Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges

K Singh, P Singh, K Kumar - Computers & security, 2017 - Elsevier
Abstract Application layer Distributed Denial of Service (DDoS) attacks have empowered
conventional flooding based DDoS with more subtle attacking methods that pose an ever …

Prevention and fighting against web attacks through anomaly detection technology. A systematic review

T Sureda Riera, JR Bermejo Higuera… - Sustainability, 2020 - mdpi.com
Numerous techniques have been developed in order to prevent attacks on web servers.
Anomaly detection techniques are based on models of normal user and application …

[图书][B] Hidden Semi-Markov models: theory, algorithms and applications

SZ Yu - 2015 - books.google.com
Hidden semi-Markov models (HSMMs) are among the most important models in the area of
artificial intelligence/machine learning. Since the first HSMM was introduced in 1980 for …

A Novel Protective Framework for Defeating HTTP‐Based Denial of Service and Distributed Denial of Service Attacks

MA Saleh, A Abdul Manaf - The Scientific World Journal, 2015 - Wiley Online Library
The growth of web technology has brought convenience to our life, since it has become the
most important communication channel. However, now this merit is threatened by …

Behavior analysis for electronic commerce trading systems: A survey

P Zhao, Z Ding, M Wang, R Cao - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid development of the Internet and the continuous progress of computer science
and technology, Internet-based online trading has developed rapidly and improved the …

[PDF][PDF] Prevention and fighting against web attacks through anomaly detection technology. A systematic review

TS Riera, JRB Higuera, JB Higuera, JJM Herraiz… - …, 2020 - researchgate.net
Numerous techniques have been developed in order to prevent attacks on web servers.
Anomaly detection techniques are based on models of normal user and application …

New sensing technique for detecting application layer DDoS attacks targeting back-end database resources

D Beckett, S Sezer, J McCanny - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Distributed Denial of Service (DDoS) attacks targeting the application layer are becoming
more prevalent due to a lack of suitable defence solutions. Existing research treats the web …

Anomaly detection for application layer user browsing behavior based on attributes and features

X Luo, X Di, X Liu, H Qi, J Li, L Cong… - Journal of Physics …, 2018 - iopscience.iop.org
Application layer distributed denial of service (App-DDoS) attacks has posed a great threat
to the security of the Internet. Since these attacks occur in the application layer, they can …

Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks

MA Saleh, AA Manaf - 2014 International Symposium on …, 2014 - ieeexplore.ieee.org
Nowadays, the most distinct threat to the web applications is HTTP-based Denial of Service
(DoS) and Distributed Denial of Service (DDoS) attack, which it causes a massive damage …

Rank based anomaly detection algorithms

H Huang - 2013 - search.proquest.com
Anomaly or outlier detection problems are of considerable importance, arising frequently in
diverse real-world applications such as finance and cyber-security. Several algorithms have …