• DocumentCode
    3658438
  • Title

    Web Server Protection against Application Layer DDoS Attacks Using Machine Learning and Traffic Authentication

  • Author

    Jema David Ndibwile;A. Govardhan;Kazuya Okada;Youki Kadobayashi

  • Author_Institution
    Sch. of IT, Jawaharlal Nehru Technol. Univ., Hyderabad, India
  • Volume
    3
  • fYear
    2015
  • fDate
    7/1/2015 12:00:00 AM
  • Firstpage
    261
  • Lastpage
    267
  • Abstract
    Application layer Distributed Denial of Service (DDoS) attacks are among the deadliest kinds of attacks that have significant impact on destination servers and networks due to their ability to be launched with minimal computational resources to cause an effect of high magnitude. Commercial and government Web servers have become the primary target of these kinds of attacks, with the recent mitigation efforts struggling to deaden the problem efficiently. Most application layer DDoS attacks can successfully mimic legitimate traffic without being detected by Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). IDSs and IPSs can also mistake a normal and legitimate activity for a malicious one, producing a False Positive (FP) that affects Web users if it is ignored or dropped. False positives in a large and complex network topology can potentially be dangerous as they may cause IDS/IPS to block the user´s benign traffic. Our focus and contributions in this paper are first, to mitigate the undetected malicious traffic mimicking legitimate traffic and developing a special anti-DDoS module for general and specific DDoS tools attacks by using a trained classifier in a random tree machine-learning algorithm. We use labeled datasets to generate rules to incorporate and fine-tune existing IDS/IPS such as Snort. Secondly, we further assist IDS/IPS by processing traffic that is classified as malicious by the IDS/IPS in order to identify FPs and route them to their intended destinations. To achieve this, our approach uses active authentication of traffic source of both legitimate and malicious traffic at the Bait and Decoy server respectively before destined to the Web server.
  • Keywords
    "Web servers","Computer crime","Training","Authentication","Logic gates"
  • Publisher
    ieee
  • Conference_Titel
    Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual
  • Electronic_ISBN
    0730-3157
  • Type

    conf

  • DOI
    10.1109/COMPSAC.2015.240
  • Filename
    7273365