Loading…

HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm

The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users. The attack scenario is to flood the packets immensely. If the attack source...

Full description

Saved in:
Bibliographic Details
Published in:Applied computing & informatics 2019-01, Vol.15 (1), p.59-66
Main Authors: Sreeram, Indraneel, Vuppala, Venkata Praveen Kumar
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c3213-5343dd1ec4977205fe50c40050c5e9a37263af60551a3e27818d5a08a374aae3
cites cdi_FETCH-LOGICAL-c3213-5343dd1ec4977205fe50c40050c5e9a37263af60551a3e27818d5a08a374aae3
container_end_page 66
container_issue 1
container_start_page 59
container_title Applied computing & informatics
container_volume 15
creator Sreeram, Indraneel
Vuppala, Venkata Praveen Kumar
description The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users. The attack scenario is to flood the packets immensely. If the attack source is single, then the attack is referred as denial of service (DOS) and if attack is sourced from divergent servers, then it is referred as DDOS. Over a decade many of the researchers considered the detection and prevention of DDOS attack as research objective and succeeded to deliver few significant DDOS detection and prevention strategies. How fast and early detection of DDOS attack is done in streaming network transactions is still a significant research objective in present level of internet usage. Unfortunately the current benchmarking DDOS attack detection strategies are failing to justify the objective called “fast and early detection of DDOS attack”. In order to this, in this paper we devised a Bio-Inspired Anomaly based application layer DDoS attack (App-DDOS Attack) detection that is in the aim of achieving fast and early detection. The proposed model is a bio-inspired bat algorithm that used to achieve the fast and early detection of the App-DDOS by HTTP flood. The experiments were carried out on bench marking CAIDA dataset and the results delivered are boosting the significance of the proposed model to achieve the objective of the paper.
doi_str_mv 10.1016/j.aci.2017.10.003
format article
fullrecord <record><control><sourceid>elsevier_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_26633af52a03438eb0f1949bbaa33179</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S2210832717301655</els_id><doaj_id>oai_doaj_org_article_26633af52a03438eb0f1949bbaa33179</doaj_id><sourcerecordid>S2210832717301655</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3213-5343dd1ec4977205fe50c40050c5e9a37263af60551a3e27818d5a08a374aae3</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhHMAiar0Abj5BRLWdn7FCVVAK1WCQ-_W1tm0Dmkc2Qapb4_bIo5cbM2s5lt7kuSBQ8aBl499htpkAngVdQYgb5KZEBzSWorqLll43wPEqay5kLNkXG23H6wbrG0ZhoD6k7UUSAdjR2ZGhtM0GI0XOeCJHPvyZtyzI-qDGYkNhG68GBSc0Z7h2LKdsTHrJ-MoCgwMh711JhyO98lth4Onxe89T7avL9vlKt28v62Xz5tUS8FlWshcti0nnTdVJaDoqACdA8SzoAZlJUqJXQlFwVGSqGpetwVCHSc5Isl5sr5iW4u9mpw5ojspi0ZdDOv2Cl0weiAlylJGViEQ4tKadtDxJm92O0QpedVEFr-ytLPeO-r-eBzUuXLVq1i5Old-tmLlMfN0zVD847chp7w2NGpqYyU6xFeYf9I_c3WKwg</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm</title><source>ScienceDirect Journals</source><source>DOAJ Directory of Open Access Journals</source><creator>Sreeram, Indraneel ; Vuppala, Venkata Praveen Kumar</creator><creatorcontrib>Sreeram, Indraneel ; Vuppala, Venkata Praveen Kumar</creatorcontrib><description>The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users. The attack scenario is to flood the packets immensely. If the attack source is single, then the attack is referred as denial of service (DOS) and if attack is sourced from divergent servers, then it is referred as DDOS. Over a decade many of the researchers considered the detection and prevention of DDOS attack as research objective and succeeded to deliver few significant DDOS detection and prevention strategies. How fast and early detection of DDOS attack is done in streaming network transactions is still a significant