2019
DOI: 10.1109/access.2019.2908998
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks have been increasing, thereby leading to an urgent need for new attack identification, mitigation, and prevention mechanisms. To prevent DDoS attacks, the basic features of the attacks need to be dynamically analyzed because their patterns, ports, and protocols or operation mechanisms are rapidly changed and manipulated. Most of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
53
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 99 publications
(54 citation statements)
references
References 116 publications
(182 reference statements)
0
53
0
1
Order By: Relevance
“…Conversely, the time used in the establishment of a connection between the source and destination nodes increases as the simulation time increases, thereby, prolonging the lifetime of the route and reducing the packets drop. Future attempts will consider the application of new intelligent techniques such as [26], [27], [28], [29] in the MANET routing optimization protocols.…”
Section: Resultsmentioning
confidence: 99%
“…Conversely, the time used in the establishment of a connection between the source and destination nodes increases as the simulation time increases, thereby, prolonging the lifetime of the route and reducing the packets drop. Future attempts will consider the application of new intelligent techniques such as [26], [27], [28], [29] in the MANET routing optimization protocols.…”
Section: Resultsmentioning
confidence: 99%
“…Researchers have studied DDoS attacks from different perspectives and proposed many approaches to detect and mitigate them [1], [3]- [6], [11]- [18]. Recent research interests have been more concentrated on AL-DDoS attack [2], [7], [19]- [30] for its harmfulness and concealment.…”
Section: Related Workmentioning
confidence: 99%
“…Much research has been done on DDoS attack and its defense [1], [3]- [6]. The recent DDoS Threat Report [7] shows that the majority of DDoS attacks are short in duration,…”
Section: Introductionmentioning
confidence: 99%
“…In order to handle this issue, we proposed a methodology to convert the network traffic captures, i.e., non-image data into a representable form, i.e., image form and trained a state-of-the-art CNN model over the converted data in order to better detect the DoS and DDoS attack patterns. The existing IoT attack detection systems are unable to detect the latest DoS and DDoS attacks [8]- [10]. The reason is that most of them are trained over either outdated datasets or the datasets used for training the proposed solutions do not include the modern reflective DDoS attacks like Network BIOS (NetBIOS) attack, Network Time Protocol (NTP) attack, Simple Service Discovery Protocol (SSDP) attack, UDP Lag (delay) attack, etc.…”
Section: Introductionmentioning
confidence: 99%