Abstract
Application layer Distributed Denial of Service (DDoS) attacks have pros of increasing complexity and diversity of network protocols and services. These kind of attack are very popular now the days rather than DDoS attacks. AL-DDoS attacks are critical threats for Internet and business web server. Over recent years, a significant research contribution has been dedicated to devising a new technique in AL-DDoS. In this paper, we had selected 13 primary studies out of a large bunch of data from the different electronic database. We formulate the pros and cons of the different primary studies, the contribution of countries, identify the parameter and their effects, attack strategy of the attacker and their effects. The aim of this survey is to identify further future research on attributes of AL-DDoS attack. We also discuss attributes which are slightly used by the researcher. This survey identifies that researchers used which strategy more and in future acquaints can work with that strategies and attributes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kaspersky Q3 2017 DDoS attack Report. https://securelist.com/kaspersky-ddos-intelligence-report-for-q3-2016/76464/
Adi, E., Baig, Z., Hingston, P.: Stealthy denial of service (DoS) attack modelling and detection for HTTP/2 services. J. Comput. Netw. Appl. 91, 1–13 (2017)
Kaspersky, Q1 2018 - DDoS attack Report. https://securelist.com/ddos-attacks-in-q1-2017/78285
Kaspersky, Q1 2018 - DDoS attack Report. https://securelist.com/ddos-report-in-q1-2018/85373
Arbor Network, Worldwide network infrastructure security report, Technical Report, Arbor networks (2017)
Vadlamani, N.S.: A survey on detection and defense of application layer DDoS attacks. These ULIV (2013)
Zhou, W., Jia, W., Wen, S., Xiang, Y., Zhou, W.: Detection and defense of application-layer DDoS attack in backbone web traffic. J. Future Gener. Comput. Syst. 38, 36–46 (2014)
Akamai. Q2 2015 state of the internet – security report. https://www.stateoftheinternet.com/resources-web-security-2015-q1-internet-security-report.html
Wong, F., Tan, C.X.: A survey of trends in massive DDoS attacks and cloud-based mitigation. Int. J. Netw. Secur. Appl. (IJNSA) 6(3), 57–61 (2014)
Mantas, G., Stakhanova, N., Gonzalez, H., Jazi, H.H., Ghorbani, A.A.: Application layer DDoS attacks: taxonomy and survey. Int. J. Inf. Comput. Secur. 7(2–4), 216–239 (2014)
Sachdeva, M., Singh, G., Kumar, K., Singh, K.: Comprehensive survey of distributed defense techniques against DDoS problem. IJCSNS Int J Computer Sci Net Security 9(12), 7–15 (2009)
Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distribution denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)
Singh, K., Singh, P., Kumar, K.: Application layer HTTP-GET floods DDoS attacks: research landscape and challenges. Int. J. Comput. Secur. 65, 344–372 (2016)
Wang, C., Miu, T.T., Luo, X., Wang, J.: SkyShield based defence system against application layer DDoS attack. IEEE Trans. Inf. Forensics Secur. 13(3), 559–573 (2018)
Bravo, S., Mauricio, D.: DDoS attack detection mechanism in the application layer using user features. In: IEEE International Conference on Information and Computer Technologies, vol. 5, no. 18 (2018). ISBN 978-1-5386
Wang, Y., Liu, L., Si, C., Sun, B.: A novel approach for countering application layer DDoS attack. IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), vol. 2, no. 17 (2017). ISBN 978-1-4673-8979
Meng, B., Andi, W., Jian, X., Fucai, Z.: DDOS attack detection system based on analysis of users’ behaviors for application layer. In: IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 5, no. 17 (2017). ISBN 978-1-3221
Naga Lakshmi, V., Begum, S.: DDoS defense enhanced flooding detection and confidence-based filtering method. IEEE Adv. Comput. Sci. Technol. 10(8), 2257–2272 (2017). ISSN 0973-6107
