Skip to main content

Critical Investigation on Application Layer-DDoS Attacks: Taxonomy and Parameter Efficacy

  • Conference paper
  • First Online:
Proceedings of ICETIT 2019

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 605))

  • 1595 Accesses

Abstract

Application layer Distributed Denial of Service (DDoS) attacks have pros of increasing complexity and diversity of network protocols and services. These kind of attack are very popular now the days rather than DDoS attacks. AL-DDoS attacks are critical threats for Internet and business web server. Over recent years, a significant research contribution has been dedicated to devising a new technique in AL-DDoS. In this paper, we had selected 13 primary studies out of a large bunch of data from the different electronic database. We formulate the pros and cons of the different primary studies, the contribution of countries, identify the parameter and their effects, attack strategy of the attacker and their effects. The aim of this survey is to identify further future research on attributes of AL-DDoS attack. We also discuss attributes which are slightly used by the researcher. This survey identifies that researchers used which strategy more and in future acquaints can work with that strategies and attributes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kaspersky Q3 2017 DDoS attack Report. https://securelist.com/kaspersky-ddos-intelligence-report-for-q3-2016/76464/

  2. Adi, E., Baig, Z., Hingston, P.: Stealthy denial of service (DoS) attack modelling and detection for HTTP/2 services. J. Comput. Netw. Appl. 91, 1–13 (2017)

    Article  Google Scholar 

  3. Kaspersky, Q1 2018 - DDoS attack Report. https://securelist.com/ddos-attacks-in-q1-2017/78285

  4. Kaspersky, Q1 2018 - DDoS attack Report. https://securelist.com/ddos-report-in-q1-2018/85373

  5. Arbor Network, Worldwide network infrastructure security report, Technical Report, Arbor networks (2017)

    Google Scholar 

  6. Vadlamani, N.S.: A survey on detection and defense of application layer DDoS attacks. These ULIV (2013)

    Google Scholar 

  7. Zhou, W., Jia, W., Wen, S., Xiang, Y., Zhou, W.: Detection and defense of application-layer DDoS attack in backbone web traffic. J. Future Gener. Comput. Syst. 38, 36–46 (2014)

    Article  Google Scholar 

  8. Akamai. Q2 2015 state of the internet – security report. https://www.stateoftheinternet.com/resources-web-security-2015-q1-internet-security-report.html

  9. Wong, F., Tan, C.X.: A survey of trends in massive DDoS attacks and cloud-based mitigation. Int. J. Netw. Secur. Appl. (IJNSA) 6(3), 57–61 (2014)

    Google Scholar 

  10. Mantas, G., Stakhanova, N., Gonzalez, H., Jazi, H.H., Ghorbani, A.A.: Application layer DDoS attacks: taxonomy and survey. Int. J. Inf. Comput. Secur. 7(2–4), 216–239 (2014)

    Google Scholar 

  11. Sachdeva, M., Singh, G., Kumar, K., Singh, K.: Comprehensive survey of distributed defense techniques against DDoS problem. IJCSNS Int J Computer Sci Net Security 9(12), 7–15 (2009)

    Google Scholar 

  12. Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distribution denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)

    Article  Google Scholar 

  13. Singh, K., Singh, P., Kumar, K.: Application layer HTTP-GET floods DDoS attacks: research landscape and challenges. Int. J. Comput. Secur. 65, 344–372 (2016)

    Article  Google Scholar 

  14. Wang, C., Miu, T.T., Luo, X., Wang, J.: SkyShield based defence system against application layer DDoS attack. IEEE Trans. Inf. Forensics Secur. 13(3), 559–573 (2018)

    Article  Google Scholar 

  15. Bravo, S., Mauricio, D.: DDoS attack detection mechanism in the application layer using user features. In: IEEE International Conference on Information and Computer Technologies, vol. 5, no. 18 (2018). ISBN 978-1-5386

    Google Scholar 

  16. Wang, Y., Liu, L., Si, C., Sun, B.: A novel approach for countering application layer DDoS attack. IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), vol. 2, no. 17 (2017). ISBN 978-1-4673-8979

    Google Scholar 

  17. Meng, B., Andi, W., Jian, X., Fucai, Z.: DDOS attack detection system based on analysis of users’ behaviors for application layer. In: IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 5, no. 17 (2017). ISBN 978-1-3221

    Google Scholar 

  18. Naga Lakshmi, V., Begum, S.: DDoS defense enhanced flooding detection and confidence-based filtering method. IEEE Adv. Comput. Sci. Technol. 10(8), 2257–2272 (2017). ISSN 0973-6107

    Google Scholar 

  19. Jiang, M., Wang, C., Luo, X., Miu, M.T., Chen, T.: Characterizing the impacts of application layer DDoS attacks. In: IEEE International Conference on Web Services, vol. 7, no. 17 (2017). ISBN 978-1-5386-0752

