Distributed denial of service attack in HTTP/2: review on security issues and future challenges

This article offers a comprehensive overview of recent literature on the HTTP/2 protocol and conducts an analysis of the security threats and DDoS attack typologies associated with HTTP/2. The investigation revealed that the introduction of new features in HTTP/2 has significantly improved the netwo...

Full description

Saved in:
Bibliographic Details
Main Authors: Liang Ming, Leau, Yu-Beng, Ying Xie
Format: Article
Language:English
English
Published: IEEE 2024
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/42035/1/ABSTRACT.pdf
https://eprints.ums.edu.my/id/eprint/42035/2/FULL%20TEXT.pdf
https://eprints.ums.edu.my/id/eprint/42035/
https://doi.org/10.1109/ACCESS.2024.3371013
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ums.eprints.42035
record_format eprints
spelling my.ums.eprints.420352024-11-29T04:03:02Z https://eprints.ums.edu.my/id/eprint/42035/ Distributed denial of service attack in HTTP/2: review on security issues and future challenges Liang Ming Leau, Yu-Beng Ying Xie QA71-90 Instruments and machines QA75.5-76.95 Electronic computers. Computer science This article offers a comprehensive overview of recent literature on the HTTP/2 protocol and conducts an analysis of the security threats and DDoS attack typologies associated with HTTP/2. The investigation revealed that the introduction of new features in HTTP/2 has significantly improved the network transmission speed and utilization. However, these advancements have also brought forth a series of emerging network security risks. This study examines the current state of the art in DDoS attacks tailored for HTTP/2 and their detection methods, proposing future research directions in the field of attack detection. By analyzing the distinctive features of HTTP/2 protocol, the study suggests extending DDoS attack detection techniques established for HTTP/1 to the realm of HTTP/2. Furthermore, the research underscores the ease with which adversaries can exploit the intrinsic multiplexing in HTTP/2 to launch a large number of malicious requests, leading to severe depletion of network bandwidth and exhaustion of valuable server resources. Additionally, it highlights the potential applicability of deep learning algorithms in the context of the HTTP/2 protocol. Additionally, the article proposes strategies to address challenges associated with DDoS attacks and the scarcity of adequate datasets for HTTP/2. This research contributes to a comprehensive understanding of the security implications surrounding the HTTP/2 protocol and provides valuable insights for advancing DDoS attack detection technologies. IEEE 2024 Article NonPeerReviewed text en https://eprints.ums.edu.my/id/eprint/42035/1/ABSTRACT.pdf text en https://eprints.ums.edu.my/id/eprint/42035/2/FULL%20TEXT.pdf Liang Ming and Leau, Yu-Beng and Ying Xie (2024) Distributed denial of service attack in HTTP/2: review on security issues and future challenges. IEEE Access, 12. pp. 33296-33308. ISSN 2169-3536 https://doi.org/10.1109/ACCESS.2024.3371013
institution Universiti Malaysia Sabah
building UMS Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Sabah
content_source UMS Institutional Repository
url_provider http://eprints.ums.edu.my/
language English
English
topic QA71-90 Instruments and machines
QA75.5-76.95 Electronic computers. Computer science
spellingShingle QA71-90 Instruments and machines
QA75.5-76.95 Electronic computers. Computer science
Liang Ming
Leau, Yu-Beng
Ying Xie
Distributed denial of service attack in HTTP/2: review on security issues and future challenges
description This article offers a comprehensive overview of recent literature on the HTTP/2 protocol and conducts an analysis of the security threats and DDoS attack typologies associated with HTTP/2. The investigation revealed that the introduction of new features in HTTP/2 has significantly improved the network transmission speed and utilization. However, these advancements have also brought forth a series of emerging network security risks. This study examines the current state of the art in DDoS attacks tailored for HTTP/2 and their detection methods, proposing future research directions in the field of attack detection. By analyzing the distinctive features of HTTP/2 protocol, the study suggests extending DDoS attack detection techniques established for HTTP/1 to the realm of HTTP/2. Furthermore, the research underscores the ease with which adversaries can exploit the intrinsic multiplexing in HTTP/2 to launch a large number of malicious requests, leading to severe depletion of network bandwidth and exhaustion of valuable server resources. Additionally, it highlights the potential applicability of deep learning algorithms in the context of the HTTP/2 protocol. Additionally, the article proposes strategies to address challenges associated with DDoS attacks and the scarcity of adequate datasets for HTTP/2. This research contributes to a comprehensive understanding of the security implications surrounding the HTTP/2 protocol and provides valuable insights for advancing DDoS attack detection technologies.
format Article
author Liang Ming
Leau, Yu-Beng
Ying Xie
author_facet Liang Ming
Leau, Yu-Beng
Ying Xie
author_sort Liang Ming
title Distributed denial of service attack in HTTP/2: review on security issues and future challenges
title_short Distributed denial of service attack in HTTP/2: review on security issues and future challenges
title_full Distributed denial of service attack in HTTP/2: review on security issues and future challenges
title_fullStr Distributed denial of service attack in HTTP/2: review on security issues and future challenges
title_full_unstemmed Distributed denial of service attack in HTTP/2: review on security issues and future challenges
title_sort distributed denial of service attack in http/2: review on security issues and future challenges
publisher IEEE
publishDate 2024
url https://eprints.ums.edu.my/id/eprint/42035/1/ABSTRACT.pdf
https://eprints.ums.edu.my/id/eprint/42035/2/FULL%20TEXT.pdf
https://eprints.ums.edu.my/id/eprint/42035/
https://doi.org/10.1109/ACCESS.2024.3371013
_version_ 1817843850910105600
score 13.223943