2023
DOI: 10.11591/eei.v12i2.4466
|View full text |Cite
|
Sign up to set email alerts
|

DDoS attacks detection using machine learning and deep learning techniques: analysis and comparison

Abstract: The security of the internet is seriously threatened by a distributed denial of service (DDoS) attacks. The purpose of a DDoS assault is to disrupt service and prevent legitimate users from using it by flooding the central server with a large number of messages or requests that will cause it to reach its capacity and shut down. Because it is carried out by numerous bots that are managed (infected) by a single botmaster using a fake IP address, this assault is dangerous because it does not involve a lot of work… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 39 publications
(21 citation statements)
references
References 52 publications
0
21
0
Order By: Relevance
“…The effectiveness of ML techniques has led researchers to use them in topical areas such as IoT [52], [53], online social network [54], DoS detection, DDoS [55]- [60], and distributed reflexion denial of service (DRDoS) [61]. However, obtaining good results depends on the techniques used, and the way in which we create our models.…”
Section: Resultsmentioning
confidence: 99%
“…The effectiveness of ML techniques has led researchers to use them in topical areas such as IoT [52], [53], online social network [54], DoS detection, DDoS [55]- [60], and distributed reflexion denial of service (DRDoS) [61]. However, obtaining good results depends on the techniques used, and the way in which we create our models.…”
Section: Resultsmentioning
confidence: 99%
“…This is because it has a powerful model for predicting time series because of its long short-term Memory, which allows it to remember what it has been told in the past. For example, it is possible to identify and categorize dangerous applications and detect intrusions using an L.S.T.M.-model-based recurrent network [ 120 ]. It can also be used for further security-related tasks.…”
Section: Resultsmentioning
confidence: 99%
“…Current M2M authentication protocols proposed for IIoT networks have serious security flaws that leave networks vulnerable to a wide variety of cyberattacks, such as denialof-service (DoS) attacks [18], router impersonation attacks, and smart-sensor tracing attacks. Based on the findings, it is possible for an intruder to gain access to the router's secret key and the session key being used by another smart device to establish an encrypted connection to the router.…”
Section: A Digital Signature-based Mechanismsmentioning
confidence: 99%