Distributed denial-of-service attacks against HTTP/2 services View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2016-03

AUTHORS

Erwin Adi, Zubair A. Baig, Philip Hingston, Chiou-Peng Lam

ABSTRACT

HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to distributed denial-of-service (DDoS) attacks when compared to its predecessor. Recent phenomenon showed that legitimate traffic or flash crowds could have high-traffic flow characteristics as seen in DDoS attacks. In this paper, we demonstrate that legitimate HTTP/2 flash crowd traffic can be launched to cause denial of service. To the best of our knowledge, no previous study has been conducted to analyse the effect of both DDoS as well as flash crowd traffic against HTTP/2 services. Results obtained prove the effect of such attacks when tested under four varying protocol-dependant attack scenarios. More... »

PAGES

79-86

Journal

TITLE

Cluster Computing

ISSUE

1

VOLUME

19

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s10586-015-0528-7

DOI

http://dx.doi.org/10.1007/s10586-015-0528-7

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1010664539


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Edith Cowan University", 
          "id": "https://www.grid.ac/institutes/grid.1038.a", 
          "name": [
            "School of Science, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Adi", 
        "givenName": "Erwin", 
        "id": "sg:person.012127725675.70", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012127725675.70"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Edith Cowan University", 
          "id": "https://www.grid.ac/institutes/grid.1038.a", 
          "name": [
            "School of Science and Security Research Institute, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Baig", 
        "givenName": "Zubair A.", 
        "id": "sg:person.015407451241.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015407451241.37"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Edith Cowan University", 
          "id": "https://www.grid.ac/institutes/grid.1038.a", 
          "name": [
            "School of Science, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hingston", 
        "givenName": "Philip", 
        "id": "sg:person.015733664520.10", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015733664520.10"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Edith Cowan University", 
          "id": "https://www.grid.ac/institutes/grid.1038.a", 
          "name": [
            "School of Science, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lam", 
        "givenName": "Chiou-Peng", 
        "id": "sg:person.013325340565.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013325340565.28"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1155/2013/821315", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1006555653"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.future.2013.08.002", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1008398074"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/sec.118", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1014818193"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/997150.997156", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020238858"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s1353-4858(11)70128-3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1024380309"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00500-014-1250-8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1027073659", 
          "https://doi.org/10.1007/s00500-014-1250-8"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/s1353-4858(10)70056-8", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1040161672"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/511446.511485", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042183079"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/sec.392", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1051697668"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mcom.2002.1039856", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061393445"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tpds.2011.262", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061753824"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.5815/ijmecs.2013.10.02", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1073150768"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/eisic.2011.19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093452726"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icdm.2013.166", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094876104"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccsnt.2011.6181964", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095472615"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icact.2013.6710523", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095593462"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2016-03", 
    "datePublishedReg": "2016-03-01", 
    "description": "HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to distributed denial-of-service (DDoS) attacks when compared to its predecessor. Recent phenomenon showed that legitimate traffic or flash crowds could have high-traffic flow characteristics as seen in DDoS attacks. In this paper, we demonstrate that legitimate HTTP/2 flash crowd traffic can be launched to cause denial of service. To the best of our knowledge, no previous study has been conducted to analyse the effect of both DDoS as well as flash crowd traffic against HTTP/2 services. Results obtained prove the effect of such attacks when tested under four varying protocol-dependant attack scenarios.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s10586-015-0528-7", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1046649", 
        "issn": [
          "1386-7857", 
          "1573-7543"
        ], 
        "name": "Cluster Computing", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "1", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "19"
      }
    ], 
    "name": "Distributed denial-of-service attacks against HTTP/2 services", 
    "pagination": "79-86", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "32ceb261889e79d8463e9390b43fb06e368564fbf26bca362809b68a3f266bed"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s10586-015-0528-7"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1010664539"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s10586-015-0528-7", 
      "https://app.dimensions.ai/details/publication/pub.1010664539"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-10T19:50", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8681_00000480.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "http://link.springer.com/10.1007/s10586-015-0528-7"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10586-015-0528-7'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10586-015-0528-7'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10586-015-0528-7'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10586-015-0528-7'


 

This table displays all metadata directly associated to this object as RDF triples.

