Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- review-articleJanuary 2025
A Comparative Assessment of Deep Learning for Adaptable DDoS Threat Detection in Cloud Computing Systems
AbstractAs cyber threats like Distributed Denial of Service (DDoS) attacks escalate, developing intelligent detection systems is imperative for securing cloud computing. This research proposes a Deep Recurrent Neural Network (Deep RNN) model with Long ...
- research-articleDecember 2024
Evaluation of the Latency of Machine Learning Random Access DDoS Detection in Open RAN
- Paulo Ricardo Branco da Silva,
- João Paulo Henriques Sales de Lima,
- Erika Costa Alves,
- William Sanchez Farfan,
- Victor Aguiar Coutinho,
- Thomas William do Prado Paiva,
- Daniel Lazkani Feferman,
- Francisco Hugo Costa Neto
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 2306–2311https://doi.org/10.1145/3636534.3701546A testbed with open-source tools and commercial equipment is designed to investigate the timing of ML-based xApp operations in DDoS attack detection during the Random Access procedure. Results show high-precision and high-recall ML classifiers operating ...
- research-articleNovember 2024
Identifying Distributed Denial of Service Attacks through Multi-Model Deep Learning Fusion and Combinatorial Analysis
- Ali Alfatemi,
- Mohamed Rahouti,
- D. Frank Hsu,
- Christina Schweikert,
- Nasir Ghani,
- Aiman Solyman,
- Mohammad I. Saryuddin Assaqty
Journal of Network and Systems Management (JNSM), Volume 33, Issue 1https://doi.org/10.1007/s10922-024-09882-0AbstractDistributed Denial of Service (DDoS) attacks pose a major threat to organizations by overwhelming their networks and servers. Effective identification of DDoS attacks is crucial for timely mitigation. This paper proposes a novel approach using ...
- research-articleOctober 2024
Parallel path selection mechanism for DDoS attack detection
Journal of Network and Computer Applications (JNCA), Volume 230, Issue Chttps://doi.org/10.1016/j.jnca.2024.103938AbstractDDoS attack have always been a popular topic in the field of network security. As an emerging networking paradigm, SDN’s characteristics such as centralized control and management and monitoring flow-based traffic make it an ideal platform to ...
- research-articleOctober 2024
Detecting DDoS based on attention mechanism for Software-Defined Networks
Journal of Network and Computer Applications (JNCA), Volume 230, Issue Chttps://doi.org/10.1016/j.jnca.2024.103928AbstractIn this paper, we propose a deep learning model based on a novel Divide and Conquer Attention (DCA) mechanism, for efficient detection of Distributed Denial of Service (DDoS) attacks in a virtual Software Defined Networking(SDN) environment. DDoS ...
Graphical abstractDisplay Omitted
Highlights- Development of mechanism that focus on important parts of traffic data in the SDN environment.
- Evaluation of the proposed model performance with diverse DDoS attacks in the SDN environments.
- Validation of the proposed detection ...
-
- research-articleJanuary 2025
DDoS Attack Detection Based on Differential Privacy Graph Data Protection in IoV
ADMIT '24: Proceedings of the 2024 3rd International Conference on Algorithms, Data Mining, and Information TechnologyPages 281–287https://doi.org/10.1145/3701100.3701159With IoV’s rapid growth and widespread use, securing it has become a key focus in scholarly research. In vehicle networking, DDoS attacks are prevalent and impactful. Existing deep learning methods for DDoS detection in IoV often yield superior results. ...
- research-articleSeptember 2024
Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure
AbstractIn recent years, smart grid-based Electric Vehicle (EV) charging systems have increasingly faced vulnerabilities to Distributed Denial of Service (DDoS) attacks, especially through malicious authentication failures. These attacks typically ...
- research-articleSeptember 2024
Robust DDoS attack detection with adaptive transfer learning
AbstractIn the evolving cybersecurity landscape, the rising frequency of Distributed Denial of Service (DDoS) attacks requires robust defense mechanisms to safeguard network infrastructure availability and integrity. Deep Learning (DL) models have ...
- research-articleAugust 2024
Dynamic Fixed-point Values in eBPF: a Case for Fully In-kernel Anomaly Detection
AINTEC '24: Proceedings of the Asian Internet Engineering Conference 2024Pages 46–54https://doi.org/10.1145/3674213.3674219eBPF and XDP are promising technologies that are capable of accelerating packet processing inside the Linux kernel. Despite these benefits, eBPF is constrained by a number of rigorous restrictions that are imposed to protect the kernel. One such ...
