Abstract
In this paper, we discuss about the classification of DDOS, which are widely regarded as a major threat to the Internet. Nature of DDoS attack is difficult to defend against and will continue to be an attractive and effective form of attack. Though many solutions have been proposed, the problem has not been solved yet. The defense approaches can be classified as protection, detection and prevention. Therefore, for information security, it is needed to create own DDoS defense system to solve the DDoS attack problems. The aim of the research work is to protect Distributed Denial of Service attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Douligeris, C., Mitrokotsa, A.: DDoS Attacks and Defense Mechanisms: Classification and State of the Art. Computer Journal of Networks 44(5), 643–666 (2004)
Babu, G.P., Jayavani, V., Mohan Rao, C.P.V.N.J.: Anomaly Detection On User Browsing Behaviors Using Hidden Semi-Markov Model. IJCSIT. ISSN:0975-9646
Bächer, P., et al.: Know your enemy: Tracking botnets. The Honeynet Project and Research Alliance, Tech. Rep. (2005)
Garcia-Teodoro, P., Diaz-Verdejo, J., MaciaFernandez, G., Vazquez, E.: Anomaly-Based Network Intrusion Detection: Techniques. Systems and Challenges. Computers and Security 28(1–2), 18–28 (2009)
Radware Ltd. DDoS survival handbook (2013)
Lee, S., Kim, G., Kim, S.: Sequence-OrderIndependent Network Profiling for Detecting Application Layer DDos Attacks. EURASIP J. Wireless Comm. and Networking 2011(1), 50 (2011)
Yu, S., Zhou, W., Doss, R., Jia, W.: Traceback of DDos Attacks Using Entropy Variations. IEEE Trans. Parallel and Distributed Systems 22(3), pp. 412–442
Peng, T., Leckie, C., Ramamohanarao, K.: Survey of Network Based Defense Mechanisms Countering the Dos and DDos Problems. ACM Computing Surveys 39(1), 3 (May 2007) (March 2011)
Yi, X., Shunzheng, Y.: A dynamic anomaly detection model for web user behavior based on HsMM. In: Proc. 10th Int. Conf. Computer Supported Cooperative Work in Design (CSCWD 2006), Nanjing, China, vol. 2, pp. 811–816, May 2006
Xie, Y., Yu, S.: A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors. IEEE/ACM Trans. Networking 17(1), 54–65 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Oo, K.K., Ye, K.Z., Tun, H., Lin, K.Z., Portnov, E.M. (2016). Enhancement of Preventing Application Layer Based on DDOS Attacks by Using Hidden Semi-Markov Model. In: Zin, T., Lin, JW., Pan, JS., Tin, P., Yokota, M. (eds) Genetic and Evolutionary Computing. Advances in Intelligent Systems and Computing, vol 387. Springer, Cham. https://doi.org/10.1007/978-3-319-23204-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-23204-1_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23203-4
Online ISBN: 978-3-319-23204-1
eBook Packages: EngineeringEngineering (R0)