Jiang, M., Wang, C., Luo, X., Miu, M.T., Chen, T.: Characterizing the impacts of application layer DDoS attacks. In: IEEE International Conference on Web Services, vol. 7, no. 17 (2017). ISBN 978-1-5386-0752
Karadbhuje, A., Bhingarkar, S.P.: Detection of deceptive resource consumption over a website. IEEE Int. J. Comput. Eng. Appl. XI, 1–7 (2017). ISSN 2321-3469
Najafabadi, M.M., Khoshgoftaar, T.M., Calvert, C., Kemp, C.: User behavior anomaly detection for application layer DDoS attack. In: IEEE International Conference on Information Reuse and Integration (IRI), vol. 8, no. 17 (2017). ISBN 978-0-7695-6243
Zolotukhin, M., Hamalainen, T., Kokkonen, T., Siltane, J.: Increasing web service availability by detecting application-layer DDoS attacks in encrypted Traffic. In: IEEE International Conference on Telecommunications (ICT), vol. 8, no. 16 (2016). ISBN 978-1-5090-1990
Liao, Q., Li, H., Kang, S., Liu, C.: Application layer DDoS attack detection using cluster with the label based on sparse vector decomposition and rhythm matching. Secur. Commun. Netw. 8(17), 3111–3120 (2015)
Singh, B., Kumar, K., Bhandari, A.: Simulation study of application layer DDoS attack. In: IEEE International Conference on Green Computing and Internet of Things (ICGCIoT), vol. 6, no. 16 (2015)
Stevanovic, D., Vlajic, N.: Application-layer DDoS in dynamic web-domains: building defenses against next-generation attack behavior. In: IEEE Conference on Communications and Network Security, vol. 1, no. 14 (2014). ISBN 978-14799-5890
Prasad, K.M., Reddy, A.R.M., Rao, K.V.: Detection and DDoS attacks: defense, detection and traceback mechanisms - a survey. Glob. J. Comput. Sci. Technol.: E Netw. Web Secur. 14(7), 15–32 (2014). Version 1.0 Year 2014
Najafabadi, M.M., Khoshgoftaar, T.M., Calvert, C., Kemp, C.: A text mining approach for anomaly detection in application layer DDoS attack. In: 2013 IEEE International Conference on Artificial Intelligence Research Society (2013)
Ni, T., Gu, X., Wang, H., Li, Y.: Real-time detection of application-layer DDoS attack using time series analysis. J. Control. Sci Eng. 13, 6 (2013)
Beitollahi, H., Deconinck, G.: Tackling application-layer DDoS attacks. In: 2012International Conference on Ambient Systems, Networks and Technologies, vol. 10, pp. 432–441 (2012)
Bhange, A., Syad, A., Thakur, S.S.: DDoS attacks impact on network traffic and its detection approach. IEEE Int. J. Comput. Appl. 40(1), 36–40 (2012). ISSN 0975-8887
Durcekova, V., Schwartz, L., Shahmehri, N.: Sophisticated denial of service attacks aimed at application layer. In: 2012 IEEE International Conference ELEKTON, vol. 3, no. 12 (2012). ISBN 978-1-4673-1179
Babu, G.P., Jayavani, V., Mohan Rao, C.: Anomaly detection on user browsing behaviors using hidden semi-Markov model. IEEE JCSIT Int. J. Comput. Sci. Inf. Technol. 2(3), 1197–1201 (2011)
Wen, S., Jia, W., Zhou, W., Zhou, W., Xu, C.: CALD: surviving various application-layer DDoS attacks that mimic flash crowd. In: 2010 IEEE International Conference on Network and System Security, vol. 4, no. 10 (2010). ISBN 978-0-7695-4159
Xie, Y., Yu, S.-Z.: Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans. Netw. 17(1), 15–25 (2009)
Soujanya, N.V.V., Mahesh, G.U.: Detecting network and application layer attacks in networks. IEEE Int. J. Res. Comput. Commun. Technol. 3(1), 1541–1545 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sharma, A., Bhasin, A. (2020). Critical Investigation on Application Layer-DDoS Attacks: Taxonomy and Parameter Efficacy. In: Singh, P., Panigrahi, B., Suryadevara, N., Sharma, S., Singh, A. (eds) Proceedings of ICETIT 2019. Lecture Notes in Electrical Engineering, vol 605. Springer, Cham. https://doi.org/10.1007/978-3-030-30577-2_82
Download citation
DOI: https://doi.org/10.1007/978-3-030-30577-2_82
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30576-5
Online ISBN: 978-3-030-30577-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)