High-Speed Network DDoS Attack Detection: A Survey

被引:3
作者
Haseeb-ur-rehman, Rana M. Abdul [1 ]
Aman, Azana Hafizah Mohd [1 ]
Hasan, Mohammad Kamrul [1 ]
Ariffin, Khairul Akram Zainol [1 ]
Namoun, Abdallah [2 ]
Tufail, Ali [3 ]
Kim, Ki-Hyung [4 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Malaysia
[2] Islamic Univ Madinah, Fac Comp & Informat Syst, Madinah 42351, Saudi Arabia
[3] Univ Brunei Darussalam, Sch Digital Sci, BE-1410 Gadong, Brunei
[4] Ajou Univ, Dept Cyber Secur, Suwon 16499, South Korea
基金
新加坡国家研究基金会;
关键词
denial of service; distributed denial of service; cyber-physical system; machine learning; high-speed network; intrusion detection system; express data path; REAL-TIME; BIG DATA;
D O I
10.3390/s23156850
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Having a large number of device connections provides attackers with multiple ways to attack a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can cause fiscal harm and corrupt data. Thus, irregularity detection in traffic data is crucial in detecting malicious behavior in a network, which is essential for network security and the integrity of modern Cyber-Physical Systems (CPS). Nevertheless, studies have shown that current techniques are ineffective at detecting DDoS attacks on networks, especially in the case of high-speed networks (HSN), as detecting attacks on the latter is very complex due to their fast packet processing. This review aims to study and compare different approaches to detecting DDoS attacks, using machine learning (ML) techniques such as k-means, K-Nearest Neighbors (KNN), and Naive Bayes (NB) used in intrusion detection systems (IDSs) and flow-based IDSs, and expresses data paths for packet filtering for HSN performance. This review highlights the high-speed network accuracy evaluation factors, provides a detailed DDoS attack taxonomy, and classifies detection techniques. Moreover, the existing literature is inspected through a qualitative analysis, with respect to the factors extracted from the presented taxonomy of irregular traffic pattern detection. Different research directions are suggested to support researchers in identifying and designing the optimal solution by highlighting the issues and challenges of DDoS attacks on high-speed networks.
引用
收藏
页数:25
相关论文
共 120 条
  • [1] Abdulla N.N., 2022, IRAQI J COMPUT INFOR, V48, P13
  • [2] Efficient Network Monitoring Applications in the Kernel with eBPF and XDP
    Abranches, Marcelo
    Michel, Oliver
    Keller, Eric
    Schmid, Stefan
    [J]. 2021 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (IEEE NFV-SDN), 2021, : 28 - 34
  • [3] Adrian David, 2014, 8 USENIX WORKSH OFF
  • [4] A low-rate DDoS detection and mitigation for SDN using Renyi Entropy with Packet Drop
    Ahalawat, Anchal
    Babu, Korra Sathya
    Turuk, Ashok Kumar
    Patel, Sanjeev
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 68
  • [5] Zero-day attack detection: a systematic literature review
    Ahmad, Rasheed
    Alsmadi, Izzat
    Alhamdani, Wasim
    Tawalbeh, Lo'ai
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (10) : 10733 - 10811
  • [6] Resilient backstepping control for a class of switched nonlinear time-delay systems under hybrid cyber-attacks
    Akbari, Elham
    Tabatabaei, Seyyed Mostafa
    Yazdi, Mojtaba Barkhordari
    Arefi, Mohammad Mehdi
    Cao, Jinde
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 122
  • [7] A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks
    Alashhab, Abdussalam Ahmed
    Zahid, Mohd Soperi Mohd
    Azim, Mohamed A.
    Daha, Muhammad Yunis
    Isyaku, Babangida
    Ali, Shimhaz
    [J]. SYMMETRY-BASEL, 2022, 14 (08):
  • [8] Complex methods detect anomalies in real time based on time series analysis
    Alghawli, Abed Saif
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (01) : 549 - 561
  • [9] Almansor M., 2018, J MULTIDISCIP ENG SC, V4, P2458
  • [10] 5G-Telecommunication Allocation Network Using IoT Enabled Improved Machine Learning Technique
    Alzaidi, Mohammed S.
    Subbalakshmi, Chatti
    Roshini, T. V.
    Shukla, Piyush Kumar
    Shukla, Surendra Kumar
    Dutta, Papiya
    Alhassan, Musah
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022