Proactive Defense Against HTTP Flood Attacks Based on Watching Web Log
DOI:
CSTR:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    HTTP flood attacks mimicking normal access behavior are difficult to discovered, it consumes web server’s resources and brings hidden danger on information security, a method of proactive defense against HTTP floods is provided. Rewrite URL to record CookieId and SessionId of HTTP requests into Web log; analysis Web log at regular time, identify user according CookieId and SessionId, indentify puppet computers using request time characteristic; process HTTP requests in advance to keep out the requests from the puppet computers. This method is low cost and easy to implement, practice proved its validity.

    Reference
    Related
    Cited by
Get Citation

袁志.基于日志监视主动防御 HTTP 泛洪攻击.计算机系统应用,2012,21(5):189-191

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:August 21,2011
  • Revised:September 15,2011
  • Adopted:
  • Online:
  • Published:
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063