Method of detection of http attacks on a smart home using the algebraic matching method

V.O. Gorbatiuk, S.O. Gorbatiuk


All international and domestic spheres of production and service are developing at a frantic pace, and in modern life it is no longer possible to imagine any enterprise or government institution without connecting to the Internet and using cloud services. The development of digital technologies forces the application of innovative solutions in everyday life and entertainment. In our modern age with society’s current dependence on high-tech gadgets and the Internet, we can definitely mark the emergence of smart home technology. In this regard, interest in private information on the network is growing, more approaches to attacks are appearing, cybercrime is becoming more organized, and its level is increasing. This work aims to show the types of cyber attacks on smart homes, as well as tools and methods for their detection, in particular, the method of mathematical comparison, which provides an opportunity to create stable web applications and services, taking into account the requirements for their security and reliability.

Prombles in programming 2022; 3-4: 396-402


cyber security; HTTP attacks; smart home; attack detection; algebraic approach; algebraic matching; attack formalization; security properties

Full Text:



Aborujilah and S. Musa, “Cloud-based DDoS HTTP attack detection using covariance matrix approach,” Journal of Computer Networks and Communications, vol. 2017, Article ID 7674594, 8 pages, 2017.

CISCO SYSTEMS INC. NetRanger – Enterprise-scale, Real-time, Network Intrusion Detection System. 1998. Available from the company’s website at

FIELDING, R. wwwstat: Httpd logfile analysis software. November 1996.

Ghafar A. Jaafar, Shahidan M. Abdullah, Saifuladli Ismail “Review of Recent Detection Methods for HTTP DDoS Attack” Journal of Computer Networks and Communications, 2019

HANSEN, S. E., AND ATKINS, E. T. Automated system monitoring and notification with swatch. In Proceedings of the seventh Systems Administration Conference (LISA ’93) (Monterey, CA, November 1993). Different+Types+of+Attack/Classification+of+Attacks/


I. Sreeram and V. P. K. Vuppala, “HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm,” Applied Computing and Informatics, 2017, in press.

K. Singh, P. Singh, and K. Kumar, “User behavior analytics-based classification of application layer HTTP-GET flood attacks,” Journal of Network and Computer Applications, vol. 112, pp. 97–114, 2018.

NETWORK ASSOCIATES INC. Cybercop server. 1998. Available from the company’s website at cybercopsvr/index.asp

OWASP. Owasp modsecurity core rule set project. [Online]. Available:

PAXSON, V. Bro: A system for detecting network intruders in realtime. In Proceedings of the 7th USENIX Security Symposium (San Antonio, TX, January 1998).

RANUM, M. J., LANDFIELD, K., STOLARCHUK, M., SIENKIEWICZ, M., LAMBETH, A., AND WALL, E. Implementing a generalized tool for network monitoring. In Proceedings of the Eleventh Systems Administration Conference (LISA ’97) (San Diego, CA, October 1997).

Rodrigo Martınez, Enhancing web application attack detection using machine learning, Instituto de Computaci ́on, Facultad de Ingenier ́ıa Universidad de la Rep ́ublica, Uruguay

S. Behal, K. Kumar, and M. Sachdeva, "D-FACE: an anomaly based distributed approach for early detection of DDoS attacks and flash events," Journal of Network and Computer Applications, vol. 111, pp. 49–63, 2018.

S. Hameed and U. Ali, "HADEC: hadoop-based live DDoS detection framework", EURASIP Journal on Information Security, vol. 2018, no. 1, p. 11, 2018.

TAYLOR, G. Autobuse. Internet, 1998.

TUININGA, C., AND HOLAK, R. Logscanner. 1998. Internet


  • There are currently no refbacks.