132 TRIPLES      21 PREDICATES      43 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s10586-015-0528-7 schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author Nc8230caa9f9b4426b8880a79a8bc8ae4
4 schema:citation sg:pub.10.1007/s00500-014-1250-8
5 https://doi.org/10.1002/sec.118
6 https://doi.org/10.1002/sec.392
7 https://doi.org/10.1016/j.future.2013.08.002
8 https://doi.org/10.1016/s1353-4858(10)70056-8
9 https://doi.org/10.1016/s1353-4858(11)70128-3
10 https://doi.org/10.1109/eisic.2011.19
11 https://doi.org/10.1109/icact.2013.6710523
12 https://doi.org/10.1109/iccsnt.2011.6181964
13 https://doi.org/10.1109/icdm.2013.166
14 https://doi.org/10.1109/mcom.2002.1039856
15 https://doi.org/10.1109/tpds.2011.262
16 https://doi.org/10.1145/511446.511485
17 https://doi.org/10.1145/997150.997156
18 https://doi.org/10.1155/2013/821315
19 https://doi.org/10.5815/ijmecs.2013.10.02
20 schema:datePublished 2016-03
21 schema:datePublishedReg 2016-03-01
22 schema:description HTTP/2 is the second major version of the HTTP protocol published by the internet engineering steering group. The protocol is designed to improve reliability and performance Such enhancements have thus delineated the protocol as being more vulnerable to distributed denial-of-service (DDoS) attacks when compared to its predecessor. Recent phenomenon showed that legitimate traffic or flash crowds could have high-traffic flow characteristics as seen in DDoS attacks. In this paper, we demonstrate that legitimate HTTP/2 flash crowd traffic can be launched to cause denial of service. To the best of our knowledge, no previous study has been conducted to analyse the effect of both DDoS as well as flash crowd traffic against HTTP/2 services. Results obtained prove the effect of such attacks when tested under four varying protocol-dependant attack scenarios.
23 schema:genre research_article
24 schema:inLanguage en
25 schema:isAccessibleForFree false
26 schema:isPartOf N66ef24dfd8ee4d9bb0e05c907a90e9d7
27 Nb61c624742034796983d6e7ddadb1a93
28 sg:journal.1046649
29 schema:name Distributed denial-of-service attacks against HTTP/2 services
30 schema:pagination 79-86
31 schema:productId N1b172f2e63a442059f6cf333cdf096e5
32 N44b86518a3984d7892e2849b96eab703
33 Nf1750598bb1e48eb8a8958b6096ab1ed
34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010664539
35 https://doi.org/10.1007/s10586-015-0528-7
36 schema:sdDatePublished 2019-04-10T19:50
37 schema:sdLicense https://scigraph.springernature.com/explorer/license/
38 schema:sdPublisher N1ca457acc07f4f3b8e33072135db94a5
39 schema:url http://link.springer.com/10.1007/s10586-015-0528-7
40 sgo:license sg:explorer/license/
41 sgo:sdDataset articles
42 rdf:type schema:ScholarlyArticle
43 N1b172f2e63a442059f6cf333cdf096e5 schema:name readcube_id
44 schema:value 32ceb261889e79d8463e9390b43fb06e368564fbf26bca362809b68a3f266bed
45 rdf:type schema:PropertyValue
46 N1ca457acc07f4f3b8e33072135db94a5 schema:name Springer Nature - SN SciGraph project
47 rdf:type schema:Organization
48 N44b86518a3984d7892e2849b96eab703 schema:name dimensions_id
49 schema:value pub.1010664539
50 rdf:type schema:PropertyValue
51 N66ef24dfd8ee4d9bb0e05c907a90e9d7 schema:issueNumber 1
52 rdf:type schema:PublicationIssue
53 N9538b965440842c3b7a37fa4ff442a37 rdf:first sg:person.015733664520.10
54 rdf:rest Ne35d27c492b649bfa18909c668eaf976
55 Nb61c624742034796983d6e7ddadb1a93 schema:volumeNumber 19
56 rdf:type schema:PublicationVolume
57 Nc8230caa9f9b4426b8880a79a8bc8ae4 rdf:first sg:person.012127725675.70
58 rdf:rest Nf2493a0dd88f4d449c1f89df797a5d1f
59 Ne35d27c492b649bfa18909c668eaf976 rdf:first sg:person.013325340565.28
60 rdf:rest rdf:nil
61 Nf1750598bb1e48eb8a8958b6096ab1ed schema:name doi
62 schema:value 10.1007/s10586-015-0528-7
63 rdf:type schema:PropertyValue
64 Nf2493a0dd88f4d449c1f89df797a5d1f rdf:first sg:person.015407451241.37
65 rdf:rest N9538b965440842c3b7a37fa4ff442a37
