Visible to the public DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer

TitleDDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer
Publication TypeConference Paper
Year of Publication2017
AuthorsMeng, B., Andi, W., Jian, X., Fucai, Z.
Conference Name2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
Date Publishedjul
PublisherIEEE
ISBN Number978-1-5386-3221-5
Keywordsanomaly behavior, anomaly detection, anomaly detection system, Application Layer, behavior features extraction, composability, Computer crime, computer network security, database management systems, database system, Databases, DDoS attack detection, DDOS attack detection system, discrete-time markov chain, discrete-time Markov chains, distributed denial of service attack, distributed denial of service attacks, DTMC, feature extraction, Human Behavior, internal attackers, internal threats detection, Intrusion detection, Law, Markov processes, Metrics, pubcrawl, query processing, Resiliency, Servers, SQL, SQL queries, user behavior, users behaviors analysis
Abstract

Aiming at the problem of internal attackers of database system, anomaly detection method of user behaviour is used to detect the internal attackers of database system. With using Discrete-time Markov Chains (DTMC), an anomaly detection system of user behavior is proposed, which can detect the internal threats of database system. First, we make an analysis on SQL queries, which are user behavior features. Then, we use DTMC model extract behavior features of a normal user and the detected user and make a comparison between them. If the deviation of features is beyond threshold, the detected user behavior is judged as an anomaly behavior. The experiments are used to test the feasibility of the detction system. The experimental results show that this detction system can detect normal and abnormal user behavior precisely and effectively.

URLhttps://ieeexplore.ieee.org/document/8005861
DOI10.1109/CSE-EUC.2017.109
Citation Keymeng_ddos_2017