Intrusion detection method for denial of service attacks on the web-applications
Prikladnaâ diskretnaâ matematika, no. 1 (2014), pp. 55-64.

Voir la notice de l'article provenant de la source Math-Net.Ru

The article describes the main issues related to multilayer perceptron used for “denial of service” attacks detection: statistical data collection and preparation, formation of indicators describing the state of a web-application, training and performance evaluation of neural network.
Keywords: intrusion detection, denial of service, web-application.
Mots-clés : DoS
@article{PDM_2014_1_a5,
     author = {S. N. Sorokin},
     title = {Intrusion detection method for denial of service attacks on the web-applications},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {55--64},
     publisher = {mathdoc},
     number = {1},
     year = {2014},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2014_1_a5/}
}
TY  - JOUR
AU  - S. N. Sorokin
TI  - Intrusion detection method for denial of service attacks on the web-applications
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2014
SP  - 55
EP  - 64
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2014_1_a5/
LA  - ru
ID  - PDM_2014_1_a5
ER  - 
%0 Journal Article
%A S. N. Sorokin
%T Intrusion detection method for denial of service attacks on the web-applications
%J Prikladnaâ diskretnaâ matematika
%D 2014
%P 55-64
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2014_1_a5/
%G ru
%F PDM_2014_1_a5
S. N. Sorokin. Intrusion detection method for denial of service attacks on the web-applications. Prikladnaâ diskretnaâ matematika, no. 1 (2014), pp. 55-64. http://geodesic.mathdoc.fr/item/PDM_2014_1_a5/

[1] Q4 2013 Global DDoS Attack Report, , 2014 http://www.prolexic.com/knowledge-center-ddos-attack-report-2013-q4.html

[2] Are you ready for slow reading?, , 2012 https://community.qualys.com/blogs/securitylabs/2012/01/05/slow-read

[3] Scherba M. V., Obnaruzhenie nizkoaktivnykh raspredelennykh atak tipa otkaz v obsluzhivanii v kompyuternykh setyakh, Dis. $\dots$ kand. tekhn. nauk, Omsk, 2007, 130 pp.

[4] Gamayunov D. Yu., Obnaruzhenie kompyuternykh atak na osnove povedeniya setevykh ob'ektov, Dis. $\dots$ kand. fiz.-mat. nauk, M., 2007, 89 pp.

[5] Zhulkov E. V., Postroenie neironnykh setei dlya obnaruzheniya klassov setevykh atak, Dis. $\dots$ kand. tekhn. nauk, SPb., 2007, 155 pp.

[6] Aleksandrov I. S., Razrabotka sistemy zaschity web-prilozhenii ot avtomatizirovannogo kopirovaniya informatsii, Dis. $\dots$ kand. tekhn. nauk, M., 2003, 127 pp.

[7] Khafizov A. F., Neirosetevaya sistema obnaruzheniya atak na www-server, Dis. $\dots$ kand. tekhn. nauk, Ufa, 2004, 172 pp.

[8] Khaikin S., Neironnye seti: polnyi kurs, 2-e izd., ispr., OOO I. D. Vilyams, M., 2006, 1104 pp.

[9] Uniform Resource Locators, , 1994 http://tools.ietf.org/html/rfc1738#section-3.3

[10] Menasce D. A., Almeida V. A. F., Capacity Planning for Web Services. Metrics, Models, and Methods, Prentice Hall PTR, New Jersey, 2001, 608 pp.