Developing of Algorithm of HTTP FLOOD DDoS Protection

One of most relevant cyberattacks are DDoS-attacks, purpose of which is failure (denial) of service by server. Its successful implementation limits, or ensures the inaccessibility of information system resources located on server, to all its users. The consequences of this attack can result in finan...

Full description

Saved in:
Bibliographic Details
Published in:2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) pp. 1 - 6
Main Authors: Razumov, Pavel V., Safaryan, Olga A., Smirnov, Ivan A., Porksheyan, Vitaliy M., Boldyrikhin, Nickolay V., Korochentsev, Denis A., Cherckesova, Larissa V., Osikov, Sergey A.
Format: Conference Proceeding
Language:English
Published: IEEE 01-03-2020
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:One of most relevant cyberattacks are DDoS-attacks, purpose of which is failure (denial) of service by server. Its successful implementation limits, or ensures the inaccessibility of information system resources located on server, to all its users. The consequences of this attack can result in financial losses for IS owner, as well as failure of hardware as a whole. Practical implementation of the method for detecting DDoS attacks at L7 level of OSI model - HTTP Flood if offered. This method is based on mathematical model that reproduces the interaction of clients with the server. It takes into account the individual characteristics of parameters describing operation of network and server, which affects to the possibility of more effective attack detection. Authors' development offers the software implementation of this procedure as extension module to reflect large number of non- valid requests from attacking side of HTTP_Flood_reject. Such solution realization is aimed to protect critical resources of commercial organizations and natural persons to provide service from DDos-type attacks.
DOI:10.1109/ICCAIS48893.2020.9096870