Identification of Asymmetric DDoS Attacks at Layer 7 with Idle Hyperlink
Asymmetric denial-of-service (DDoS) attacks have become very complicated to deal with because of the use of several Internet Protocol (IP) addresses in these types of attacks. The purpose of research is different strategies are used by an attacker to achieve the objective of forcing the unavailabili...
Saved in:
Published in | ECS transactions Vol. 107; no. 1; pp. 2171 - 2181 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
The Electrochemical Society, Inc
24.04.2022
|
Online Access | Get full text |
Cover
Loading…
Summary: | Asymmetric denial-of-service (DDoS) attacks have become very complicated to deal with because of the use of several Internet Protocol (IP) addresses in these types of attacks. The purpose of research is different strategies are used by an attacker to achieve the objective of forcing the unavailability of the targeted server. Sometimes the large size of the file is used with a higher transfer rate so that the targeted website could be hanged for a legitimate customer. The design of a novel mechanism, in the form of Dynamic Honey Link (DHL), to prevent identification by sophisticated DDoS attacking tools, the findings this developed here for the detection of asymmetric attacks. Parameters such as IP addresses, Time of Request, and difference of time between requests of IPs are used in this mechanism and are verified applying correlation coefficients and p-values. This new analysis of different website attacks using an analysis of dataset leads to inspection and identification of hyperlinks. |
---|---|
ISSN: | 1938-5862 1938-6737 |
DOI: | 10.1149/10701.2171ecst |