Low interaction honeypot as the defense mechanism against Slowloris attack on the web server

Autor: S E Suwono, Iwan Kustiawan, A H S Budi, N R Fitri
Rok vydání: 2020
Předmět:
Zdroj: IOP Conference Series: Materials Science and Engineering. 850:012037
ISSN: 1757-899X
1757-8981
DOI: 10.1088/1757-899x/850/1/012037
Popis: Threats and attacks on internet services are in line with developments in internet technology. One of the main risks is Distributed Denial of Service (DDoS). In this paper, we focus on the Slowloris attack which is an open-source DDoS attacker that generally attacks the Apache webserver. Apache is one of the most popular web servers in the world and is still used by many companies. This research presents another way to reduce attacks to the firewalls and load a counterweight by using a low interaction honeypot, HoneyPy. In normal conditions, attack schemes and defense mechanisms are evaluated by conducting experiments. Slowloris attacks cause high traffic because it prevents the socket from closing, so the webserver cannot handle other connections from legitimate users. When defense mechanisms are applied to the network, Slowloris attacks that enter the webserver are minimized because most packets are discarded and directed to the honeypot without the attacker’s knowledge. It seems like the attacker has managed to attack the web server even when the attack becomes slower.
Databáze: OpenAIRE