K., G. Gür, and F. Alagöz, (2016), Filtering-based defense mechanisms against DDoS attacks: A survey. IEEE Systems Journal.
4. Rajkumar, M.N., (2013), A survey on latest DoS attacks: classification and defense mechanisms. International Journal of Innovative Research in Computer and Communication Engineering 1(8): p. 1847-1860.
5. Coulouris, G.F., J. Dollimore, and T. Kindberg, (2005), Distributed systems: concepts and design: pearson education.
6. Kumar, V. and K. Kumar. (2016), Classification of DDoS attack tools and its handling techniques and strategy at application layer. in Advances in Computing, Communication, & Automation (ICACCA)(Fall), International Conference on, IEEE.
7. Deshmukh, R.V. and K.K. Devadkar, (2015), Understanding DDoS attack & its effect in cloud environment. Procedia Computer Science 49: p. 202-210.
8. Zhang, H., et al. SENTRY, (2016) : A Novel Approach for Mitigating Application Layer DDoS Threats. in Trustcom/BigDataSE/I SPA, 2016 IEEE, IEEE.
9. Talpur, S.R. and T. Kechadi. (2016) ,A survey on DDoS attacks: Router-based threats and defense mechanism in real-world data centers. in Future Technologies Conference (FTC), IEEE.
10. Ni, T., et al. , (2013), Real-time detection of application-layer DDoS attack using time series analysis. Journal of Control Science and Engineering 2013: p. 4.
11. Singh, B., K. Kumar, and A. Bhandari, (2015), Simulation study of application layer DDoS attack. in Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on IEEE.
12. Meng, B., et al, (2017), DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer. in Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), 2017 IEEE International Conference on, IEEE.
13. Indraneel, S. and V.P.K. Vuppala, (2017), HTTP Flood attack Detection in Application Layer using Machine learning metrics and Bio inspired Bat algorithm. Applied Computing and Informatics.
14. Zolotukhin, M., et al, (2016), Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic. in Telecommunications (ICT), 2016 23rd International Conference on, IEEE.
15. Xu, C., et al, (2014), Detection on application layer DDoS using random walk model. in Communications (ICC), 2014 IEEE International Conference on, IEEE.
16. Sivabalan, S. and P. Radcliffe, (2013), A novel framework to detect and block DDoS attack at the application layer. in TENCON Spring Conference, 2013 IEEE, IEEE.
17. Shtern, M., et al. Towards mitigation of low and slow application ddos attacks. in Cloud Engineering (IC2E), 2014 IEEE International Conference on. 2014. IEEE.
18. Zhou, W., et al., (2014), Detection and defense of application-layer DDoS attacks in backbone web traffic. Future Generation Computer Systems, 38: p. 36-46.
19. Yadav, S. and S. Subramanian, (2016), Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder. in Computational Techniques in Information and Communication Technologies (ICCTICT), 2016 International Conference on, , IEEE.
20. Beitollahi, H. and G. (2012), Deconinck, Tackling application-layer DDoS attacks. Procedia Computer Science, 10: p. 432-441.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-ND 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
AJNU is committed to protecting the privacy of the users of this journal website. The names, personal particulars and e-mail addresses entered in this website will be used only for the stated purposes of this journal and will not be made available to third parties without the user's permission or due process. Users consent to receive communication from the AJNU for the stated purposes of the journal. Queries with regard to privacy may be directed to firstname.lastname@example.org.