2021
DOI: 10.1109/access.2021.3062909
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 90 publications
(17 citation statements)
references
References 138 publications
(135 reference statements)
0
14
0
Order By: Relevance
“…Table 4 below shows the comparative analysis of the current study with previous state of art methods (ML/DL) of studies. [42] Trees 85.55% DDoS Datasets Gao, Aljuhani, et al [43,44] ML (KNN, SVM, ANN) 83%, 84%, 81% Banking Datasets Rehman et al [45] GRU 81.7% DDoS Datasets Guo et al [46] ANN, SVM 88.5%, 91% Real Time Dataset Additionally, the proposed models have some disadvantages. The models required high computational power and specialized hardware, e.g., they needed a good GPU to accomplish the training process.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 4 below shows the comparative analysis of the current study with previous state of art methods (ML/DL) of studies. [42] Trees 85.55% DDoS Datasets Gao, Aljuhani, et al [43,44] ML (KNN, SVM, ANN) 83%, 84%, 81% Banking Datasets Rehman et al [45] GRU 81.7% DDoS Datasets Guo et al [46] ANN, SVM 88.5%, 91% Real Time Dataset Additionally, the proposed models have some disadvantages. The models required high computational power and specialized hardware, e.g., they needed a good GPU to accomplish the training process.…”
Section: Discussionmentioning
confidence: 99%
“…The models required high computational power and specialized hardware, e.g., they needed a good GPU to accomplish the training process. [39] ANN Model 83.5% IoT Banking Devices Datasets deh et al [40] CNN-LSTM 78%, 79% Banking Fraud Time Series Data et al [41] SVM 86.7% DDoS Datasets a et al [42] Trees 85.55% DDoS Datasets ani, et al [43,44] ML(KNN,SVM,ANN) 83%,84%,81% Banking Datasets n et al [45] GRU 81.7% DDoS Datasets et al [46] ANN, SVM 88.5%, 91% Real Time Dataset…”
Section: Time Complexity (Sec)mentioning
confidence: 99%
“…Several studies proposed to use Support Vector Machine (SVM) classifiers, such as [6][7][8][9][10], and [11]. artificial neural networks, such as [12,13] and [14], and other ML algorithms, as in [15][16][17][18][19], and [20]. Interestingly, reinforcement learning has been also adopted to perform DDoS mitigation in paper [21].…”
Section: Related Workmentioning
confidence: 99%
“…Critical infrastructures are vulnerable to a wide range of cyberattacks, which have a significant economic impact on organizations and service providers. Cyberattacks such as distributed denial of service cause the service to be unavailable for its intended clients [7]. The dictionary is another common attack against remote access services; it is used to crack a password in a dictionary or word list, which allows attackers to hijack the system remotely [8].…”
Section: Introductionmentioning
confidence: 99%