A comprehensive survey on DDoS attacks on various intelligent systems and it's defense techniques

被引:21
作者
Gaurav, Akshat [1 ]
Gupta, Brij B. [2 ,3 ,4 ,5 ,6 ]
Alhalabi, Wadee [6 ]
Visvizi, Anna [7 ]
Asiri, Yousef [8 ]
机构
[1] Ronin Inst, Montclair, NJ USA
[2] Asia Univ, Int Ctr AI & Cyber Secur Res & Innovat, Taichung 413, Taiwan
[3] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[4] Lebanese Amer Univ, Beirut, Lebanon
[5] Univ Petr & Energy Studies UPES, Ctr Interdisciplinary Res, Dehra Dun, Uttarakhand, India
[6] King Abdulaziz Univ, Dept Comp Sci, Jeddah, Saudi Arabia
[7] Amer Coll Greece, Sch Business, Deree Coll, Athens, Greece
[8] Najran Univ, Coll Comp Sci & Informat Syst, Najran, Saudi Arabia
关键词
DDoS; DDoS attack tools; resource depletion attack; volumetric DDoS attack; MECHANISM; CLASSIFICATION; MITIGATION; ROUTER;
D O I
10.1002/int.23048
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The purpose of this study is to provide an overview of distributed denial of service (DDoS) attack detection in intelligent systems. In recent times, due to the endemic COVID-19, the use of intelligent systems has increased. However, these systems are easily affected by DDoS attacks. A DDoS attack is a reliable tool for cyber-attackers because there is no efficient method which can detect or filter it properly. In this context, we analyze different types of DDoS attacks and defense techniques for intelligent systems. For the analysis, we used Scopus databases to collect relevant papers in English between 2014 and 2022. This study makes an important contribution to the field of DDoS attack detection for intelligent systems, providing a comprehensive overview of the field's evolution and current status, as well as a comprehensive, synthesized, and organized summary of various perspectives, definitions, and trends in the field.
引用
收藏
页码:11407 / 11431
页数:25
相关论文
共 88 条
[1]   Attack-Specific Feature Selection for Anomaly Detection in Software-Defined Networks [J].
Abbas, Nadine ;
Nasser, Youssef ;
Shehab, Maryam ;
Sharafeddine, Sanaa .
2021 3RD IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), 2021, :142-146
[2]   IoT DDoS Traffic Detection Using Adaptive Heuristics Assisted With Machine Learning [J].
Al Rahbani, Rani ;
Khalife, Jawad .
2022 10TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2022,
[3]   DNS rule-based schema to botnet detection [J].
Alieyan, Kamal ;
Almomani, Ammar ;
Anbar, Mohammed ;
Alauthman, Mohammad ;
Abdullah, Rosni ;
Gupta, B. B. .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) :545-564
[4]  
Alomari E., 2016, HDB RES MODERN CRYPT, V34, P52, DOI DOI 10.4018/978-1-5225-0105-3.CH003
[5]   DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark [J].
Alsirhani, Amjad ;
Sampalli, Srinivas ;
Bodorik, Peter .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (03) :936-949
[6]  
[Anonymous], 2012, ARXIV PREPRINT ARXIV
[7]  
[Anonymous], 2015, INT J ELECT INFORM E
[8]   Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation [J].
Balamurugan, V. ;
Saravanan, R. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6) :13027-13039
[9]  
Barlow J., 2000, TFN2K AN ANAL
[10]  
Behal Sunny, 2017, International Journal of Network Security, V19, P383, DOI 10.6633/IJNS.201703.19(3).07