Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior

Xie, Yi, Tang, S., Xiang, Y. and Hu, J. 2013, Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior, IEEE transactions on parallel and distributed systems, vol. 24, no. 7, pp. 1401-1410, doi: 10.1109/TPDS.2012.232.

Attached Files
Name Description MIMEType Size Downloads

Title Resisting web proxy-based HTTP attacks by temporal and spatial locality behavior
Author(s) Xie, Yi
Tang, S.
Xiang, Y.ORCID iD for Xiang, Y.
Hu, J.
Journal name IEEE transactions on parallel and distributed systems
Volume number 24
Issue number 7
Start page 1401
End page 1410
Total pages 10
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2013
ISSN 1045-9219
Keyword(s) attack detection
attack response
distributed denial of service attack
Traffic analysis
traffic modeling
Summary A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the scheme independent of the traffic intensity and frequently varying Web contents. A nonlinear mapping function is introduced to protect weak signals from the interference of infrequent large values. Then, a new hidden semi-Markov model parameterized by Gaussian-mixture and Gamma distributions is proposed to describe the time-varying traffic behavior of Web proxies. The new method reduces the number of parameters to be estimated, and can characterize the dynamic evolution of the proxy-to-server traffic rather than the static statistics. Two diagnosis approaches at different scales are introduced to meet the requirement of both fine-grained and coarse-grained detection. Soft control is a novel attack response method proposed in this work. It converts a suspicious traffic into a relatively normal one by behavior reshaping rather than rudely discarding. This measure can protect the quality of services of legitimate users. The experiments confirm the effectiveness of the proposed scheme.
Language eng
DOI 10.1109/TPDS.2012.232
Field of Research 080503 Networking and Communications
080501 Distributed and Grid Systems
080199 Artificial Intelligence and Image Processing not elsewhere classified
Socio Economic Objective 890202 Application Tools and System Utilities
HERDC Research category C1 Refereed article in a scholarly journal
Copyright notice ©2013, IEEE
Persistent URL

Document type: Journal Article
Collections: School of Information Technology
2018 ERA Submission
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 10 times in TR Web of Science
Scopus Citation Count Cited 17 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 435 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Tue, 27 Aug 2013, 12:21:12 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact