• DocumentCode
    232184
  • Title

    Feature extraction and construction of application layer DDoS attack based on user behavior

  • Author

    Liao Qin ; Li Hong ; Kang Songlin ; Liu Chuchu

  • Author_Institution
    Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
  • fYear
    2014
  • fDate
    28-30 July 2014
  • Firstpage
    5492
  • Lastpage
    5497
  • Abstract
    Distributed Denial of Service (DDoS) has been one of the greatest threats to network security for years. In recent years, DDoS attackers turn to application layer, which makes DDoS attack detection systems based on net layer and transport layer lost their performance. In this layer, Web service is the most vulnerable application. The study in this paper analyzed the differentiation between user behavior based on web log, as we proposed a series of features based on user behavior to represent characteristics of user behavior, and then, transformed web logs which contain authentic legal users´ records and attackers´ records to an 14 dimensional feature space. In particular, through the transformation, our work aims to obtain a better representation for users´ behaviors, as well as to investigate the relative differences and/or similarities between DDoS attackers and normal users. Finally, we simulated four kinds of prevalent application layer DDoS attack and conducted experiments using three classical data mining classification algorithms to certify the effectiveness of our method. Experimental results show that proposed features are good to distinguish legal users and attackers in application layer.
  • Keywords
    Internet; Web services; computer network security; data mining; feature extraction; pattern classification; 14 dimensional feature space; Web log; Web service; application layer DDoS attack detection systems; attacker records; authentic legal user records; data mining classification algorithms; distributed denial of service attack; feature extraction; net layer; network security; transport layer; user behavior representation; Accuracy; Computer crime; Feature extraction; Information filtering; Internet; Servers; DDoS; feature extraction; user behavior;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Control Conference (CCC), 2014 33rd Chinese
  • Conference_Location
    Nanjing
  • Type

    conf

  • DOI
    10.1109/ChiCC.2014.6895878
  • Filename
    6895878