38
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

      research-article
      1 , * , 2
      The Scientific World Journal
      Hindawi Publishing Corporation

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS) and distributed denial of service (DDoS) attacks. Despite many researchers' efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF). The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework's schemes (layers). Firstly, an outer blocking (OB) scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA) scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB) scheme is to eliminate high rate DDoS (HR-DDoS) and flash crowd (FC) attacks. Compared to the previous researches, our framework's design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

          Related collections

          Most cited references57

          • Record: found
          • Abstract: not found
          • Article: not found

          Traceback of DDoS Attacks Using Entropy Variations

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Modeling Human Behavior for Defense Against Flash-Crowd Attacks

                Bookmark

                Author and article information

                Journal
                ScientificWorldJournal
                ScientificWorldJournal
                TSWJ
                The Scientific World Journal
                Hindawi Publishing Corporation
                2356-6140
                1537-744X
                2015
                3 May 2015
                : 2015
                : 238230
                Affiliations
                1Faculty of Computing, Universiti Teknologi Malaysia (UTM), 81310 Skudai, Johor, Malaysia
                2Advanced Informatics School, Universiti Teknologi Malaysia, 54100 Kuala Lumpur, Malaysia
                Author notes
                *Mohammed A. Saleh: mabbsaleh@ 123456gmail.com

                Academic Editor: Adeel Javed

                Article
                10.1155/2015/238230
                4433694
                35ae778e-0c91-4a4c-961a-d4a5e7c9af20
                Copyright © 2015 M. A. Saleh and A. Abdul Manaf.

                This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

                History
                : 24 June 2014
                : 29 August 2014
                : 7 September 2014
                Categories
                Research Article

                Uncategorized
                Uncategorized

                Comments

                Comment on this article