Method of detection of http attacks on a smart home using the algebraic matching method
Abstract
All international and domestic spheres of production and service are developing at a frantic pace, and in modern life it is no longer possible to imagine any enterprise or government institution without connecting to the Internet and using cloud services. The development of digital technologies forces the application of innovative solutions in everyday life and entertainment. In our modern age with society’s current dependence on high-tech gadgets and the Internet, we can definitely mark the emergence of smart home technology. In this regard, interest in private information on the network is growing, more approaches to attacks are appearing, cybercrime is becoming more organized, and its level is increasing. This work aims to show the types of cyber attacks on smart homes, as well as tools and methods for their detection, in particular, the method of mathematical comparison, which provides an opportunity to create stable web applications and services, taking into account the requirements for their security and reliability.
Prombles in programming 2022; 3-4: 396-402
Keywords
Full Text:
PDFReferences
Aborujilah and S. Musa, "Cloud-based DDoS HTTP attack detection using covariance matrix approach," Journal of Computer Networks and Communications, vol. 2017, Article ID 7674594, 8 pages, 2017.
https://doi.org/10.1155/2017/7674594
CISCO SYSTEMS INC. NetRanger - Enterprise-scale, Real-time, Network Intrusion Detection System. 1998. Available from the company's website at http://www.cisco.com/warp/public/751/netranger/netra_ds.htm
FIELDING, R. wwwstat: Httpd logfile analysis software. November 1996. http://www.ics.uci.edu/pub/websoft/wwwstat/
Ghafar A. Jaafar, Shahidan M. Abdullah, Saifuladli Ismail "Review of Recent Detection Methods for HTTP DDoS Attack" Journal of Computer Networks and Communications, 2019
https://doi.org/10.1155/2019/1283472
HANSEN, S. E., AND ATKINS, E. T. Automated system monitoring and notification with swatch. In Proceedings of the seventh Systems Administration Conference (LISA '93) (Monterey, CA, November 1993).
https://anuragbhatia.com/2017/10/networking/isp-column/ultra-fast-automated-ddos-detection-mitigation/
http://etutorials.org/Networking/802.11+security.+wi-fi+protected+access+and+802.11i/Part+I+What+Everyone+Should+Know/Chapter+4.+ Different+Types+of+Attack/Classification+of+Attacks/
https://fastnetmon.com/
https://www.findbestopensource.com/product/fail2ban-fail2ban
https://www.findbestopensource.com/product/fuzzdb-project-fuzzdb
https://www.findbestopensource.com/product/snort
https://www.forcepoint.com/cyber-edu/network-attack
https://www.tripwire.com/state-of-security/vulnerability-management/3-types-of-network-attacks/
INTERNET SECURITY SYSTEMS, INC. RealSecure.1997. Internet http://www.iss.net/prod/rsds.html
I. Sreeram and V. P. K. Vuppala, "HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm," Applied Computing and Informatics, 2017, in press.
K. Singh, P. Singh, and K. Kumar, "User behavior analytics-based classification of application layer HTTP-GET flood attacks," Journal of Network and Computer Applications, vol. 112, pp. 97-114, 2018.
https://doi.org/10.1016/j.jnca.2018.03.030
NETWORK ASSOCIATES INC. Cybercop server. 1998. Available from the company's website at http://www.nai.com/products/security/ cybercopsvr/index.asp
OWASP. Owasp modsecurity core rule set project. [Online]. Available: https://www.owasp.org/index.php/
PAXSON, V. Bro: A system for detecting network intruders in realtime. In Proceedings of the 7th USENIX Security Symposium (San Antonio, TX, January 1998).
RANUM, M. J., LANDFIELD, K., STOLARCHUK, M., SIENKIEWICZ, M., LAMBETH, A., AND WALL, E. Implementing a generalized tool for network monitoring. In Proceedings of the Eleventh Systems Administration Conference (LISA '97) (San Diego, CA, October 1997).
Rodrigo Martınez, Enhancing web application attack detection using machine learning, Instituto de Computaci ́on, Facultad de Ingenier ́ıa Universidad de la Rep ́ublica, Uruguay
S. Behal, K. Kumar, and M. Sachdeva, "D-FACE: an anomaly based distributed approach for early detection of DDoS attacks and flash events," Journal of Network and Computer Applications, vol. 111, pp. 49-63, 2018.
https://doi.org/10.1016/j.jnca.2018.03.024
S. Hameed and U. Ali, "HADEC: hadoop-based live DDoS detection framework", EURASIP Journal on Information Security, vol. 2018, no. 1, p. 11, 2018.
https://doi.org/10.1186/s13635-018-0081-z
TAYLOR, G. Autobuse. Internet, 1998. http://www.picante.com/gtaylor/autobuse/
TUININGA, C., AND HOLAK, R. Logscanner. 1998. Internet http://logscanner.tradeservices.com/index.html
DOI: https://doi.org/10.15407/pp2022.03-04.396
Refbacks
- There are currently no refbacks.