Browsing behavior mimicking attacks on popular web sites for large botnets


Autoria(s): Yu, Shui; Zhao, Guofeng; Guo, Song; Xiang, Yang; Vasilakos, Athanasios V.
Contribuinte(s)

[Unknown]

Data(s)

01/01/2011

Resumo

With the significant growth of botnets, application layer DDoS attacks are much easier to launch using large botnet, and false negative is always a problem for intrusion detection systems in real practice. In this paper, we propose a novel application layer DDoS attack tool, which mimics human browsing behavior following three statistical distributions, the Zipf-like distribution for web page popularity, the Pareto distribution for page request time interval for an individual browser, and the inverse Gaussian distribution for length of browsing path. A Markov model is established for individual bot to generate attack request traffic. Our experiments indicated that the attack traffic that generated by the proposed tool is pretty similar to the real traffic. As a result, the current statistics based detection algorithms will result high false negative rate in general. In order to counter this kind of attacks, we discussed a few preliminary solutions at the end of this paper.<br />

Identificador

http://hdl.handle.net/10536/DRO/DU:30042393

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30042393/yu-browsingbehavior-2011.pdf

http://dro.deakin.edu.au/eserv/DU:30042393/yu-confinfocom-evid-2011.pdf

http://dro.deakin.edu.au/eserv/DU:30042393/yu-specificrvwbrowsing-evid-2011.pdf

http://hdl.handle.net/10.1109/INFCOMW.2011.5928949

Direitos

2011, IEEE

Palavras-Chave #attack simulation #botnet #browsing behavior
Tipo

Conference Paper