Review Article

Review of Recent Detection Methods for HTTP DDoS Attack

Table 1

Summary of recent detection techniques of HTTP DDoS attack.

No.NameParameterDDoS detection levelEvaluation methodDatasetPerformance matrix

1HADEC: hadoop-based live DDoS detection framework [19]Timestamps, source IP, destination IP, packet protocol, and packet headerHigh-rate DDoS: TCP-SYN, HTTP GET, UDP, and ICMPExperimentExperiment datasetMeasure utilisation, CPU, and Memory
2D-FACE: an anomaly-based distributed approach for early detection of DDoS attacks and flash events [28]Time window size, packet header, and generalised parameterHigh-rate and low-rate DDoS attack and flash crowdExperimentMIT Lincoln, CAIDA, and FIFAaccuracy, false-positive rate classification rate, F-measure, and precision
3User behaviour analytics-based classification of application layer HTTP GET flood attacks [29]Request index, response index, popularity index, repetition index, and classifier algorithmsHigh-rate DDoS attackExperimentWorldCup98, Clarknet, and NASATrue positive, true negative, false positive, and false negative
4HTTP flood attack detection in the application layer using machine-learning metrics and bio-inspired bat algorithm [30]Time frame length, maximum number of sessions (ms), page access count (pac), minimum time interval between two pages (mti), and packets observed per each type of packet (PC)High-rate DDoS attackSimulation softwareCAIDATrue positive, false positive, true negative, false negative, precision, recall, specificity, accuracy, and F-measure
5Cloud-based DDoS HTTP attack detection using covariance matrix approach [31]TCP packet header and Covariance matrixHigh-rate DDoS attackSimulation (MATLAB)KDD cup 99 and experiment datasetDetection rate, false positive, false negative, accuracy, error rate, and AUC
6MLP-GA-based algorithm to detect application layer DDoS attack (Singh and De [32])Number of HTTP count, number of IP addresses, constant mapping function, and fixed frame lengthLow-rate DDoS attackSimulation softwareEPA-HTTP, CAIDA 2007, and experiment datasetAccuracy, false positive, false negative, true positive, and true negative
7Real-time DDoS attack detection using FPGA [33]Source IPs, Source IPs index variation, and packet rateHigh-rate HTTP DDoSExperimentsCAIDA, TUIDS, and DARPAAccuracy, detection rate, false positive, and false negative
8Entropy-based application layer DDoS attack detection using artificial neural networks [2]HTTP GET request count per connection, IP address variance, HTTP GET request counts, and multilayer perceptron with genetic machine-learning algorithm (MLP-GA)High-rate DDoS attackExperimentsStandard EPA-HTTP, experiment dataset, CAIDA 2007, DARPA 2009, and BONESI-generated datasetsAccuracy, sensitivity, and specificity
9Application layer DDoS attack detection using cluster with label based on sparse vector decomposition and rhythm matching [34]Request interval sequence part, and request frequency sequence partHigh-rate DDoS attackExperimentsClarkNet HTTP, and experiment datasetAccuracy, detection rate, and false positive
10FHSD: an improved IP spoof detection method for web DDoS attacks [35]Source MAC address, hop count, GeoIP, OS passive fingerprinting, and web browser user agentHigh-rate DDoS attackExperimentsDARPA LLDOS inside 1.0 and experiments datasetDetection rate
11HTTP soldier: an HTTP flooding attack detection scheme with the large-deviation principle [36]Threshold exponentially weigh moving average algorithm Large deviation probability theoryHigh-rate DDoS attackSimulation (NS3)University web logsFalse positive
12Defending HTTP web servers against DDoS attacks through busy period-based attack flow detection [37]Threshold whitelist and blacklistHigh-rate DDoS attackSimulation (OPNET experiment)Experiment datasetDetection speed