Skip to main content

Enhancement of Preventing Application Layer Based on DDOS Attacks by Using Hidden Semi-Markov Model

  • Conference paper
  • First Online:
Genetic and Evolutionary Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 387))

Abstract

In this paper, we discuss about the classification of DDOS, which are widely regarded as a major threat to the Internet. Nature of DDoS attack is difficult to defend against and will continue to be an attractive and effective form of attack. Though many solutions have been proposed, the problem has not been solved yet. The defense approaches can be classified as protection, detection and prevention. Therefore, for information security, it is needed to create own DDoS defense system to solve the DDoS attack problems. The aim of the research work is to protect Distributed Denial of Service attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Douligeris, C., Mitrokotsa, A.: DDoS Attacks and Defense Mechanisms: Classification and State of the Art. Computer Journal of Networks 44(5), 643–666 (2004)

    Article  Google Scholar 

  2. Babu, G.P., Jayavani, V., Mohan Rao, C.P.V.N.J.: Anomaly Detection On User Browsing Behaviors Using Hidden Semi-Markov Model. IJCSIT. ISSN:0975-9646

    Google Scholar 

  3. Bächer, P., et al.: Know your enemy: Tracking botnets. The Honeynet Project and Research Alliance, Tech. Rep. (2005)

    Google Scholar 

  4. Garcia-Teodoro, P., Diaz-Verdejo, J., MaciaFernandez, G., Vazquez, E.: Anomaly-Based Network Intrusion Detection: Techniques. Systems and Challenges. Computers and Security 28(1–2), 18–28 (2009)

    Article  Google Scholar 

  5. Radware Ltd. DDoS survival handbook (2013)

    Google Scholar 

  6. Lee, S., Kim, G., Kim, S.: Sequence-OrderIndependent Network Profiling for Detecting Application Layer DDos Attacks. EURASIP J. Wireless Comm. and Networking 2011(1), 50 (2011)

    Article  Google Scholar 

  7. Yu, S., Zhou, W., Doss, R., Jia, W.: Traceback of DDos Attacks Using Entropy Variations. IEEE Trans. Parallel and Distributed Systems 22(3), pp. 412–442

    Google Scholar 

  8. Peng, T., Leckie, C., Ramamohanarao, K.: Survey of Network Based Defense Mechanisms Countering the Dos and DDos Problems. ACM Computing Surveys 39(1), 3 (May 2007) (March 2011)

    Google Scholar 

  9. Yi, X., Shunzheng, Y.: A dynamic anomaly detection model for web user behavior based on HsMM. In: Proc. 10th Int. Conf. Computer Supported Cooperative Work in Design (CSCWD 2006), Nanjing, China, vol. 2, pp. 811–816, May 2006

    Google Scholar 

  10. Xie, Y., Yu, S.: A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors. IEEE/ACM Trans. Networking 17(1), 54–65 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyaw Zaw Ye .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Oo, K.K., Ye, K.Z., Tun, H., Lin, K.Z., Portnov, E.M. (2016). Enhancement of Preventing Application Layer Based on DDOS Attacks by Using Hidden Semi-Markov Model. In: Zin, T., Lin, JW., Pan, JS., Tin, P., Yokota, M. (eds) Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, vol 387. Springer, Cham. https://doi.org/10.1007/978-3-319-23204-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23204-1_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23203-4

  • Online ISBN: 978-3-319-23204-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics