Developing of Algorithm of HTTP FLOOD DDoS Protection
One of most relevant cyberattacks are DDoS-attacks, purpose of which is failure (denial) of service by server. Its successful implementation limits, or ensures the inaccessibility of information system resources located on server, to all its users. The consequences of this attack can result in finan...
Saved in:
Published in: | 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) pp. 1 - 6 |
---|---|
Main Authors: | , , , , , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-03-2020
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | One of most relevant cyberattacks are DDoS-attacks, purpose of which is failure (denial) of service by server. Its successful implementation limits, or ensures the inaccessibility of information system resources located on server, to all its users. The consequences of this attack can result in financial losses for IS owner, as well as failure of hardware as a whole. Practical implementation of the method for detecting DDoS attacks at L7 level of OSI model - HTTP Flood if offered. This method is based on mathematical model that reproduces the interaction of clients with the server. It takes into account the individual characteristics of parameters describing operation of network and server, which affects to the possibility of more effective attack detection. Authors' development offers the software implementation of this procedure as extension module to reflect large number of non- valid requests from attacking side of HTTP_Flood_reject. Such solution realization is aimed to protect critical resources of commercial organizations and natural persons to provide service from DDos-type attacks. |
---|---|
DOI: | 10.1109/ICCAIS48893.2020.9096870 |