NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach

被引:0
|
作者
Tahboush, Muhannad [1 ]
Hamdan, Adel [2 ]
Alzobi, Firas [1 ]
Husni, Moath [3 ]
Adawy, Mohammad [1 ]
机构
[1] World Islamic Sci & Educ Univ, Informat & Networks Syst Dept, Amman, Jordan
[2] World Islamic Sci & Educ Univ, Dept Comp Sci, Amman, Jordan
[3] World Islamic Sci & Educ Univ, Software Engn Dept, Amman, Jordan
关键词
Network security; DoS attack; cyberattack; network traffic; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that will consume and disrupt victim resources to limit access to information services by flooding a target system with a high volume of traffic, thereby preventing the availability of the resources to the legitimate users. However, several solutions were developed to overcome the DoS attack, but still suffer from limitations such as requiring additional hardware, fail to provide a unified solution and incur a high delay of detection accuracy. Therefore, the network traffic detection approach (NTDA) is proposed to detect the DoS attack in a more optimistic manner based on various scenarios. First, the high network traffic measurements and mean deviation, second scenario relied on the transmission rate per second (TPS) of the sender. The proposed algorithm NTDA was simulated using MATLAB R2020a. The performance metrics taken into consideration are false negative rate, accuracy, detection rate and true positive rate. The simulation results show that the performance parameters of proposed NTDA algorithm outperformed in DoS detection the other well-known algorithms.
引用
收藏
页码:692 / 698
页数:7
相关论文
共 50 条
  • [41] Entropy-based denial-of-service attack detection in cloud data center
    Cao, Jiuxin
    Yu, Bin
    Dong, Fang
    Zhu, Xiangying
    Xu, Shuai
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (18) : 5623 - 5639
  • [42] Network Traffic Anomaly Detection Based on Wavelet Analysis
    Du, Zhen
    Ma, Lipeng
    Li, Huakang
    Li, Qun
    Sun, Guozi
    Liu, Zichang
    2018 IEEE/ACIS 16TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATION (SERA), 2018, : 94 - 101
  • [43] On the use of principal component analysis in the entropy based detection of denial-of-service attacks
    Basicevic, Ilija
    Blazic, Nikola
    Ocovaj, Stanislav
    SECURITY AND PRIVACY, 2022, 5 (02):
  • [44] Network traffic anomaly detection method based on chaotic neural network
    Sheng, Shaojun
    Wang, Xin
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 77 : 567 - 579
  • [45] A Robust Principal Component Analysis Approach to DoS-Related Network Anomaly Detection
    Doucette, Cody
    Broderick-Sander, Regan
    Toll, Benjamin
    Helsinger, Aaron
    Soule, Nathaniel
    Pal, Partha
    Zhou, Chong
    Paffenroth, Randy
    CYBER SENSING 2020, 2020, 11417
  • [46] Network anomaly traffic detection algorithm based on SVM
    Lei, Yang
    2017 INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM (ICRIS), 2017, : 217 - 220
  • [47] Study on the Network Traffic Abnormal Detection Based on EEMD
    Zhao, Zhigang
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1001 - 1005
  • [48] An optimized deep neural network based DoS attack detection in wireless video sensor network
    Ramesh, S.
    Yaashuwanth, C.
    Prathibanandhi, K.
    Basha, Adam Raja
    Jayasankar, T.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [49] A network traffic prediction approach based on multifractal modeling
    Teles Vieira, Flavio
    Bianchi, Gabriel
    Lee, Luan
    JOURNAL OF HIGH SPEED NETWORKS, 2010, 17 (02) : 83 - 96
  • [50] Detecting Application Denial-of-Service Attacks: A Group-Testing-Based Approach
    Xuan, Ying
    Shin, Incheol
    Thai, My T.
    Znati, Taieb
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (08) : 1203 - 1216