Review of recent detection methods for HTTP DDoS attack

With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures. Web servers that run on Hypertext Transfer Protocol (HTTP) are exposed to denial-of-service (DoS) attacks. A so...

Full description

Bibliographic Details
Main Authors: Jaafar, Ghafar A., Abdullah, Shahidan M., Ismail, Saifuladli
Format: Article
Language:English
Published: Hindawi Limited 2019
Subjects:
Online Access:http://eprints.utm.my/88786/1/GhafarAJaafar2019_ReviewofRecentDetectionMethods.pdf
_version_ 1796864699638218752
author Jaafar, Ghafar A.
Abdullah, Shahidan M.
Ismail, Saifuladli
author_facet Jaafar, Ghafar A.
Abdullah, Shahidan M.
Ismail, Saifuladli
author_sort Jaafar, Ghafar A.
collection ePrints
description With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures. Web servers that run on Hypertext Transfer Protocol (HTTP) are exposed to denial-of-service (DoS) attacks. A sophisticated version of this attack known as distributed denial of service (DDOS) is among the most dangerous Internet attacks, with the ability to overwhelm a web server, thereby slowing it down and potentially taking it down completely. This paper reviewed 12 recent detection of DDoS attack at the application layer published between January 2014 and December 2018. A summary of each detection method is summarised in table view, along with in-depth critical analysis, for future studies to conduct research pertaining to detection of HTTP DDoS attack.
first_indexed 2024-03-05T20:45:46Z
format Article
id utm.eprints-88786
institution Universiti Teknologi Malaysia - ePrints
language English
last_indexed 2024-03-05T20:45:46Z
publishDate 2019
publisher Hindawi Limited
record_format dspace
spelling utm.eprints-887862020-12-29T04:25:23Z http://eprints.utm.my/88786/ Review of recent detection methods for HTTP DDoS attack Jaafar, Ghafar A. Abdullah, Shahidan M. Ismail, Saifuladli T Technology (General) T58.5-58.64 Information technology With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures. Web servers that run on Hypertext Transfer Protocol (HTTP) are exposed to denial-of-service (DoS) attacks. A sophisticated version of this attack known as distributed denial of service (DDOS) is among the most dangerous Internet attacks, with the ability to overwhelm a web server, thereby slowing it down and potentially taking it down completely. This paper reviewed 12 recent detection of DDoS attack at the application layer published between January 2014 and December 2018. A summary of each detection method is summarised in table view, along with in-depth critical analysis, for future studies to conduct research pertaining to detection of HTTP DDoS attack. Hindawi Limited 2019-01 Article PeerReviewed application/pdf en http://eprints.utm.my/88786/1/GhafarAJaafar2019_ReviewofRecentDetectionMethods.pdf Jaafar, Ghafar A. and Abdullah, Shahidan M. and Ismail, Saifuladli (2019) Review of recent detection methods for HTTP DDoS attack. Journal of Computer Networks and Communications, 2019 . pp. 1-11. ISSN 2090-7141 http://dx.doi.org/10.1155/2019/1283472 DOI:10.1155/2019/1283472
spellingShingle T Technology (General)
T58.5-58.64 Information technology
Jaafar, Ghafar A.
Abdullah, Shahidan M.
Ismail, Saifuladli
Review of recent detection methods for HTTP DDoS attack
title Review of recent detection methods for HTTP DDoS attack
title_full Review of recent detection methods for HTTP DDoS attack
title_fullStr Review of recent detection methods for HTTP DDoS attack
title_full_unstemmed Review of recent detection methods for HTTP DDoS attack
title_short Review of recent detection methods for HTTP DDoS attack
title_sort review of recent detection methods for http ddos attack
topic T Technology (General)
T58.5-58.64 Information technology
url http://eprints.utm.my/88786/1/GhafarAJaafar2019_ReviewofRecentDetectionMethods.pdf
work_keys_str_mv AT jaafarghafara reviewofrecentdetectionmethodsforhttpddosattack
AT abdullahshahidanm reviewofrecentdetectionmethodsforhttpddosattack
AT ismailsaifuladli reviewofrecentdetectionmethodsforhttpddosattack