HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach

dc.contributor.authorPraseed, A.
dc.contributor.authorSanthi Thilagam, P.S.
dc.date.accessioned2026-02-04T12:28:12Z
dc.date.issued2022
dc.description.abstractApplication Layer DDoS (AL-DDoS) attacks are an extremely dangerous variety of DDoS attacks that started becoming popular recently. They are executed using very few legitimate requests, making them very difficult to detect. Since they are executed using attack generation tools and botnets, AL-DDoS attacks display similarity within a request stream (temporal similarity) and across request streams (spatial similarity). Once a particular request stream has been detected as malicious by an anomaly detection mechanism (ADM), spatial similarity can help in detecting AL-DDoS attacks much earlier by employing a dynamic signature based approach. In this work, we use HTTP request patterns as signatures to build a firewall agnostic Early Detection Module (EDM) for AL-DDoS attacks. We also propose the use of Sample Entropy instead of the popular Shannon's Entropy to identify AL-DDoS attacks. Sample Entropy is able to model both the frequencies and sequence of data items within a request stream, and is a better indicator of temporal similarity than Shannon's Entropy. In this work, we demonstrate that Sample Entropy can be used effectively to detect AL-DDoS attacks. With a Sample Entropy based anomaly detection mechanism, we demonstrate that the use of EDM significantly reduces the detection latency for AL-DDoS attacks. © 2022 Elsevier Ltd
dc.identifier.citationJournal of Information Security and Applications, 2022, 65, , pp. -
dc.identifier.issn22142134
dc.identifier.urihttps://doi.org/10.1016/j.jisa.2021.103090
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/22641
dc.publisherElsevier Ltd
dc.subjectAnomaly detection
dc.subjectDenial-of-service attack
dc.subjectDynamics
dc.subjectEntropy
dc.subjectNetwork security
dc.subjectApplication layers
dc.subjectDDoS
dc.subjectDDoS Attack
dc.subjectDetection mechanism
dc.subjectDynamic signature
dc.subjectEarly detection
dc.subjectHTTP request pattern
dc.subjectSample entropy
dc.subjectSpatial similarity
dc.subjectHTTP
dc.titleHTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach

Files

Collections