The document presents a detection scheme for application layer DDoS attacks using information theory-based metrics, focusing on monitoring user behavior and calculating trust scores to filter malicious traffic. The proposed two-phase system captures browsing data, calculates entropy, and identifies suspicious requests, employing rate limiting and scheduling to manage service to legitimate users. This approach enhances detection efficacy by distinguishing malicious activity from legitimate traffic, addressing the challenges posed by application layer attacks.