2023
DOI: 10.3390/jsan12040051
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges

Abstract: In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent security flaws, the attacks seek to deplete the resources of the target network by flooding it with numerous spoofed requests from a distributed system. Research studies have demonstrated that a DDoS attack has a considerable impact on the target network resources and c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(4 citation statements)
references
References 194 publications
0
4
0
Order By: Relevance
“…Kazeem et al [9] reviewed methods used to detect and mitigate DDoS attacks on many Internet-enabled networks, including NDN, SDN, and IoT. In addition, it presented attack scenarios in some domains, such as the Internet of Drones, routing protocol-based IoT, and named-data networking.…”
Section: Related Work On Icn-based Iot With Machine Learning Technolo...mentioning
confidence: 99%
See 1 more Smart Citation
“…Kazeem et al [9] reviewed methods used to detect and mitigate DDoS attacks on many Internet-enabled networks, including NDN, SDN, and IoT. In addition, it presented attack scenarios in some domains, such as the Internet of Drones, routing protocol-based IoT, and named-data networking.…”
Section: Related Work On Icn-based Iot With Machine Learning Technolo...mentioning
confidence: 99%
“…These methods are significant methods to detect and mitigate DoS attacks such as the interest flooding attack (IFA). Other methods are recommended by [9], including the statistical approach, heuristic approach, machine learning (ML), and deep learning (DL). Consequently, there are various anomaly-based attack detection techniques to use.…”
Section: Introductionmentioning
confidence: 99%
“…DDoS attacks present a significant and escalating threat to the Internet [8]. Attackers continually adapt their tactics to evade security systems, prompting researchers to consistently refine their approaches to counter new attack strategies.…”
Section: Motivationmentioning
confidence: 99%
“…These include the HTTP flood attack at the application layer [19] as well as the TCP-SYN and UDP flooding attacks at the transport layer [20][21][22]. The flood attack can also be performed at the network layer by flooding the network with ICMP messages [23,24]. The emergence of such attacks is driven by the lack of full adherence to strict security requirements.…”
Section: Introductionmentioning
confidence: 99%