@article{ART002129585},
author={Koohong Kang},
title={Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2016},
volume={21},
number={7},
pages={1-8}
TY - JOUR
AU - Koohong Kang
TI - Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data
JO - Journal of The Korea Society of Computer and Information
PY - 2016
VL - 21
IS - 7
PB - The Korean Society Of Computer And Information
SP - 1
EP - 8
SN - 1598-849X
AB - Nowadays, distributed denial of service (DDoS) attacks on web sites reward attackers financially or politically because our daily lifes tightly depends on web services such as on-line banking, e-mail, and e-commerce. One of DDoS attacks to web servers is called HTTP-GET flood attack which is becoming more serious. Most existing techniques are running on the application layer because these attack packets use legitimate network protocols and HTTP payloads; that is, network-level intrusion detection systems cannot distinguish legitimate HTTP-GET requests and malicious requests. In this paper, we propose a practical detection technique against HTTP-GET flood attacks, based on the access behavior of inline objects in a webpage using NetFlow data. In particular, our proposed scheme is working on the network layer without any application-specific deep packet inspections. We implement the proposed detection technique and evaluate the ability of attack detection on a simple test environment using NetBot attacker. Moreover, we also show that our approach must be applicable to real field by showing the test profile captured on a well-known e-commerce site. The results show that our technique can detect the HTTP-GET flood attack effectively.
KW - HTTP-GET flood attack;Internet security;NetFlow
DO -
UR -
ER -
Koohong Kang. (2016). Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data. Journal of The Korea Society of Computer and Information, 21(7), 1-8.
Koohong Kang. 2016, "Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data", Journal of The Korea Society of Computer and Information, vol.21, no.7 pp.1-8.
Koohong Kang "Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data" Journal of The Korea Society of Computer and Information 21.7 pp.1-8 (2016) : 1.
Koohong Kang. Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data. 2016; 21(7), 1-8.
Koohong Kang. "Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data" Journal of The Korea Society of Computer and Information 21, no.7 (2016) : 1-8.
Koohong Kang. Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data. Journal of The Korea Society of Computer and Information, 21(7), 1-8.
Koohong Kang. Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data. Journal of The Korea Society of Computer and Information. 2016; 21(7) 1-8.
Koohong Kang. Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data. 2016; 21(7), 1-8.
Koohong Kang. "Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data" Journal of The Korea Society of Computer and Information 21, no.7 (2016) : 1-8.