Research Article

A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

Table 1

Comprehensive survey on detective and preventive schemes and frameworks to all sorts of HTTP-based DoS And DDoS Attacks.

NumberScheme/frameworkObjectiveProviding/protecting
HR-DDOSLR-DDOSFCOBTB & CV

1Service oriented traceback architecture (SOTA) [1]Identify attack source.

2Filtering tree [2]Protect Cloud Computing against XML and HTTP DDoS attacks.

3Attack source identification at router level using marking algorithm [3]Overcome IP spoofing.

4Confidence based filtering (CBF) [4]Firewall web application.

5A New algorithm for detecting and defending CC attacks [5]Protect web server from CC attacks.

6Intelligent decision prototype (IDP) [6]Identify and defend attack source.

7Defense system for cloud
computing [7]
Trace and identify the real source of DDoS attacks.

8EDoS-Shield [8]Mitigate the economic denial of sustainability (EDoS) attack in the cloud computing.

9Diagnosis of network anomaly based on statistical traffic analysis [9]Spot the anomalies of network Traffic.

10Dynamic hidden semi-Markov model (HTTP) [10]Model the time varying user to detect web DDoS attacks.

11Enhanced fast-SCTF [11]Detect and filter distributed reflection denial of service (DRDoS) attacks.

12IP to hop count mapping table (IP2HC) filtering technique [12]Defend against IP spoofing attack.

13Transition matrix
[13]
Detect HTTP application based DDoS attacks.

14Relative entropy based HTTP application DDoS detection [14]Detect HTTP application based DDoS attacks.

15Analysis of network’s traffic by using IP addresses correlation [15]Detect network DDoS attacks.

16Large deviation measuring click ratio based web access behavior (LD-IID) scheme and large deviation measuring web access behavior based on Markov process (LD-MP) scheme [16]Detect HTTP application based DDoS attacks.

17Chi-square based space (CSDM) Davison method [17]Enhance anomaly detection system accuracy.

18An advanced entropy based DDoS detection scheme [18]Determine the most suitable threshold value for detecting DDoS attacks accurately.

19HTTP reject [19]Block user’s requests on the IP layer during DDoS attacks and keep the end user to be notified as well.

20CALD [20]Protect web server from flash crowd.

21VicSifter [21]Detect DDoS attacks and determine the attack’s victims at an early stage.

22Throttling DDoS attacks [22]Eliminate and slow down the impact of DDoS attacks against web server.

23An early DoS/DDoS attacks detection method based on the concept of short-term entropy [23]Focus on the early DoS/DDoS attacks detection.

24A real time DDoS attacks detection and prevention system based on the analysis of per IP traffic behavior [24]Monitor and detect DDoS attacks near to the attack’s source.