IDEAS home Printed from https://ideas.repec.org/a/spr/ijsaem/v14y2023i3d10.1007_s13198-021-01170-3.html
   My bibliography  Save this article

An ontology approach for proactive detection of HTTP flood DoS attack

Author

Listed:
  • Deepak Kshirsagar

    (Indian Institute of Technology Roorkee
    College of Engineering Pune)

  • Sandeep Kumar

    (Indian Institute of Technology Roorkee)

Abstract

In the current digital era, the consumer uses web applications for banking, e-commerce, and sharing information with others. These web applications are suffered from different types of attacks. The hacker intelligently uses multiple attack vectors to generate attacks with the help of tools. Therefore, intelligent intrusion detection plays an essential role in security. This paper presents an ontology-based intrusion detection framework to detect Denial of Service (DoS) attacks at the application level. The system proposes the ontology model and semantic rule for the detection of an HTTP flood attack. The system is implemented and tested on the GoldenEye DoS dataset with the help of semantic rules. The system provides early detection of DoS attacks in two seconds and improved detection rate using a time winodw threshold mechanism in the semantic rule. The system also achieves a higher detection rate of 94.89% without threshold in semantic rule to detect DoS attack. Finally, the system is compared with related traditional DoS detection systems.

Suggested Citation

  • Deepak Kshirsagar & Sandeep Kumar, 2023. "An ontology approach for proactive detection of HTTP flood DoS attack," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 14(3), pages 840-847, July.
  • Handle: RePEc:spr:ijsaem:v:14:y:2023:i:3:d:10.1007_s13198-021-01170-3
    DOI: 10.1007/s13198-021-01170-3
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s13198-021-01170-3
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s13198-021-01170-3?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Prachi Deshpande & S. C. Sharma & Sateesh K. Peddoju & Ajith Abraham, 2018. "Security and service assurance issues in Cloud environment," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 9(1), pages 194-207, February.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yuting Zuo & Zhaozhe Kang & Jian Xu & Zhide Chen, 2021. "BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing," International Journal of Distributed Sensor Networks, , vol. 17(3), pages 15501477219, March.
    2. Kalka Dubey & S. C. Sharma, 2023. "A hybrid multi-faceted task scheduling algorithm for cloud computing environment," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 14(3), pages 774-788, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:ijsaem:v:14:y:2023:i:3:d:10.1007_s13198-021-01170-3. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.