dc.contributor.author | Zolotukhin, Mikhail | |
dc.contributor.author | Kokkonen, Tero | |
dc.contributor.author | Hämäläinen, Timo | |
dc.contributor.author | Siltanen, Jarmo | |
dc.date.accessioned | 2017-02-02T06:44:05Z | |
dc.date.available | 2017-02-02T06:44:05Z | |
dc.date.issued | 2016 | |
dc.identifier.citation | Zolotukhin, M., Kokkonen, T., Hämäläinen, T., & Siltanen, J. (2016). On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks. <i>International Journal of Digital Content Technology and its Applications</i>, <i>10</i>(5), 14-33. <a href="http://www.globalcis.org/dl/stamp.asp?file=http://www.globalcis.org/jdcta/ppl/JDCTA3787PPL.pdf" target="_blank">http://www.globalcis.org/dl/stamp.asp?file=http://www.globalcis.org/jdcta/ppl/JDCTA3787PPL.pdf</a> | |
dc.identifier.other | CONVID_26368695 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/52943 | |
dc.description.abstract | Application-layer denial-of-service attacks have become a serious threat to modern high-speed
computer networks and systems. Unlike network-layer attacks, application-layer attacks can be
performed by using legitimate requests from legitimately connected network machines which makes
these attacks undetectable for signature-based intrusion detection systems. Moreover, the attacks
may utilize protocols that encrypt the data of network connections in the application layer making it
even harder to detect attacker’s activity without decrypting users network traffic and violating their
privacy. In this paper, we present a method which allows us to timely detect various applicationlayer
attacks against a computer network. We focus on detection of the attacks that utilize encrypted
protocols by applying an anomaly-detection-based approach to statistics extracted from network
packets. Since network traffic decryption can violate ethical norms and regulations on privacy, the
detection method proposed analyzes network traffic without decryption. The method involves
construction of a model of normal user behavior by analyzing conversations between a server and
clients. The algorithm is self-adaptive and allows one to update the model every time when a new
portion of network traffic data is available. Once the model has been built, it can be applied to detect
various types of application-layer denial-of- service attacks. The proposed technique is evaluated
with realistic end user network traffic generated in our virtual network environment. Evaluation
results show that these attacks can be properly detected, while the number of false alarms remains
very low. | |
dc.language.iso | eng | |
dc.publisher | Advanced Institute of Convergence IT | |
dc.relation.ispartofseries | International Journal of Digital Content Technology and its Applications | |
dc.relation.uri | http://www.globalcis.org/dl/stamp.asp?file=http://www.globalcis.org/jdcta/ppl/JDCTA3787PPL.pdf | |
dc.subject.other | network security | |
dc.subject.other | intrusion detection | |
dc.subject.other | denial of service | |
dc.subject.other | anomaly detection | |
dc.subject.other | traffic clustering | |
dc.title | On Application-Layer DDoS Attack Detection in High-Speed Encrypted Networks | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-201701121137 | |
dc.contributor.laitos | Tietotekniikan laitos | fi |
dc.contributor.laitos | Department of Mathematical Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.date.updated | 2017-01-12T13:15:04Z | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 14-33 | |
dc.relation.issn | 1975-9339 | |
dc.relation.numberinseries | 5 | |
dc.relation.volume | 10 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © the Authors & Advanced Institute of Convergence IT, 2016. This is an open access article published by Convergence Information Society. | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.type.okm | A1 | |