- research-articleAugust 2024
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments
AbstractVehicular networks are vulnerable to Distributed Denial of Service (DDoS), an extension of a Denial of Service (DoS) attack. The existing solutions for DDoS detection in vehicular networks use various Machine Learning (ML) algorithms. However, ...
- research-articleAugust 2024
FTG-Net-E: A hierarchical ensemble graph neural network for DDoS attack detection
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 250, Issue Chttps://doi.org/10.1016/j.comnet.2024.110508AbstractDistributed Denial-of-Service (DDoS) attacks are a major threat to computer networks. These attacks can be carried out by flooding a network with malicious traffic, overwhelming its resources, and/or making it unavailable to legitimate users. ...
- review-articleJuly 2024
DDoS attack detection techniques in IoT networks: a survey
Cluster Computing (KLU-CLUS), Volume 27, Issue 10Pages 14637–14668https://doi.org/10.1007/s10586-024-04662-6AbstractThe Internet of Things (IoT) is a rapidly emerging technology that has become more valuable and vital in our daily lives. This technology enables connection and communication between objects and devices and allows these objects to exchange ...
- short-paperJuly 2024
QUICPro: Integrating Deep Reinforcement Learning to Defend against QUIC Handshake Flooding Attacks
ANRW '24: Proceedings of the 2024 Applied Networking Research WorkshopPages 94–96https://doi.org/10.1145/3673422.3674901In recent years, QUIC protocol has emerged as a promising alternative to traditional transport protocols like TCP and UDP, offering significant performance improvements in latency and throughput. Additionally, QUIC provides strong security protection ...
- research-articleJuly 2024
A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks
Cluster Computing (KLU-CLUS), Volume 27, Issue 10Pages 13809–13834https://doi.org/10.1007/s10586-024-04638-6AbstractIoT application uses MQTT, an application layer protocol that facilitates machine-to-machine communication using a central entity called broker. The vulnerability lies in the broker being susceptible to intrusion attempts, where a potential ...
- research-articleJuly 2024
Towards Detection of DDoS Attacks in IoT with Optimal Features Selection
Wireless Personal Communications: An International Journal (WPCO), Volume 137, Issue 2Pages 951–976https://doi.org/10.1007/s11277-024-11419-2AbstractThe exponential growth of internet-enabled devices and their interconnectedness heightens the vulnerability of technology to cyber threats. The simplicity of communication lures attackers to execute numerous attacks, with Distributed Denial of ...
- review-articleJune 2024
DoS/DDoS attacks in Software Defined Networks: Current situation, challenges and future directions
Computer Communications (COMS), Volume 222, Issue CPages 77–96https://doi.org/10.1016/j.comcom.2024.04.035AbstractSoftware-Defined Network (SDN) is a perception of networking that separates the network into different layers responsible for applications, control, and data, thus providing a flexible and programmable architecture and making the network more ...
Highlights- Detail of DoS/DDoS attacks across SDN layers and boundaries.
- Review the existing solutions for dealing with DoS/DDoS attacks in SDN.
- Security Issues and Challenges in the SDN environment are discussed.
- Vision for addressing DoS/...
- research-articleMay 2024
An Enhanced DDoS Attack Detection in Software-Defined-Networks using Ensemble Learning
AbstractThe rising danger of Distributed Denial of Service (DDoS) attacks in Software-Defined Networking (SDN) environments stresses advanced detection strategies to safeguard network availability and service integrity. By utilizing ensemble learning ...
- research-articleAugust 2024
Detection and Prevention System on Computer Network to Handle Distributed Denial-Of-Service (Ddos) Attack in Realtime and Multi-Agent
ICCTA '24: Proceedings of the 2024 10th International Conference on Computer Technology ApplicationsPages 237–241https://doi.org/10.1145/3674558.3674592This research builds a realtime and multi-agent system to handle Distributed Denial of Service (DDoS) attacks. The integration of an Intrusion Detection System (IDS), Security Information and Event Management (SIEM), and Security Orchestration, ...
- research-articleMay 2024
DDoS attack detection in cloud using ensemble model tuned with optimal hyperparameter
International Journal of Adaptive Control and Signal Processing (ACSP), Volume 38, Issue 5Pages 1594–1620https://doi.org/10.1002/acs.3766SummaryDDoS attacks are a type of cloud incursion that lessen service degradation. DDoS attacks target the cloud network with invalid requests, rejecting legitimate requests. Such attacks disrupt the entire cloud architecture, thus it needs efficient ...
- review-articleMay 2024
AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges
AbstractDistributed Denial of Service (DDoS) attacks in IoT networks are one of the most devastating and challenging cyber-attacks. The number of IoT users is growing exponentially due to the increase in IoT devices over the past years. Consequently, ...