2022
DOI: 10.5755/j01.itc.51.1.29595
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Review of Deep Learning Techniques for the Detection of (Distributed) Denial of Service Attacks

Abstract: (Distributed) Denial of Service (DoS/DDoS) attacks are performed to bring down a target by flooding it withuseless traffic. Because the DoS/DDoS attackers often change their styles and attack patterns, the nature andcharacteristics of these attacks need to be examined cautiously. Developing mechanisms to detect this menaceis a challenging task. Recently, deep learning has played a major role in the growth of intrusion detection solutions. In recent years, significant attempts have been made to construct deep l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…With the continuous development of deep learning technology, it is also widely used in intrusion detection [20]. Different from traditional machine learning algorithms, deep learning technology can automatically learn data features without human intervention, which brings a new idea for processing multi feature intrusion data [21].…”
Section: Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…With the continuous development of deep learning technology, it is also widely used in intrusion detection [20]. Different from traditional machine learning algorithms, deep learning technology can automatically learn data features without human intervention, which brings a new idea for processing multi feature intrusion data [21].…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…This is the author's version which has not been fully edited and content may change prior to final publication. F1 score, which is the harmonic average of recall rate and accuracy rate, it s a measure of a test's accuracy, the calculation process is shown in (20).…”
Section: B Evaluation Criteriamentioning
confidence: 99%
“…Reviews of LDoS attacks exist [43,1,44,3,45], but none relates to resource-constrained ICPS. Similarly, some surveys review security concerns of the cyber-physical systems using ML/DL [46][47][48][49][50][51]; however, they do not cover LDoS or their detection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Due to the information interaction process between the nodes of complex cyber-physical networks through cyber space has become more complicated, thus complex cyber-physical networks are confronted with a larger risk of communications network-induced issues like network delay [29] and cyber attacks [28]. As an emerging field, security issues due to cyber attacks in the complex networks has attracted extensive attention and achieved a series of meaningful research results [10,11,12,19,34]. In general, there have been three cyber attacks that frequently arise in addressing the problem of secure control, i.e., false data injection (FDI) attacks [10,12,34], denial of service (DoS) attacks [19] and replay attacks [11].…”
Section: Introductionmentioning
confidence: 99%
“…As an emerging field, security issues due to cyber attacks in the complex networks has attracted extensive attention and achieved a series of meaningful research results [10,11,12,19,34]. In general, there have been three cyber attacks that frequently arise in addressing the problem of secure control, i.e., false data injection (FDI) attacks [10,12,34], denial of service (DoS) attacks [19] and replay attacks [11]. From the perspective of security level, FDI attacks are the most dangerous attack, because the attackers can inject malicious data to worsen or destabilize the performance of the target system.…”
Section: Introductionmentioning
confidence: 99%