DocumentCode
232184
Title
Feature extraction and construction of application layer DDoS attack based on user behavior
Author
Liao Qin ; Li Hong ; Kang Songlin ; Liu Chuchu
Author_Institution
Sch. of Inf. Sci. & Eng., Central South Univ., Changsha, China
fYear
2014
fDate
28-30 July 2014
Firstpage
5492
Lastpage
5497
Abstract
Distributed Denial of Service (DDoS) has been one of the greatest threats to network security for years. In recent years, DDoS attackers turn to application layer, which makes DDoS attack detection systems based on net layer and transport layer lost their performance. In this layer, Web service is the most vulnerable application. The study in this paper analyzed the differentiation between user behavior based on web log, as we proposed a series of features based on user behavior to represent characteristics of user behavior, and then, transformed web logs which contain authentic legal users´ records and attackers´ records to an 14 dimensional feature space. In particular, through the transformation, our work aims to obtain a better representation for users´ behaviors, as well as to investigate the relative differences and/or similarities between DDoS attackers and normal users. Finally, we simulated four kinds of prevalent application layer DDoS attack and conducted experiments using three classical data mining classification algorithms to certify the effectiveness of our method. Experimental results show that proposed features are good to distinguish legal users and attackers in application layer.
Keywords
Internet; Web services; computer network security; data mining; feature extraction; pattern classification; 14 dimensional feature space; Web log; Web service; application layer DDoS attack detection systems; attacker records; authentic legal user records; data mining classification algorithms; distributed denial of service attack; feature extraction; net layer; network security; transport layer; user behavior representation; Accuracy; Computer crime; Feature extraction; Information filtering; Internet; Servers; DDoS; feature extraction; user behavior;
fLanguage
English
Publisher
ieee
Conference_Titel
Control Conference (CCC), 2014 33rd Chinese
Conference_Location
Nanjing
Type
conf
DOI
10.1109/ChiCC.2014.6895878
Filename
6895878
Link To Document