Fuzzy Request Set Modelling for Detecting Multiplexed Asymmetric DDoS Attacks on HTTP/2 servers

dc.contributor.authorPraseed, A.
dc.contributor.authorSanthi Thilagam, P.S.
dc.date.accessioned2026-02-05T09:26:24Z
dc.date.issued2021
dc.description.abstractThe introduction of HTTP/2 has led to a dramatic change in web traffic. The steady flow of requests in HTTP/1.1 has been replaced by bursts of multiple requests, largely due to the introduction of multiplexing in HTTP/2 which allows users to send multiple requests through a single connection. This feature was introduced in order to reduce the page loading time by multiplexing a web page and its associated resources in a single connection. While this feature has significantly improved user experience, it can be misused to launch sophisticated application layer DDoS attacks against HTTP/2 servers. Instead of the intended use of multiplexing, attackers can force the web server to process multiple random requests simultaneously, leading to increased server usage. The use of computationally intensive requests can further exacerbate the situation. These attacks, called Multiplexed Asymmetric Attacks, pose a dangerous threat to HTTP/2 servers and stem from the lack of verification of the multiplexed requests. In this work, an approach to model an HTTP/2 request set as a fuzzy multiset is presented. The proposed approach uses a combination of relative cardinality and request workload to detect multiplexed AL-DDoS attacks. Experiments on open source datasets demonstrate that the proposed approach is able to detect multiplexed AL-DDoS attacks with an accuracy of around 95%, while maintaining a low False Positive Rate (FPR) of around 3%. © 2021 Elsevier Ltd
dc.identifier.citationExpert Systems with Applications, 2021, 186, , pp. -
dc.identifier.issn9574174
dc.identifier.urihttps://doi.org/10.1016/j.eswa.2021.115697
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/22930
dc.publisherElsevier Ltd
dc.subjectDenial-of-service attack
dc.subjectMultiplexing
dc.subjectNetwork security
dc.subjectServers
dc.subjectWeb services
dc.subjectWebsites
dc.subjectApplication layers
dc.subjectAsymmetric workload
dc.subjectDDoS
dc.subjectDDoS Attack
dc.subjectDetection
dc.subjectFuzzy multisets
dc.subjectHttp/2
dc.subjectServer pushes
dc.subjectSet models
dc.subjectSingle connection
dc.subjectHTTP
dc.titleFuzzy Request Set Modelling for Detecting Multiplexed Asymmetric DDoS Attacks on HTTP/2 servers

Files

Collections