    Google Scholar 

  20. Karadbhuje, A., Bhingarkar, S.P.: Detection of deceptive resource consumption over a website. IEEE Int. J. Comput. Eng. Appl. XI, 1–7 (2017). ISSN 2321-3469

    Google Scholar 

  21. Najafabadi, M.M., Khoshgoftaar, T.M., Calvert, C., Kemp, C.: User behavior anomaly detection for application layer DDoS attack. In: IEEE International Conference on Information Reuse and Integration (IRI), vol. 8, no. 17 (2017). ISBN 978-0-7695-6243

    Google Scholar 

  22. Zolotukhin, M., Hamalainen, T., Kokkonen, T., Siltane, J.: Increasing web service availability by detecting application-layer DDoS attacks in encrypted Traffic. In: IEEE International Conference on Telecommunications (ICT), vol. 8, no. 16 (2016). ISBN 978-1-5090-1990

    Google Scholar 

  23. Liao, Q., Li, H., Kang, S., Liu, C.: Application layer DDoS attack detection using cluster with the label based on sparse vector decomposition and rhythm matching. Secur. Commun. Netw. 8(17), 3111–3120 (2015)

    Article  Google Scholar 

  24. Singh, B., Kumar, K., Bhandari, A.: Simulation study of application layer DDoS attack. In: IEEE International Conference on Green Computing and Internet of Things (ICGCIoT), vol. 6, no. 16 (2015)

    Google Scholar 

  25. Stevanovic, D., Vlajic, N.: Application-layer DDoS in dynamic web-domains: building defenses against next-generation attack behavior. In: IEEE Conference on Communications and Network Security, vol. 1, no. 14 (2014). ISBN 978-14799-5890

    Google Scholar 

  26. Prasad, K.M., Reddy, A.R.M., Rao, K.V.: Detection and DDoS attacks: defense, detection and traceback mechanisms - a survey. Glob. J. Comput. Sci. Technol.: E Netw. Web Secur. 14(7), 15–32 (2014). Version 1.0 Year 2014

    Google Scholar 

  27. Najafabadi, M.M., Khoshgoftaar, T.M., Calvert, C., Kemp, C.: A text mining approach for anomaly detection in application layer DDoS attack. In: 2013 IEEE International Conference on Artificial Intelligence Research Society (2013)

    Google Scholar 

  28. Ni, T., Gu, X., Wang, H., Li, Y.: Real-time detection of application-layer DDoS attack using time series analysis. J. Control. Sci Eng. 13, 6 (2013)

    MATH  Google Scholar 

  29. Beitollahi, H., Deconinck, G.: Tackling application-layer DDoS attacks. In: 2012International Conference on Ambient Systems, Networks and Technologies, vol. 10, pp. 432–441 (2012)

    Article  Google Scholar 

  30. Bhange, A., Syad, A., Thakur, S.S.: DDoS attacks impact on network traffic and its detection approach. IEEE Int. J. Comput. Appl. 40(1), 36–40 (2012). ISSN 0975-8887

    Google Scholar 

  31. Durcekova, V., Schwartz, L., Shahmehri, N.: Sophisticated denial of service attacks aimed at application layer. In: 2012 IEEE International Conference ELEKTON, vol. 3, no. 12 (2012). ISBN 978-1-4673-1179

    Google Scholar 

  32. Babu, G.P., Jayavani, V., Mohan Rao, C.: Anomaly detection on user browsing behaviors using hidden semi-Markov model. IEEE JCSIT Int. J. Comput. Sci. Inf. Technol. 2(3), 1197–1201 (2011)

    Google Scholar 

  33. Wen, S., Jia, W., Zhou, W., Zhou, W., Xu, C.: CALD: surviving various application-layer DDoS attacks that mimic flash crowd. In: 2010 IEEE International Conference on Network and System Security, vol. 4, no. 10 (2010). ISBN 978-0-7695-4159

    Google Scholar 

  34. Xie, Y., Yu, S.-Z.: Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans. Netw. 17(1), 15–25 (2009)

    Article  Google Scholar 

  35. Soujanya, N.V.V., Mahesh, G.U.: Detecting network and application layer attacks in networks. IEEE Int. J. Res. Comput. Commun. Technol. 3(1), 1541–1545 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anshu Bhasin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, A., Bhasin, A. (2020). Critical Investigation on Application Layer-DDoS Attacks: Taxonomy and Parameter Efficacy. In: Singh, P., Panigrahi, B., Suryadevara, N., Sharma, S., Singh, A. (eds) Proceedings of ICETIT 2019. Lecture Notes in Electrical Engineering, vol 605. Springer, Cham. https://doi.org/10.1007/978-3-030-30577-2_82

Download citation

Publish with us

Policies and ethics