作者
Michele Cirillo, Mario Di Mauro, Vincenzo Matta, Marco Tambasco
发表日期
2021/5/21
期刊
IEEE Transactions on Information Forensics and Security
卷号
16
页码范围
3554-3569
出版商
IEEE
简介
In a Distributed Denial of Service (DDoS) attack, a network (botnet) of dispersed agents (bots) sends requests to a website to saturate its resources. Since the requests are sent by automata, the typical way to detect them is to look for some repetition pattern or commonalities between requests of the same user or from different users. For this reason, recent DDoS variants exploit communication layers that offer broader possibility in terms of admissible request patterns, such as, e.g., the application layer. In this case, the malicious agents can pick legitimate messages from an emulation dictionary, and each individual agent sends a relatively low number of admissible requests, so as to make its activity non suspicious. This problem has been recently addressed under the assumption that all the members of the botnet use the same emulation dictionary. This situation is an idealization of what occurs in practice, since …
引用总数
20212022202320242761
学术搜索中的文章
M Cirillo, M Di Mauro, V Matta, M Tambasco - IEEE Transactions on Information Forensics and …, 2021