Distributed denial-of-service attacks against HTTP/2 services View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2016-03

AUTHORS

Erwin Adi, Zubair A. Baig, Philip Hingston, Chiou-Peng Lam

ABSTRACT

HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to distributed denial-of-service (DDoS) attacks when compared to its predecessor. Recent phenomenon showed that legitimate traffic or flash crowds could have high-traffic flow characteristics as seen in DDoS attacks. In this paper, we demonstrate that legitimate HTTP/2 flash crowd traffic can be launched to cause denial of service. To the best of our knowledge, no previous study has been conducted to analyse the effect of both DDoS as well as flash crowd traffic against HTTP/2 services. Results obtained prove the effect of such attacks when tested under four varying protocol-dependant attack scenarios. More... »

PAGES

79-86

Journal

TITLE

Cluster Computing

ISSUE

1

VOLUME

19

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s10586-015-0528-7

DOI

http://dx.doi.org/10.1007/s10586-015-0528-7

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1010664539


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Edith Cowan University", 
          "id": "https://www.grid.ac/institutes/grid.1038.a", 
          "name": [
            "School of Science, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Adi", 
        "givenName": "Erwin", 
        "id": "sg:person.012127725675.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012127725675.70"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Edith Cowan University", 
          "id": "https://www.grid.ac/institutes/grid.1038.a", 
          "name": [
            "School of Science and Security Research Institute, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Baig", 
        "givenName": "Zubair A.", 
        "id": "sg:person.015407451241.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015407451241.37"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Edith Cowan University", 
          "id": "https://www.grid.ac/institutes/grid.1038.a", 
          "name": [
            "School of Science, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hingston", 
        "givenName": "Philip", 
        "id": "sg:person.015733664520.10", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015733664520.10"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Edith Cowan University", 
          "id": "https://www.grid.ac/institutes/grid.1038.a", 
          "name": [
            "School of Science, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lam", 
        "givenName": "Chiou-Peng", 
        "id": "sg:person.013325340565.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013325340565.28"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1155/2013/821315", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1006555653"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.future.2013.08.002", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1008398074"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/sec.118", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1014818193"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/997150.997156", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020238858"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s1353-4858(11)70128-3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1024380309"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00500-014-1250-8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1027073659", 
          "https://doi.org/10.1007/s00500-014-1250-8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s1353-4858(10)70056-8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040161672"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/511446.511485", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042183079"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/sec.392", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1051697668"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mcom.2002.1039856", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061393445"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tpds.2011.262", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061753824"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.5815/ijmecs.2013.10.02", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1073150768"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/eisic.2011.19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093452726"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icdm.2013.166", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094876104"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccsnt.2011.6181964", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095472615"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icact.2013.6710523", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095593462"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2016-03", 
    "datePublishedReg": "2016-03-01", 
    "description": "HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to distributed denial-of-service (DDoS) attacks when compared to its predecessor. Recent phenomenon showed that legitimate traffic or flash crowds could have high-traffic flow characteristics as seen in DDoS attacks. In this paper, we demonstrate that legitimate HTTP/2 flash crowd traffic can be launched to cause denial of service. To the best of our knowledge, no previous study has been conducted to analyse the effect of both DDoS as well as flash crowd traffic against HTTP/2 services. Results obtained prove the effect of such attacks when tested under four varying protocol-dependant attack scenarios.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s10586-015-0528-7", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1046649", 
        "issn": [
          "1386-7857", 
          "1573-7543"
        ], 
        "name": "Cluster Computing", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "1", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "19"
      }
    ], 
    "name": "Distributed denial-of-service attacks against HTTP/2 services", 
    "pagination": "79-86", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "32ceb261889e79d8463e9390b43fb06e368564fbf26bca362809b68a3f266bed"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s10586-015-0528-7"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1010664539"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s10586-015-0528-7", 
      "https://app.dimensions.ai/details/publication/pub.1010664539"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-10T19:50", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8681_00000480.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "http://link.springer.com/10.1007/s10586-015-0528-7"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10586-015-0528-7'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10586-015-0528-7'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10586-015-0528-7'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10586-015-0528-7'


 

This table displays all metadata directly associated to this object as RDF triples.

