HTTP Application Layer DDoS Attack Mitigation Using Resources Monitor View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2018

AUTHORS

Mohamed Aly Mohamed , Nashwa Abdelbaki

ABSTRACT

Denial of Service attacks are one of the most annoying day to day challenges for any security expert and IT professional. This is according to the attack nature. It can be run against any kind of network resources, whether exposed to the Internet or internally in a corporate network, regardless of the type of service it provides and its role in the network. There is no one complete solution or unified framework method against this type of attack. The most dangerous type of DoS attack is the DDoS type. The attack flow from many sources at the same time. In the context of mitigation from DDoS attack, the detection mechanisms are the first step in the way. Mechanisms like IPS and firewall are not effective because of the current challenging DDOS attack methods against application layer. The attackers use vulnerability in the application itself to disrupt the service it provides. Current mitigation techniques depend on preventing the attack traffic from reaching web servers. In this paper we study http application layer DDoS attacks against web servers. We propose new approach for mitigation that depends on absorbing the attack effects on the web server and increases server’s resistance against DDoS attacks. More... »

PAGES

213-221

References to SciGraph publications

Book

TITLE

Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017

ISBN

978-3-319-64860-6
978-3-319-64861-3

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_20

DOI

http://dx.doi.org/10.1007/978-3-319-64861-3_20

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1091403037


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Nile University", 
          "id": "https://www.grid.ac/institutes/grid.440877.8", 
          "name": [
            "Nile University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mohamed", 
        "givenName": "Mohamed Aly", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Nile University", 
          "id": "https://www.grid.ac/institutes/grid.440877.8", 
          "name": [
            "Nile University"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Abdelbaki", 
        "givenName": "Nashwa", 
        "id": "sg:person.010062432325.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010062432325.70"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/s10586-015-0528-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1010664539", 
          "https://doi.org/10.1007/s10586-015-0528-7"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10994-016-5581-9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1013750322", 
          "https://doi.org/10.1007/s10994-016-5581-9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10994-016-5581-9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1013750322", 
          "https://doi.org/10.1007/s10994-016-5581-9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00542-016-2978-0", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020316127", 
          "https://doi.org/10.1007/s00542-016-2978-0"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-642-35416-8_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1028640044", 
          "https://doi.org/10.1007/978-3-642-35416-8_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.comnet.2010.05.002", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1029599983"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-81-322-2550-8_41", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1037743296", 
          "https://doi.org/10.1007/978-81-322-2550-8_41"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s12652-013-0196-5", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1051725491", 
          "https://doi.org/10.1007/s12652-013-0196-5"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-319-13461-1_15", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1052346600", 
          "https://doi.org/10.1007/978-3-319-13461-1_15"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.7763/ijcee.2013.v5.771", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1074032361"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2018", 
    "datePublishedReg": "2018-01-01", 
    "description": "Denial of Service attacks are one of the most annoying day to day challenges for any security expert and IT professional. This is according to the attack nature. It can be run against any kind of network resources, whether exposed to the Internet or internally in a corporate network, regardless of the type of service it provides and its role in the network. There is no one complete solution or unified framework method against this type of attack. The most dangerous type of DoS attack is the DDoS type. The attack flow from many sources at the same time. In the context of mitigation from DDoS attack, the detection mechanisms are the first step in the way. Mechanisms like IPS and firewall are not effective because of the current challenging DDOS attack methods against application layer. The attackers use vulnerability in the application itself to disrupt the service it provides. Current mitigation techniques depend on preventing the attack traffic from reaching web servers. In this paper we study http application layer DDoS attacks against web servers. We propose new approach for mitigation that depends on absorbing the attack effects on the web server and increases server\u2019s resistance against DDoS attacks.", 
    "editor": [
      {
        "familyName": "Hassanien", 
        "givenName": "Aboul Ella", 
        "type": "Person"
      }, 
      {
        "familyName": "Shaalan", 
        "givenName": "Khaled", 
        "type": "Person"
      }, 
      {
        "familyName": "Gaber", 
        "givenName": "Tarek", 
        "type": "Person"
      }, 
      {
        "familyName": "Tolba", 
        "givenName": "Mohamed F.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-64861-3_20", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-64860-6", 
        "978-3-319-64861-3"
      ], 
      "name": "Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017", 
      "type": "Book"
    }, 
    "name": "HTTP Application Layer DDoS Attack Mitigation Using Resources Monitor", 
    "pagination": "213-221", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-64861-3_20"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "391c38575bb8597fec796824c0e7fd30a03eab4cc315c5987865f0a1ad6760b9"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1091403037"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-64861-3_20", 
      "https://app.dimensions.ai/details/publication/pub.1091403037"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T14:29", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8669_00000280.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-319-64861-3_20"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_20'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_20'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_20'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-64861-3_20'


 

This table displays all metadata directly associated to this object as RDF triples.