research objective in present level of internet usage. Unfortunately the current benchmarking DDOS attack detection strategies are failing to justify the objective called “fast and early detection of DDOS attack”. In order to this, in this paper we devised a Bio-Inspired Anomaly based application layer DDoS attack (App-DDOS Attack) detection that is in the aim of achieving fast and early detection. The proposed model is a bio-inspired bat algorithm that used to achieve the fast and early detection of the App-DDOS by HTTP flood. The experiments were carried out on bench marking CAIDA dataset and the results delivered are boosting the significance of the proposed model to achieve the objective of the paper.</description><identifier>ISSN: 2210-8327</identifier><identifier>DOI: 10.1016/j.aci.2017.10.003</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Application Layer DDoS (APP-DDoS) ; Bio inspired approaches ; Denial of Service (DoS) attacks ; Distributed DoS (DDoS) attacks</subject><ispartof>Applied computing &amp; informatics, 2019-01, Vol.15 (1), p.59-66</ispartof><rights>2017 The Authors</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c3213-5343dd1ec4977205fe50c40050c5e9a37263af60551a3e27818d5a08a374aae3</citedby><cites>FETCH-LOGICAL-c3213-5343dd1ec4977205fe50c40050c5e9a37263af60551a3e27818d5a08a374aae3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S2210832717301655$$EHTML$$P50$$Gelsevier$$Hfree_for_read</linktohtml><link.rule.ids>314,776,780,860,2096,3536,27901,27902,45756</link.rule.ids></links><search><creatorcontrib>Sreeram, Indraneel</creatorcontrib><creatorcontrib>Vuppala, Venkata Praveen Kumar</creatorcontrib><title>HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm</title><title>Applied computing &amp; informatics</title><description>The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users. The attack scenario is to flood the packets immensely. If the attack source is single, then the attack is referred as denial of service (DOS) and if attack is sourced from divergent servers, then it is referred as DDOS. Over a decade many of the researchers considered the detection and prevention of DDOS attack as research objective and succeeded to deliver few significant DDOS detection and prevention strategies. How fast and early detection of DDOS attack is done in streaming network transactions is still a significant research objective in present level of internet usage. Unfortunately the current benchmarking DDOS attack detection strategies are failing to justify the objective called “fast and early detection of DDOS attack”. In order to this, in this paper we devised a Bio-Inspired Anomaly based application layer DDoS attack (App-DDOS Attack) detection that is in the aim of achieving fast and early detection. The proposed model is a bio-inspired bat algorithm that used to achieve the fast and early detection of the App-DDOS by HTTP flood. The experiments were carried out on bench marking CAIDA dataset and the results delivered are boosting the significance of the proposed model to achieve the objective of the paper.</description><subject>Application Layer DDoS (APP-DDoS)</subject><subject>Bio inspired approaches</subject><subject>Denial of Service (DoS) attacks</subject><subject>Distributed DoS (DDoS) attacks</subject><issn>2210-8327</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>DOA</sourceid><recordid>eNp9kM1OwzAQhHMAiar0Abj5BRLWdn7FCVVAK1WCQ-_W1tm0Dmkc2Qapb4_bIo5cbM2s5lt7kuSBQ8aBl499htpkAngVdQYgb5KZEBzSWorqLll43wPEqay5kLNkXG23H6wbrG0ZhoD6k7UUSAdjR2ZGhtM0GI0XOeCJHPvyZtyzI-qDGYkNhG68GBSc0Z7h2LKdsTHrJ-MoCgwMh711JhyO98lth4Onxe89T7avL9vlKt28v62Xz5tUS8FlWshcti0nnTdVJaDoqACdA8SzoAZlJUqJXQlFwVGSqGpetwVCHSc5Isl5sr5iW4u9mpw5ojspi0ZdDOv2Cl0weiAlylJGViEQ4tKadtDxJm92O0QpedVEFr-ytLPeO-r-eBzUuXLVq1i5Old-tmLlMfN0zVD847chp7w2NGpqYyU6xFeYf9I_c3WKwg</recordid><startdate>201901</startdate><enddate>201901</enddate><creator>Sreeram, Indraneel</creator><creator>Vuppala, Venkata Praveen Kumar</creator><general>Elsevier B.V</general><general>Emerald Publishing</general><scope>6I.