Review of Recent Detection Methods for HTTP DDoS Attack

With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures. Web servers that run on Hypertext Transfer Protocol (HTTP) are exposed to denial-of-service (DoS) attacks. A so...

Full description

Saved in:
Bibliographic Details
Main Authors: Ghafar A. Jaafar, Shahidan M. Abdullah, Saifuladli Ismail
Format: Article
Language:English
Published: Wiley 2019-01-01
Series:Journal of Computer Networks and Communications
Online Access:http://dx.doi.org/10.1155/2019/1283472
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850231709495197696
author Ghafar A. Jaafar
Shahidan M. Abdullah
Saifuladli Ismail
author_facet Ghafar A. Jaafar
Shahidan M. Abdullah
Saifuladli Ismail
author_sort Ghafar A. Jaafar
collection DOAJ
description With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures. Web servers that run on Hypertext Transfer Protocol (HTTP) are exposed to denial-of-service (DoS) attacks. A sophisticated version of this attack known as distributed denial of service (DDOS) is among the most dangerous Internet attacks, with the ability to overwhelm a web server, thereby slowing it down and potentially taking it down completely. This paper reviewed 12 recent detection of DDoS attack at the application layer published between January 2014 and December 2018. A summary of each detection method is summarised in table view, along with in-depth critical analysis, for future studies to conduct research pertaining to detection of HTTP DDoS attack.
format Article
id doaj-art-02ab0a2756cc4c69b2fa334135ab4b93
institution OA Journals
issn 2090-7141
2090-715X
language English
publishDate 2019-01-01
publisher Wiley
record_format Article
series Journal of Computer Networks and Communications
spelling doaj-art-02ab0a2756cc4c69b2fa334135ab4b932025-08-20T02:03:27ZengWileyJournal of Computer Networks and Communications2090-71412090-715X2019-01-01201910.1155/2019/12834721283472Review of Recent Detection Methods for HTTP DDoS AttackGhafar A. Jaafar0Shahidan M. Abdullah1Saifuladli Ismail2Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia (UTM), 54100 Kuala Lumpur, MalaysiaRazak Faculty of Technology and Informatics, Universiti Teknologi Malaysia (UTM), 54100 Kuala Lumpur, MalaysiaRazak Faculty of Technology and Informatics, Universiti Teknologi Malaysia (UTM), 54100 Kuala Lumpur, MalaysiaWith increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures. Web servers that run on Hypertext Transfer Protocol (HTTP) are exposed to denial-of-service (DoS) attacks. A sophisticated version of this attack known as distributed denial of service (DDOS) is among the most dangerous Internet attacks, with the ability to overwhelm a web server, thereby slowing it down and potentially taking it down completely. This paper reviewed 12 recent detection of DDoS attack at the application layer published between January 2014 and December 2018. A summary of each detection method is summarised in table view, along with in-depth critical analysis, for future studies to conduct research pertaining to detection of HTTP DDoS attack.http://dx.doi.org/10.1155/2019/1283472
spellingShingle Ghafar A. Jaafar
Shahidan M. Abdullah
Saifuladli Ismail
Review of Recent Detection Methods for HTTP DDoS Attack
Journal of Computer Networks and Communications
title Review of Recent Detection Methods for HTTP DDoS Attack
title_full Review of Recent Detection Methods for HTTP DDoS Attack
title_fullStr Review of Recent Detection Methods for HTTP DDoS Attack
title_full_unstemmed Review of Recent Detection Methods for HTTP DDoS Attack
title_short Review of Recent Detection Methods for HTTP DDoS Attack
title_sort review of recent detection methods for http ddos attack
url http://dx.doi.org/10.1155/2019/1283472
work_keys_str_mv AT ghafarajaafar reviewofrecentdetectionmethodsforhttpddosattack
AT shahidanmabdullah reviewofrecentdetectionmethodsforhttpddosattack
AT saifuladliismail reviewofrecentdetectionmethodsforhttpddosattack