120 TRIPLES      23 PREDICATES      36 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-64861-3_20 schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author N5dc1ed1c328e40b9bc4d70576b3f4310
4 schema:citation sg:pub.10.1007/978-3-319-13461-1_15
5 sg:pub.10.1007/978-3-642-35416-8_19
6 sg:pub.10.1007/978-81-322-2550-8_41
7 sg:pub.10.1007/s00542-016-2978-0
8 sg:pub.10.1007/s10586-015-0528-7
9 sg:pub.10.1007/s10994-016-5581-9
10 sg:pub.10.1007/s12652-013-0196-5
11 https://doi.org/10.1016/j.comnet.2010.05.002
12 https://doi.org/10.7763/ijcee.2013.v5.771
13 schema:datePublished 2018
14 schema:datePublishedReg 2018-01-01
15 schema:description Denial of Service attacks are one of the most annoying day to day challenges for any security expert and IT professional. This is according to the attack nature. It can be run against any kind of network resources, whether exposed to the Internet or internally in a corporate network, regardless of the type of service it provides and its role in the network. There is no one complete solution or unified framework method against this type of attack. The most dangerous type of DoS attack is the DDoS type. The attack flow from many sources at the same time. In the context of mitigation from DDoS attack, the detection mechanisms are the first step in the way. Mechanisms like IPS and firewall are not effective because of the current challenging DDOS attack methods against application layer. The attackers use vulnerability in the application itself to disrupt the service it provides. Current mitigation techniques depend on preventing the attack traffic from reaching web servers. In this paper we study http application layer DDoS attacks against web servers. We propose new approach for mitigation that depends on absorbing the attack effects on the web server and increases server’s resistance against DDoS attacks.
16 schema:editor Nce770cf26fba48bdaa1efd64933c0264
17 schema:genre chapter
18 schema:inLanguage en
19 schema:isAccessibleForFree false
20 schema:isPartOf N27f583cb27ae4a2c88a128a99e488c98
21 schema:name HTTP Application Layer DDoS Attack Mitigation Using Resources Monitor
22 schema:pagination 213-221
23 schema:productId N67dc21a960ce414f98d379e3502ef1ef
24 Nac1c9f53f4054d009b03462d7a3ef894
25 Nce208efb21f642b894d856ed10b57aa0
26 schema:publisher Ne20cddc646bf4448a17bb9812f7f2085
27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091403037
28 https://doi.org/10.1007/978-3-319-64861-3_20
29 schema:sdDatePublished 2019-04-15T14:29
30 schema:sdLicense https://scigraph.springernature.com/explorer/license/
31 schema:sdPublisher N4db0633f5f1e48aea633d17c2ba3673d
32 schema:url http://link.springer.com/10.1007/978-3-319-64861-3_20
33 sgo:license sg:explorer/license/
34 sgo:sdDataset chapters
35 rdf:type schema:Chapter
36 N0a41e82244c9409e88dd98834fa53646 schema:familyName Shaalan
37 schema:givenName Khaled
38 rdf:type schema:Person
39 N27f583cb27ae4a2c88a128a99e488c98 schema:isbn 978-3-319-64860-6
40 978-3-319-64861-3
41 schema:name Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2017
42 rdf:type schema:Book
43 N2ee51b1e49f540969288a0d7cf612263 rdf:first sg:person.010062432325.70
44 rdf:rest rdf:nil
45 N360445d9d4df41fab114ba3cf4b43dd2 schema:familyName Gaber
46 schema:givenName Tarek
47 rdf:type schema:Person
48 N4db0633f5f1e48aea633d17c2ba3673d schema:name Springer Nature - SN SciGraph project
49 rdf:type schema:Organization
50 N5dc1ed1c328e40b9bc4d70576b3f4310 rdf:first N8436ae068aab4b58a5b039c005d0b3d6
51 rdf:rest N2ee51b1e49f540969288a0d7cf612263
52 N67dc21a960ce414f98d379e3502ef1ef schema:name dimensions_id
