Distributed denial of service attack in HTTP/2: review on security issues and future challenges
This article offers a comprehensive overview of recent literature on the HTTP/2 protocol and conducts an analysis of the security threats and DDoS attack typologies associated with HTTP/2. The investigation revealed that the introduction of new features in HTTP/2 has significantly improved the netwo...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
IEEE
2024
|
Subjects: | |
Online Access: | https://eprints.ums.edu.my/id/eprint/42035/1/ABSTRACT.pdf https://eprints.ums.edu.my/id/eprint/42035/2/FULL%20TEXT.pdf https://eprints.ums.edu.my/id/eprint/42035/ https://doi.org/10.1109/ACCESS.2024.3371013 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.ums.eprints.42035 |
---|---|
record_format |
eprints |
spelling |
my.ums.eprints.420352024-11-29T04:03:02Z https://eprints.ums.edu.my/id/eprint/42035/ Distributed denial of service attack in HTTP/2: review on security issues and future challenges Liang Ming Leau, Yu-Beng Ying Xie QA71-90 Instruments and machines QA75.5-76.95 Electronic computers. Computer science This article offers a comprehensive overview of recent literature on the HTTP/2 protocol and conducts an analysis of the security threats and DDoS attack typologies associated with HTTP/2. The investigation revealed that the introduction of new features in HTTP/2 has significantly improved the network transmission speed and utilization. However, these advancements have also brought forth a series of emerging network security risks. This study examines the current state of the art in DDoS attacks tailored for HTTP/2 and their detection methods, proposing future research directions in the field of attack detection. By analyzing the distinctive features of HTTP/2 protocol, the study suggests extending DDoS attack detection techniques established for HTTP/1 to the realm of HTTP/2. Furthermore, the research underscores the ease with which adversaries can exploit the intrinsic multiplexing in HTTP/2 to launch a large number of malicious requests, leading to severe depletion of network bandwidth and exhaustion of valuable server resources. Additionally, it highlights the potential applicability of deep learning algorithms in the context of the HTTP/2 protocol. Additionally, the article proposes strategies to address challenges associated with DDoS attacks and the scarcity of adequate datasets for HTTP/2. This research contributes to a comprehensive understanding of the security implications surrounding the HTTP/2 protocol and provides valuable insights for advancing DDoS attack detection technologies. IEEE 2024 Article NonPeerReviewed text en https://eprints.ums.edu.my/id/eprint/42035/1/ABSTRACT.pdf text en https://eprints.ums.edu.my/id/eprint/42035/2/FULL%20TEXT.pdf Liang Ming and Leau, Yu-Beng and Ying Xie (2024) Distributed denial of service attack in HTTP/2: review on security issues and future challenges. IEEE Access, 12. pp. 33296-33308. ISSN 2169-3536 https://doi.org/10.1109/ACCESS.2024.3371013 |
institution |
Universiti Malaysia Sabah |
building |
UMS Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Sabah |
content_source |
UMS Institutional Repository |
url_provider |
http://eprints.ums.edu.my/ |
language |
English English |
topic |
QA71-90 Instruments and machines QA75.5-76.95 Electronic computers. Computer science |
spellingShingle |
QA71-90 Instruments and machines QA75.5-76.95 Electronic computers. Computer science Liang Ming Leau, Yu-Beng Ying Xie Distributed denial of service attack in HTTP/2: review on security issues and future challenges |
description |
This article offers a comprehensive overview of recent literature on the HTTP/2 protocol and conducts an analysis of the security threats and DDoS attack typologies associated with HTTP/2. The investigation revealed that the introduction of new features in HTTP/2 has significantly improved the network transmission speed and utilization. However, these advancements have also brought forth a series of emerging network security risks. This study examines the current state of the art in DDoS attacks tailored for HTTP/2 and their detection methods, proposing future research directions in the field of attack detection. By analyzing the distinctive features of HTTP/2 protocol, the study suggests extending DDoS attack detection techniques established for HTTP/1 to the realm of HTTP/2. Furthermore, the research underscores the ease with which adversaries can exploit the intrinsic multiplexing in HTTP/2 to launch a large number of malicious requests, leading to severe depletion of network bandwidth and exhaustion of valuable server resources. Additionally, it highlights the potential applicability of deep learning algorithms in the context of the HTTP/2 protocol. Additionally, the article proposes strategies to address challenges associated with DDoS attacks and the scarcity of adequate datasets for HTTP/2. This research contributes to a comprehensive understanding of the security implications surrounding the HTTP/2 protocol and provides valuable insights for advancing DDoS attack detection technologies. |
format |
Article |
author |
Liang Ming Leau, Yu-Beng Ying Xie |
author_facet |
Liang Ming Leau, Yu-Beng Ying Xie |
author_sort |
Liang Ming |
title |
Distributed denial of service attack in HTTP/2: review on security issues and future challenges |
title_short |
Distributed denial of service attack in HTTP/2: review on security issues and future challenges |
title_full |
Distributed denial of service attack in HTTP/2: review on security issues and future challenges |
title_fullStr |
Distributed denial of service attack in HTTP/2: review on security issues and future challenges |
title_full_unstemmed |
Distributed denial of service attack in HTTP/2: review on security issues and future challenges |
title_sort |
distributed denial of service attack in http/2: review on security issues and future challenges |
publisher |
IEEE |
publishDate |
2024 |
url |
https://eprints.ums.edu.my/id/eprint/42035/1/ABSTRACT.pdf https://eprints.ums.edu.my/id/eprint/42035/2/FULL%20TEXT.pdf https://eprints.ums.edu.my/id/eprint/42035/ https://doi.org/10.1109/ACCESS.2024.3371013 |
_version_ |
1817843850910105600 |
score |
13.223943 |