Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives

被引:44
作者
Javaheri, Danial [1 ]
Gorgin, Saeid [1 ]
Lee, Jeong-A [1 ]
Masdari, Mohammad [2 ]
机构
[1] Chosun Univ, Dept Comp Engn, Gwangju 61452, South Korea
[2] Islamic Azad Univ, Dept Comp Engn, Urmia Branch, Orumiyeh, Iran
基金
新加坡国家研究基金会;
关键词
Anomaly detection; Fuzzy logic; Cyber-attacks; Denial of service; Network security; Business sustainability; INTRUSION DETECTION SYSTEM; MITIGATION; CLOUD; SET;
D O I
10.1016/j.ins.2023.01.067
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, cybersecurity challenges and their ever-growing complexity are the main concerns for various information technology-driven organizations and companies. Although several intrusion detection systems have been introduced in an attempt to deal with zero-day cybersecurity attacks, computer systems are still highly vulnerable to various types of distributed denial of service (DDoS) attacks. This complicated cyber-attack caused many system failures and service disruptions, resulting in billions of dollars of financial loss and irrecoverable reputation damage in recent years. Considering the nonnegligible importance of business continuity in the Industry 4.0 era, this paper presents a comprehensive, systematic survey of DDoS attacks. It also proposes a hierarchy for this severe cyber threat, besides conducting deep comparisons from various perspectives between the studies published by reputed venues in this area. Furthermore, this paper recommends the most effective defensive strategies, with a focus on recently offered fuzzy-based detection methods, to mitigate such threats and bridge the gaps existing in the current intrusion detection systems and related works. The outcomes and key findings of this survey paper are highly advantageous for private companies, enterprises, and government agencies to be implemented in their local or global businesses to significantly improve business sustainability. (c) 2023 Elsevier Inc. All rights reserved.
引用
收藏
页码:315 / 338
页数:24
相关论文
共 49 条
  • [1] Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities
    Alabdulatif, Abdulatif
    Khalil, Ibrahim
    Kumarage, Heshan
    Zomaya, Albert Y.
    Yi, Xun
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 127 : 209 - 223
  • [2] Almseidin Mohammad, 2021, 2021 International Conference on Information Technology (ICIT), P290, DOI 10.1109/ICIT52682.2021.9491742
  • [3] An adapting soft computing model for intrusion detection system
    Alsaadi, Husam Ibrahiem Husain
    ALmuttari, Rafah M.
    Ucan, Osman Nuri
    Bayat, Oguz
    [J]. COMPUTATIONAL INTELLIGENCE, 2022, 38 (03) : 855 - 875
  • [4] DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark
    Alsirhani, Amjad
    Sampalli, Srinivas
    Bodorik, Peter
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (03): : 936 - 949
  • [5] Ates⠁ C., 2019, INT C INTELLIGENT FU, P338
  • [6] A survey on Blockchain solutions in DDoS attacks mitigation: Techniques, open challenges and future directions
    Chaganti, Rajasekhar
    Bhushan, Bharat
    Ravi, Vinayakumar
    [J]. COMPUTER COMMUNICATIONS, 2023, 197 : 96 - 112
  • [7] Real-Time Anomaly Detection in Data Centers for Log-based Predictive Maintenance using an Evolving Fuzzy-Rule-Based Approach
    Decker, Leticia
    Leite, Daniel
    Giommi, Luca
    Bonacorsi, Daniele
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2020,
  • [8] Fan HH, 2020, PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), P117, DOI [10.1109/icict48043.2020.9112403, 10.1109/ICICT48043.2020.9112403]
  • [9] Network traffic forecasting model based on long-term intuitionistic fuzzy time series
    Fan, Xiaoshi
    Wang, Yanan
    Zhang, Mengyu
    [J]. INFORMATION SCIENCES, 2020, 506 : 131 - 147
  • [10] A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks
    Fang, Liming
    Li, Yang
    Liu, Zhe
    Yin, Changchun
    Li, Minghui
    Cao, Zehong Jimmy
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) : 4260 - 4269