<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article         dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1012-2354</issn>
                                                                                                        <publisher>
                    <publisher-name>Erciyes Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                                                                                                                                            <title-group>
                                                                                                                        <trans-title-group xml:lang="tr">
                                    <trans-title>ddosdaps4web: Web&#039;e Yönelik DDoS Tespit ve Koruma Yöntemi</trans-title>
                                </trans-title-group>
                                                                                                                                                                                                <article-title>ddosdaps4web: DDoS Detection And Protection System For Web</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                <name>
                                    <surname>Karakuş</surname>
                                    <given-names>Abdullah Talha</given-names>
                                </name>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                <name>
                                    <surname>Kara</surname>
                                    <given-names>Resul</given-names>
                                </name>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20160201">
                    <day>02</day>
                    <month>01</month>
                    <year>2016</year>
                </pub-date>
                                        <volume>32</volume>
                                        <issue>1</issue>
                                        <fpage>1</fpage>
                                        <lpage>9</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20160201">
                        <day>02</day>
                        <month>01</month>
                        <year>2016</year>
                    </date>
                                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 1985, Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi</copyright-statement>
                    <copyright-year>1985</copyright-year>
                    <copyright-holder>Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi</copyright-holder>
                </permissions>
            
                                                                                                <trans-abstract xml:lang="tr">
                            <p>Her koruma tespitle başlar. Dağıtık servis engelleme (DDoS) saldırıları, ağları veya bilgisayarlara yoğun kullanım sonucunda verdikleri servisi engellenmektedirler. Günümüzde bilgisayarlardaki yazılımsal ve donanımsal gelişmelere rağmen, kısa bir zaman dilimi DDoS ataklarının kötücül etkilerini gerçekleştirmesi için yeterli olmaktadır. Bu sebepten ötürü DDos saldırılarını engellemek için gerçek zamanlı bir tespit ve koruma sistemine ihtiyaç duyulmaktadır. Geleneksel ağ tabanlı koruma sistemleri uygulama katmanı DDoS ataklarına karşı güvenlik sağlayamamaktadır. Bu çalışmada, HTTP tabanlı DDoS ataklarını tespit etmek ve sistemi korumak için ddosdaps4web isimli DDoS tespit ve koruma sistemi öne sürülmüştür. ddosdaps4web üç servisten faydalanmaktadır: (1) Tüm HTTP isteklerinin depolanıp, istek başlıklarından detaylı analiz için bilgi çıkartımı yapılmasını sağlayan depolama servisi, (2) her dakika çalışan ve ön tanımlı istek limitlerine göre kötücül istekleri tespit etmeyi sağlayan izleme servisi, ve (3) gelen bütün istekleri keserek, oluşturulan kurallara göre kötücül olanları devre dışı bırakan durdurucu servisi. ddosdaps4web rastgele oluşturulmuş 10000 HTTP isteği üzerinden test edilerek DDoS doğru tespit oranı %94 olarak bulunmuştur.</p></trans-abstract>
                                                                                                                                    <abstract><p>Protection starts with detection. Distributed denial of service (DDoS) attacks flood networks or computers in order to deny their services. Due to advances in the modern computers in terms of hardware and software, a small amount of time is enough to complete their malicious actions. Therefore, a real-time detection and protection is required in order to prevent DDoS attacks. Traditional network based protection systems are not able to provide a security for application layer DDoS attacks. In this paper, we propose a DDoS detection and protection system namely ddosdaps4web in order to detect and protect the system from HTTP based DDoS attacks. ddosdaps4web uses three services: (1) Storage service stores all HTTP requests and extracts information from request headers for further analysis, (2) Monitoring service runs every minute to detect malicious requests through predefined request limits and constructs rules in order to prevent current and upcoming attacks, and (3) Interceptor service filters all incoming requests to eliminate malicious ones through the constructed rules. ddosdaps4web is evaluated by randomly generated 10000 HTTP requests and its accuracy is calculated as 94%.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Denial of Service</kwd>
