Streamlining HTTP Flooding Attack Detection through Incremental Feature Selection
Streamlining HTTP Flooding Attack Detection through Incremental Feature Selection
Applications over the Web primarily rely on the HTTP protocol to transmit web pages to and from systems. There are a variety of application layer protocols, but among all, HTTP is the most targeted because of its versatility and ease of integration with online services. The attackers leverage the fact that by default no detection system blocks any HTTP traffic. Thus, by exploiting such characteristics of the protocol, attacks are launched against web applications. HTTP flooding attacks are one such attack in the application layer of the OSI model. In this paper, a method for the detection of such an attack is proposed. The heart of the detection method is an incremental feature subset selection method based on mutual information and correlation. INFS-MICC helps in identifying a subset of highly relevant and independent feature subset so as to detect HTTP Flooding attacks with best possible classification performance in near-real time.
Upasana Sarmah、Parthajit Borah、D. K. Bhattacharyya
计算技术、计算机技术
Upasana Sarmah,Parthajit Borah,D. K. Bhattacharyya.Streamlining HTTP Flooding Attack Detection through Incremental Feature Selection[EB/OL].(2025-05-20)[2025-06-25].https://arxiv.org/abs/2505.17077.点此复制
评论