66 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
67 schema:name Technology
68 rdf:type schema:DefinedTerm
69 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
70 schema:name Communications Technologies
71 rdf:type schema:DefinedTerm
72 sg:journal.1046649 schema:issn 1386-7857
73 1573-7543
74 schema:name Cluster Computing
75 rdf:type schema:Periodical
76 sg:person.012127725675.70 schema:affiliation https://www.grid.ac/institutes/grid.1038.a
77 schema:familyName Adi
78 schema:givenName Erwin
79 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012127725675.70
80 rdf:type schema:Person
81 sg:person.013325340565.28 schema:affiliation https://www.grid.ac/institutes/grid.1038.a
82 schema:familyName Lam
83 schema:givenName Chiou-Peng
84 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013325340565.28
85 rdf:type schema:Person
86 sg:person.015407451241.37 schema:affiliation https://www.grid.ac/institutes/grid.1038.a
87 schema:familyName Baig
88 schema:givenName Zubair A.
89 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015407451241.37
90 rdf:type schema:Person
91 sg:person.015733664520.10 schema:affiliation https://www.grid.ac/institutes/grid.1038.a
92 schema:familyName Hingston
93 schema:givenName Philip
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015733664520.10
95 rdf:type schema:Person
96 sg:pub.10.1007/s00500-014-1250-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027073659
97 https://doi.org/10.1007/s00500-014-1250-8
98 rdf:type schema:CreativeWork
99 https://doi.org/10.1002/sec.118 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014818193
100 rdf:type schema:CreativeWork
101 https://doi.org/10.1002/sec.392 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051697668
102 rdf:type schema:CreativeWork
103 https://doi.org/10.1016/j.future.2013.08.002 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008398074
104 rdf:type schema:CreativeWork
105 https://doi.org/10.1016/s1353-4858(10)70056-8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040161672
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1016/s1353-4858(11)70128-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024380309
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1109/eisic.2011.19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093452726
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1109/icact.2013.6710523 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095593462
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1109/iccsnt.2011.6181964 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095472615
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1109/icdm.2013.166 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094876104
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1109/mcom.2002.1039856 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061393445
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1109/tpds.2011.262 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061753824
120 rdf:type schema:CreativeWork
121 https://doi.org/10.1145/511446.511485 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042183079
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1145/997150.997156 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020238858
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1155/2013/821315 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006555653
126 rdf:type schema:CreativeWork
127 https://doi.org/10.5815/ijmecs.2013.10.02 schema:sameAs https://app.dimensions.ai/details/publication/pub.1073150768
128 rdf:type schema:CreativeWork
129 https://www.grid.ac/institutes/grid.1038.a schema:alternateName Edith Cowan University
130 schema:name School of Science and Security Research Institute, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia
131 School of Science, Edith Cowan University, 270 Joondalup Dr., 6027, Joondalup, WA, Australia
132 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...