TY - JOUR
T1 - Defending Application Layer DDoS Attacks via Multidimensional Parallelotope
AU - Zhao, Xiaolin
AU - Peng, Hui
AU - Li, Xiang
AU - Li, Yue
AU - Xue, Jingfeng
AU - Liang, Yaoyuan
AU - Pei, Mingzhe
N1 - Publisher Copyright:
© 2020 Xiaolin Zhao et al.
PY - 2020
Y1 - 2020
N2 - The Internet is more and more integrated into people's life; because of the complexity and fragility of the network environment, network attack presents a more and more serious trend. Application Layer DDoS (AL-DDoS) attack is the most complex form of DDoS attack, which is hindering the availability for the legitimate users by taking up a large number of requests of web server. The paper introduced the concept of behavior utility to portray the network. The concept of attack and defense utility was defined by a specific property which was the manifestation of the network risk after the offset of attack and defense. In the utility model, traffic metrics were mapped to the multidimensional parallelotope in the Euclidean space to express as a diagonal matrix. To determine the threshold status, the defense strategies of load balancing and limiting the maximum number of connections were used with different attack scales. Finally, the attack and defense utility value was calculated to evaluate the network risk level. The proposed method can master the capacity of network system against each attack means and the defense capability of network system. Its availability and accuracy are verified by comparing with the relevant works.
AB - The Internet is more and more integrated into people's life; because of the complexity and fragility of the network environment, network attack presents a more and more serious trend. Application Layer DDoS (AL-DDoS) attack is the most complex form of DDoS attack, which is hindering the availability for the legitimate users by taking up a large number of requests of web server. The paper introduced the concept of behavior utility to portray the network. The concept of attack and defense utility was defined by a specific property which was the manifestation of the network risk after the offset of attack and defense. In the utility model, traffic metrics were mapped to the multidimensional parallelotope in the Euclidean space to express as a diagonal matrix. To determine the threshold status, the defense strategies of load balancing and limiting the maximum number of connections were used with different attack scales. Finally, the attack and defense utility value was calculated to evaluate the network risk level. The proposed method can master the capacity of network system against each attack means and the defense capability of network system. Its availability and accuracy are verified by comparing with the relevant works.
UR - http://www.scopus.com/inward/record.url?scp=85099304369&partnerID=8YFLogxK
U2 - 10.1155/2020/6679304
DO - 10.1155/2020/6679304
M3 - Article
AN - SCOPUS:85099304369
SN - 1939-0114
VL - 2020
JO - Security and Communication Networks
JF - Security and Communication Networks
M1 - 6679304
ER -