

Before sending an HTTP CONNECT request a TCP connection between a client and a server is established, using 3-Way Handshake (SYN, SYN-ACK, ACK), seen in packets 39,58,59 in Image 1. To send an HTTP CONNECT request client establishes a TCP connection. As such, it may be beneficial to review network traffic carefully when witnessing many such incoming requests. However, HTTP CONNECT flood uses the less common CONNECT method. Traditional rate-based volumetric detection is ineffective in detecting HTTP CONNECT flood attacks since traffic volume in HTTP CONNECT floods is often under detection thresholds. HTTP CONNECT flood attacks use standard URL requests, hence it may be quite challenging to differentiate from valid traffic. When the server’s limits of concurrent connections are reached, the server can no longer respond to legitimate requests from other clients attempting to connect, causing a denial of service. Unlike other HTTP floods that may include other request methods such as POST, PUT, DELETE, etc. HTTP CONNECT floods are designed to overwhelm web servers’ resources by continuously requesting single or multiple URL’s from many source attacking machines, which simulate a HTTP clients, such as web browsers (Though the attack analyzed here, does not use browser emulation).Īn HTTP CONNECT Flood consists of CONNECT requests. The HTTP protocol – is an Internet protocol which is the basis of browser-based Internet requests, and is commonly used to send form contents over the Internet or to load web pages.

Layer 7 is the application layer of the OSI model. HTTP CONNECT flood is a layer 7 DDoS attack that targets web servers and applications.