                                                    <kwd>   Distributed Denial of Service</kwd>
                                                    <kwd>   Security</kwd>
                                                    <kwd>   Web</kwd>
                                                    <kwd>   HTTP</kwd>
                                                    <kwd>   DoS</kwd>
                                                    <kwd>   DDoS</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>Servis engelleme</kwd>
                                                    <kwd>   dağıtık servis engelleme</kwd>
                                                    <kwd>   güvenlik</kwd>
                                                    <kwd>   web</kwd>
                                                    <kwd>   HTTP</kwd>
                                                    <kwd>   DoS</kwd>
                                                    <kwd>   DDoS</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">“What is Cross Site Scripting and How Can You Fix it?,” 2011.[Online].Available:http://www.acunetix.com/websitesecurity/cross-site-scripting/.[Accessed:14-Nov-2015].</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">L.SteinandJ.Stewart, “WWW Security FAQ: Securing AgainstDenialofServiceAttacks,”W3C,2015.[Online]. Available: http://www.w3.org/Security/Faq/wwwsf6.html.[Accessed:14-Nov-2015].</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">S.R.DeviandP.Yogesh,“DetectionOfApplication Layer DDOS Attacks Using Information Theory Based Metrics,” Comput. Sci. Inf. Technol., pp. 217–223,2012.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Y. Xie and S. Z. Yu, “Monitoring the application-layer DDoSsttacksforpopularwebsites,”IEEE/ACMTrans.Netw., vol. 17, no. 1, pp. 15–25,2009.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">J. Yuan and K. Mills, “Monitoring the macroscopic effect ofDDoS flooding attacks,” IEEE Trans. Dependable Secur. Comput., vol. 2, no. 4, pp. 324–335,2005.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">S. Ranjan, R. Swaminathan, M.Uysal, A. Nucci, and E. Knightly, “DDoS-shield: DDoS-resilient scheduling to counter application layer attacks,” IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 26–39,2009.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">J. Wang, X. Yang, and K. Long, “Web DDoS detection schemes based on measuring user’s access behavior with large deviation,” in GLOBECOM -IEEE Global Telecommunications Conference,2011.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">G. Oikonomou and J. Mirkovic, “Modeling human behavior for defense against flash-crowd attacks,” in IEEE International Conference on Communications,2009.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">S. Kandula, D. Katabi, M. Jacob, and A. Berger, “Botz-4-sale:  Surviving  organized  DDoS  attacks  that  mimic   flash crowds,” Proc. 2nd ..., pp. 287–300,2005.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">J. Jung, B. Krishnamurthy, and M. Rabinovich, “Flash crowds  and  denial  of  service  attacks:  Characterization  and implications for CDNs and web sites,” in Proceedings of the 11th international conference on World Wide Web (WWW ’02), 2002, pp.293–304.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">K. Park, V. S. Pai, K.-W. Lee, and S. Calo, “Securingweb service by automatic robot detection,” in Proceeding ATEC ’06 Proceedings of the annual conference on USENIX &#039;06 Annual Technical Conference, 2006, p.23.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">R. Basu, R. K. Cunningham, S. Member, S. E. Webster,andR. P. Lippmann, “Detecting Low-Profile  Probes  and  Novel Denial-of-Service Attacks,” in Proceedings of the 2001 IEEE Workshop Information Assurance and Security,2001.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">S. N. Shiaeles, V. Katos, A. S. Karakos, and B. K. Papadopoulos, “Real time DDoS detection using fuzzy estimators,” Comput. Secur., vol. 31, no. 6, pp. 782–790, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">“Amazon IP Check Web Service,” Amazon, 2015. [Online]. Available:http://checkip.amazonaws.com/.[15] “GeoIP Products -Maxmind Developer Site,” maxmind,2015.   [Online].   Available: http://dev.maxmind.com/geoip/.[Accessed:14-Nov-2015].</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">“IPv6 Deployment Hits 2%, Keeps Growing | Internet Society.”[Online].Available: http://www.internetsociety.org/blog/2013/09/ipv6-deployment-hits-2-keeps-growing. [Accessed:14-Nov-2015].</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">“Google’s IPv6 Stats Pass 3% Less Than 5 Months After Passing 2%! | Deploy360 Programme.” [Online].  Available: http://www.internetsociety.org/deploy360/blog/2014/02/googles-ipv6-stats-pass-3-less-than-5-months-after-passing-2/. [Accessed: 14-Nov-2015].</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">“APNIC at the Global IPv6 Summit 2014 | APNIC.” [Online].Available:https://www.apnic.net/publications/news/2014/apnic-at-the-global-ipv6-summit-2014. [Accessed:14-Nov-2015].</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">T. Fawcett, “An introduction to ROC analysis,” Pattern Recognit. Lett., vol. 27, pp. 861–874,2006</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
