A review of technique to self-generate DDoS dataset

Application Layer Distributed Denial of Service (DDoS) attacks are very challenging to detect and the most common and renowned application layer attack is HTTP flooding. There several approaches adopted by past studies to acquire the dataset such publicly download from and Internet and self-generate...

Full description

Saved in:
Bibliographic Details
Main Authors: Jaafar, G. A., Abdullah, S. M., Adli, S.
Format: Article
Published: World Academy of Research in Science and Engineering 2019
Subjects:
Online Access:http://eprints.utm.my/id/eprint/90649/
http://dx.doi.org/10.30534/ijatcse/2019/88842019
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Description
Summary:Application Layer Distributed Denial of Service (DDoS) attacks are very challenging to detect and the most common and renowned application layer attack is HTTP flooding. There several approaches adopted by past studies to acquire the dataset such publicly download from and Internet and self-generate by utilizing attack script. Use of old dataset should be prevented as it led to meaningless result. The current available application layer DDoS dataset is obsolete. Furthermore, the latest dataset is not publicly available due to security issue. Hence, DDoS researchers have to move to other atmosphere in order to obtain the latest dataset for DDoS attack execute at application layer. A few attack scripts publicly available which allow researcher to utilize. The attack script requires to work together with actual devices such as a set of computers, web server and other related network devices to create experimental lab. Execution of the attack script also need to pay attention as different attack script utilize different command to run. This paper reviewed 12 techniques utilize by prior studies to self-generate dataset. A summary of each technique is summarized in table view, along with in-depth critical analysis, for future studies to self-generate dataset in conducting DDoS experiment.