</scope><scope>AAFTH</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>DOA</scope></search><sort><creationdate>201901</creationdate><title>HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm</title><author>Sreeram, Indraneel ; Vuppala, Venkata Praveen Kumar</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3213-5343dd1ec4977205fe50c40050c5e9a37263af60551a3e27818d5a08a374aae3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Application Layer DDoS (APP-DDoS)</topic><topic>Bio inspired approaches</topic><topic>Denial of Service (DoS) attacks</topic><topic>Distributed DoS (DDoS) attacks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sreeram, Indraneel</creatorcontrib><creatorcontrib>Vuppala, Venkata Praveen Kumar</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>CrossRef</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>Applied computing &amp; informatics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sreeram, Indraneel</au><au>Vuppala, Venkata Praveen Kumar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm</atitle><jtitle>Applied computing &amp; informatics</jtitle><date>2019-01</date><risdate>2019</risdate><volume>15</volume><issue>1</issue><spage>59</spage><epage>66</epage><pages>59-66</pages><issn>2210-8327</issn><abstract>The internet network is mostly victimized to the Distributed Denial of Service (DDOS) attack, which is one that intentionally occupies the computing resources and bandwidth in order to deny that services to potential users. The attack scenario is to flood the packets immensely. If the attack source is single, then the attack is referred as denial of service (DOS) and if attack is sourced from divergent servers, then it is referred as DDOS. Over a decade many of the researchers considered the detection and prevention of DDOS attack as research objective and succeeded to deliver few significant DDOS detection and prevention strategies. How fast and early detection of DDOS attack is done in streaming network transactions is still a significant research objective in present level of internet usage. Unfortunately the current benchmarking DDOS attack detection strategies are failing to justify the objective called “fast and early detection of DDOS attack”. In order to this, in this paper we devised a Bio-Inspired Anomaly based application layer DDoS attack (App-DDOS Attack) detection that is in the aim of achieving fast and early detection. The proposed model is a bio-inspired bat algorithm that used to achieve the fast and early detection of the App-DDOS by HTTP flood. The experiments were carried out on bench marking CAIDA dataset and the results delivered are boosting the significance of the proposed model to achieve the objective of the paper.</abstract><pub>Elsevier B.V</pub><doi>10.1016/j.aci.2017.10.003</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2210-8327
ispartof Applied computing & informatics, 2019-01, Vol.15 (1), p.59-66
issn 2210-8327
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_26633af52a03438eb0f1949bbaa33179
source ScienceDirect Journals; DOAJ Directory of Open Access Journals
subjects Application Layer DDoS (APP-DDoS)
Bio inspired approaches
Denial of Service (DoS) attacks
Distributed DoS (DDoS) attacks
title HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T21%3A23%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=HTTP%20flood%20attack%20detection%20in%20application%20layer%20using%20machine%20learning%20metrics%20and%20bio%20inspired%20bat%20algorithm&rft.jtitle=Applied%20computing%20&%20informatics&rft.au=Sreeram,%20Indraneel&rft.date=2019-01&rft.volume=15&rft.issue=1&rft.spage=59&rft.epage=66&rft.pages=59-66&rft.issn=2210-8327&rft_id=info:doi/10.1016/j.aci.2017.10.003&rft_dat=%3Celsevier_doaj_%3ES2210832717301655%3C/elsevier_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c3213-5343dd1ec4977205fe50c40050c5e9a37263af60551a3e27818d5a08a374aae3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true