Research Article

DASH Framework Using Machine Learning Techniques and Security Controls

Algorithm 2

Light WAF methodology.
Input: HTTP request “r”
Output: HTTP response
1  Start
2  while WAF is “ON”
3   HTTP request “r" received
4   If “buffer_level” exists in the payload.
5    if “buffer_level” parameter value is an integer
6     if security headers exist
7      if IP is not on the blacklist
8       Pass request to streaming service
9      else
10       drop request and block the IP
11      endif
12     else
13      drop request and block the IP
14     endif
15    else
16     drop request and block the IP
17    endif
18   else
19    drop request and block the IP
20   endif
21  End