132 TRIPLES      21 PREDICATES      43 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s10586-015-0528-7 schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author N4d06038a5d5943918f29d33d4423acb0
4 schema:citation sg:pub.10.1007/s00500-014-1250-8
5 https://doi.org/10.1002/sec.118
6 https://doi.org/10.1002/sec.392
7 https://doi.org/10.1016/j.future.2013.08.002
8 https://doi.org/10.1016/s1353-4858(10)70056-8
9 https://doi.org/10.1016/s1353-4858(11)70128-3
10 https://doi.org/10.1109/eisic.2011.19
11 https://doi.org/10.1109/icact.2013.6710523
12 https://doi.org/10.1109/iccsnt.2011.6181964
13 https://doi.org/10.1109/icdm.2013.166
14 https://doi.org/10.1109/mcom.2002.1039856
15 https://doi.org/10.1109/tpds.2011.262
16 https://doi.org/10.1145/511446.511485
17 https://doi.org/10.1145/997150.997156
18 https://doi.org/10.1155/2013/821315
19 https://doi.org/10.5815/ijmecs.2013.10.02
20 schema:datePublished 2016-03
21 schema:datePublishedReg 2016-03-01
22 schema:description HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to distributed denial-of-service (DDoS) attacks when compared to its predecessor. Recent phenomenon showed that legitimate traffic or flash crowds could have high-traffic flow characteristics as seen in DDoS attacks. In this paper, we demonstrate that legitimate HTTP/2 flash crowd traffic can be launched to cause denial of service. To the best of our knowledge, no previous study has been conducted to analyse the effect of both DDoS as well as flash crowd traffic against HTTP/2 services. Results obtained prove the effect of such attacks when tested under four varying protocol-dependant attack scenarios.
23 schema:genre research_article
24 schema:inLanguage en
25 schema:isAccessibleForFree false
26 schema:isPartOf N075b6c1ef26f4191932060e3a3709633
27 N80ea5c25632f498dbb8d3c8d0e234334
28 sg:journal.1046649
29 schema:name Distributed denial-of-service attacks against HTTP/2 services
30 schema:pagination 79-86
31 schema:productId N1e339a13682c46e1a0e36a7e985c9dfe
32 N1eddd84481744d81aab454615da2dfaf
33 N54f3f7f8999c4fcf872368d6cb5b14df
34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010664539
35 https://doi.org/10.1007/s10586-015-0528-7
36 schema:sdDatePublished 2019-04-10T19:50
37 schema:sdLicense https://scigraph.springernature.com/explorer/license/
38 schema:sdPublisher Neb4076022cc4454f9b84597fdd1bf451
39 schema:url http://link.springer.com/10.1007/s10586-015-0528-7
40 sgo:license sg:explorer/license/
41 sgo:sdDataset articles
42 rdf:type schema:ScholarlyArticle
43 N075b6c1ef26f4191932060e3a3709633 schema:issueNumber 1
44 rdf:type schema:PublicationIssue
45 N1e339a13682c46e1a0e36a7e985c9dfe schema:name doi
46 schema:value 10.1007/s10586-015-0528-7
47 rdf:type schema:PropertyValue
48 N1eddd84481744d81aab454615da2dfaf schema:name dimensions_id
49 schema:value pub.1010664539
50 rdf:type schema:PropertyValue
51 N206329d8ad3240abafb3c0231376c435 rdf:first sg:person.015733664520.10
52 rdf:rest N8567b1344ea840f4821b3aea400df267
53 N296c6158cf1c4458bd22afc903a44436 rdf:first sg:person.015407451241.37
54 rdf:rest N206329d8ad3240abafb3c0231376c435
55 N4d06038a5d5943918f29d33d4423acb0 rdf:first sg:person.012127725675.70
56 rdf:rest N296c6158cf1c4458bd22afc903a44436
57 N54f3f7f8999c4fcf872368d6cb5b14df schema:name readcube_id
58 schema:value 32ceb261889e79d8463e9390b43fb06e368564fbf26bca362809b68a3f266bed
59 rdf:type schema:PropertyValue
60 N80ea5c25632f498dbb8d3c8d0e234334 schema:volumeNumber 19
61 rdf:type schema:PublicationVolume
62 N8567b1344ea840f4821b3aea400df267 rdf:first sg:person.013325340565.28
63 rdf:rest rdf:nil
64 Neb4076022cc4454f9b84597fdd1bf451 schema:name Springer Nature - SN SciGraph project
65 rdf:type schema:Organization
66 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
67 schema:name Technology
68 rdf:type schema:DefinedTerm
69 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
70 schema:name Communications Technologies
71 rdf:type schema:DefinedTerm
72 sg:journal.1046649 schema:issn 1386-7857
73 1573-7543
74 schema:name Cluster Computing
75 rdf:type schema:Periodical
76 sg:person.012127725675.70 schema:affiliation https://www.grid.ac/institutes/grid.1038.a
77 schema:familyName Adi
78 schema:givenName Erwin
79 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012127725675.70
80 rdf:type schema:Person
81 sg:person.013325340565.28 schema:affiliation https://www.grid.ac/institutes/grid.1038.a
82 schema:familyName Lam
83 schema:givenName Chiou-Peng
84 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013325340565.28
85 rdf:type schema:Person
86 sg:person.015407451241.37 schema:affiliation https://www.grid.ac/institutes/grid.1038.a
87 schema:familyName Baig
88 schema:givenName Zubair A.
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015407451241.37
90 rdf:type schema:Person
91 sg:person.015733664520.10 schema:affiliation https://www.grid.ac/institutes/grid.1038.a
92 schema:familyName Hingston
93 schema:givenName Philip
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015733664520.10
95 rdf:type schema:Person
96 sg:pub.10.1007/s00500-014-1250-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027073659
97 https://doi.org/10.1007/s00500-014-1250-8
98 rdf:type schema:CreativeWork
99 https://doi.org/10.1002/sec.118 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014818193
100 rdf:type schema:CreativeWork
101 https://doi.org/10.1002/sec.392 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051697668
102 rdf:type schema:CreativeWork
103 https://doi.org/10.1016/j.future.2013.08.002 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008398074
104 rdf:type schema:CreativeWork
105 https://doi.org/10.1016/s1353-4858(10)70056-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040161672
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1016/s1353-4858(11)70128-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024380309
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1109/eisic.2011.19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093452726
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1109/icact.2013.6710523 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095593462
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1109/iccsnt.2011.6181964 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095472615
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1109/icdm.2013.166 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094876104
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1109/mcom.2002.1039856 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061393445
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1109/tpds.2011.262 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061753824
120 rdf:type schema:CreativeWork
121 https://doi.org/10.1145/511446.511485 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042183079
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1145/997150.997156 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020238858
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1155/2013/821315 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006555653
126 rdf:type schema:CreativeWork
127 https://doi.org/10.5815/ijmecs.2013.10.02 schema:sameAs https://app.dimensions.ai/details/publication/pub.1073150768
128 rdf:type schema:CreativeWork
129 https://www.grid.ac/institutes/grid.1038.a schema:alternateName Edith Cowan University
130 schema:name School of Science and Security Research Institute, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia
131 School of Science, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia
132 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...