2023
DOI: 10.1016/j.comcom.2022.11.013
|View full text |Cite
|
Sign up to set email alerts
|

Detection of DDoS attacks in D2D communications using machine learning approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…Attack [62][63][64] Slowloris is an application layer distributed denial-of-service (DDoS) attack that overloads and eventually shuts down a target Web server by repeatedly delivering unclear Hypertext Transfer Protocol (HTTP) requests from a single IoT device. This specific DDoS attack can be launched with minimal bandwidth while leaving other applications and ports unaffected.…”
Section: Ddos (Slowloris)mentioning
confidence: 99%
“…Attack [62][63][64] Slowloris is an application layer distributed denial-of-service (DDoS) attack that overloads and eventually shuts down a target Web server by repeatedly delivering unclear Hypertext Transfer Protocol (HTTP) requests from a single IoT device. This specific DDoS attack can be launched with minimal bandwidth while leaving other applications and ports unaffected.…”
Section: Ddos (Slowloris)mentioning
confidence: 99%
“…In [58], authors use a variety of Machine Learning (ML) techniques, such as random forest, light GBM, XGBoost, and AdaBoost, to quantify detection accuracy in the context of DDoS and DoS attacks and examine their performance through extensive simulation. According to the gathered results, random forest improves the accuracy of both the Slowloris and CIC-DDoS2019 datasets.…”
Section: ) Existing Methods For Identifying Numerous (More Than Two) ...mentioning
confidence: 99%
“…Only some utilise deep neural networks from the other approaches: the [20] and [51]. Also, regarding the dataset, this paper and [58] used a well-known dataset with an emulating dataset. Moreover, this paper and [58] support D2D communication.…”
Section: Comparison Of Related Work That Utilised ML Used At Idsmentioning
confidence: 99%
“…The study [51] employed ML to detect DDoS attacks in device-to-device (D2D) connections. Solutions include using ML techniques such as Random Forest, XG Boost, Ada Boost, and Light Gradient Boosting Machine (LGBM) to detect and prevent DDoS attacks in D2D communication systems.…”
Section: A Ddos Anomaly Based On ML -Existing Research Workmentioning
confidence: 99%