2022
DOI: 10.1002/int.23048
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey on DDoS attacks on various intelligent systems and it's defense techniques

Abstract: The purpose of this study is to provide an overview of distributed denial of service (DDoS) attack detection in intelligent systems. In recent times, due to the endemic COVID‐19, the use of intelligent systems has increased. However, these systems are easily affected by DDoS attacks. A DDoS attack is a reliable tool for cyber‐attackers because there is no efficient method which can detect or filter it properly. In this context, we analyze different types of DDoS attacks and defense techniques for intelligent s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 74 publications
(74 reference statements)
0
4
0
Order By: Relevance
“…• DoS/DDoS Attacks: DDoS attacks are carried out by a group of compromised computers operating from multiple locations that flood a particular target with traffic. In this attack, the primary goal is to overwhelm and render unavailable a server, website, or online service [126] [127]. In the event of a DDoS attack, IoT devices such as smart appliances, healthcare monitors, and industrial sensors can be rendered useless [128].…”
Section: Figure 7: Cybersecurity Threats In Application Layermentioning
confidence: 99%
“…• DoS/DDoS Attacks: DDoS attacks are carried out by a group of compromised computers operating from multiple locations that flood a particular target with traffic. In this attack, the primary goal is to overwhelm and render unavailable a server, website, or online service [126] [127]. In the event of a DDoS attack, IoT devices such as smart appliances, healthcare monitors, and industrial sensors can be rendered useless [128].…”
Section: Figure 7: Cybersecurity Threats In Application Layermentioning
confidence: 99%
“…Error messages are used to report errors that can occur during data packet delivery. Diagnostics, testing, and other informational purposes are served by informational messages [45], [46], [47], [48], [49], [50], [51]. An attacker can launch different types of ICMP based attacks, including Ping There are some common types of ICMP (Internet Control Message Protocol) based cyber security attacks such as Ping flood attacks [50] and Smurf attacks [40].…”
Section: A Icmp Based Cyber Attacksmentioning
confidence: 99%
“…The techniques employed in DDoS attacks are subject to constant evolution, as evidenced by the literature [8]. Employing outdated countermeasures is insufficient to protect against novel threats [9].…”
Section: Introductionmentioning
confidence: 99%