2020
DOI: 10.34028/iajit/17/4a/10
|View full text |Cite
|
Sign up to set email alerts
|

DoS and DDoS Attack Detection Using Deep Learning and IDS

Abstract: In the recent years, Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attack has spread greatly and attackers make online systems unavailable to legitimate users by sending huge number of packets to the target system. In this paper, we proposed two methodologies to detect Distributed Reflection Denial of Service (DrDoS) attacks in IoT. The first methodology uses hybrid Intrusion Detection System (IDS) to detect IoT-DoS attack. The second methodology uses deep learning models, based on Long Short… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 51 publications
(31 citation statements)
references
References 0 publications
0
31
0
Order By: Relevance
“…Shurman et al. ( 2020 ) proposed two methodologies the first method is a hybrid-based IDS, and the second method is a DL model based on LSTM to detect DoS/DDoS attacks. The first method, the IDS framework, defined as an application, can detect malicious network traffic from any network device with running datasets of IPs against it.…”
Section: Methodologies Strengths and Weaknessesmentioning
confidence: 99%
See 2 more Smart Citations
“…Shurman et al. ( 2020 ) proposed two methodologies the first method is a hybrid-based IDS, and the second method is a DL model based on LSTM to detect DoS/DDoS attacks. The first method, the IDS framework, defined as an application, can detect malicious network traffic from any network device with running datasets of IPs against it.…”
Section: Methodologies Strengths and Weaknessesmentioning
confidence: 99%
“…Some real DDoS attacks are: TCP, UDP and ICMP Liang and Znati ( 2019 ) 2019 LSTM CICIDS2017 Slowloris, Hulk, Slowhttptest, GoldenEye and LOIC Shurman et al. ( 2020 ) 2020 Hybrid IDS and LSTM Reflection-based CICDDoS2019 MSSQL, SSDP, CharGen, LDAP, NTP, TFTP, DNS, SNMP, NETBIOS, and PORTMAP Assis et al. ( 2021 ) 2021 GRU CICDDoS2019 and CICIDS2018 CICDDoS2019: Twelve DDoS attacks on the training day and seven attacks during the testing day.…”
Section: Available Ddos Benchmarked Datasets and Classes Of Attacks In Datasetsmentioning
confidence: 99%
See 1 more Smart Citation
“…Shurman et al [ 92 ] proposed two models in an attempt to detect anomalies on the CICDDoS2019 dataset [ 93 ]. The first model was a hybrid model that encompasses signature-based method with an anomaly-based method.…”
Section: Related Workmentioning
confidence: 99%
“…Shurman et al [16] proposed two models in an attempt to detect anomalies on the CICDDoS2019 dataset [17]. The first model was a hybrid model that encompasses signaturebased method with an anomaly-based method.…”
Section: Related Workmentioning
confidence: 99%