53 schema:value pub.1091403037
54 rdf:type schema:PropertyValue
55 N716912fa9ff94b609f13658fc05b0f70 schema:familyName Hassanien
56 schema:givenName Aboul Ella
57 rdf:type schema:Person
58 N8436ae068aab4b58a5b039c005d0b3d6 schema:affiliation https://www.grid.ac/institutes/grid.440877.8
59 schema:familyName Mohamed
60 schema:givenName Mohamed Aly
61 rdf:type schema:Person
62 N9b640846a15f421885c4ea3adbf48af9 rdf:first Nc9e856939f164f2a84057482588f4ae7
63 rdf:rest rdf:nil
64 Nab0de15e508b418fad7c8476573ea1cd rdf:first N360445d9d4df41fab114ba3cf4b43dd2
65 rdf:rest N9b640846a15f421885c4ea3adbf48af9
66 Nac1c9f53f4054d009b03462d7a3ef894 schema:name readcube_id
67 schema:value 391c38575bb8597fec796824c0e7fd30a03eab4cc315c5987865f0a1ad6760b9
68 rdf:type schema:PropertyValue
69 Nb95aee18840a487eb6b82cddf763ec0a rdf:first N0a41e82244c9409e88dd98834fa53646
70 rdf:rest Nab0de15e508b418fad7c8476573ea1cd
71 Nc9e856939f164f2a84057482588f4ae7 schema:familyName Tolba
72 schema:givenName Mohamed F.
73 rdf:type schema:Person
74 Nce208efb21f642b894d856ed10b57aa0 schema:name doi
75 schema:value 10.1007/978-3-319-64861-3_20
76 rdf:type schema:PropertyValue
77 Nce770cf26fba48bdaa1efd64933c0264 rdf:first N716912fa9ff94b609f13658fc05b0f70
78 rdf:rest Nb95aee18840a487eb6b82cddf763ec0a
79 Ne20cddc646bf4448a17bb9812f7f2085 schema:location Cham
80 schema:name Springer International Publishing
81 rdf:type schema:Organisation
82 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
83 schema:name Technology
84 rdf:type schema:DefinedTerm
85 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
86 schema:name Communications Technologies
87 rdf:type schema:DefinedTerm
88 sg:person.010062432325.70 schema:affiliation https://www.grid.ac/institutes/grid.440877.8
89 schema:familyName Abdelbaki
90 schema:givenName Nashwa
91 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010062432325.70
92 rdf:type schema:Person
93 sg:pub.10.1007/978-3-319-13461-1_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052346600
94 https://doi.org/10.1007/978-3-319-13461-1_15
95 rdf:type schema:CreativeWork
96 sg:pub.10.1007/978-3-642-35416-8_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028640044
97 https://doi.org/10.1007/978-3-642-35416-8_19
98 rdf:type schema:CreativeWork
99 sg:pub.10.1007/978-81-322-2550-8_41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037743296
100 https://doi.org/10.1007/978-81-322-2550-8_41
101 rdf:type schema:CreativeWork
102 sg:pub.10.1007/s00542-016-2978-0 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020316127
103 https://doi.org/10.1007/s00542-016-2978-0
104 rdf:type schema:CreativeWork
105 sg:pub.10.1007/s10586-015-0528-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010664539
106 https://doi.org/10.1007/s10586-015-0528-7
107 rdf:type schema:CreativeWork
108 sg:pub.10.1007/s10994-016-5581-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013750322
109 https://doi.org/10.1007/s10994-016-5581-9
110 rdf:type schema:CreativeWork
111 sg:pub.10.1007/s12652-013-0196-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051725491
112 https://doi.org/10.1007/s12652-013-0196-5
113 rdf:type schema:CreativeWork
114 https://doi.org/10.1016/j.comnet.2010.05.002 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029599983
115 rdf:type schema:CreativeWork
116 https://doi.org/10.7763/ijcee.2013.v5.771 schema:sameAs https://app.dimensions.ai/details/publication/pub.1074032361
117 rdf:type schema:CreativeWork
118 https://www.grid.ac/institutes/grid.440877.8 schema:alternateName Nile University
119 schema:name Nile University
120 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...