DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges
<p>A typical GPS spoofing and jamming attack on a UAV system [<a href="#B8-jsan-12-00051" class="html-bibr">8</a>].</p> "> Figure 2
<p>Analysis of the selected articles in the literature review: (<b>a</b>) temporal distribution of articles per year, (<b>b</b>) distribution of articles per source type and publisher.</p> "> Figure 3
<p>Architecture of a DDoS attack: (<b>a</b>) centralized, (<b>b</b>) decentralized.</p> "> Figure 4
<p>Volume of DDoS attacks generated through IoT devices in 2020 [<a href="#B40-jsan-12-00051" class="html-bibr">40</a>].</p> "> Figure 5
<p>The major categories of DDoS attacks.</p> "> Figure 6
<p>Conventional structure of a volumetric-based DDoS attack.</p> "> Figure 7
<p>Distribution of DDoS attacks: (<b>a</b>) frequency of attack categories between January 2020 and March 2021, (<b>b</b>) multi-vector attack scenarios.</p> "> Figure 8
<p>DDoS attack detection methodologies.</p> "> Figure 9
<p>Generic framework of a conventional entropy-based DDoS attack detection approach adapted from [<a href="#B63-jsan-12-00051" class="html-bibr">63</a>].</p> "> Figure 10
<p>Framework for multi-classifier entropy-based features for DDoS attack detection, adapted from [<a href="#B71-jsan-12-00051" class="html-bibr">71</a>].</p> "> Figure 11
<p>A simple queue system.</p> "> Figure 12
<p>Framework for DDoS attack detection using Chi-square approach.</p> "> Figure 13
<p>Correlation between the mean and standard deviation of traffic throughput, adapted from [<a href="#B98-jsan-12-00051" class="html-bibr">98</a>].</p> "> Figure 14
<p>A typical experimental setup for DDoS attack detection machine: (<b>a</b>) architecture of the smart pole, (<b>b</b>) multi-layer IoT architecture, adapted from [<a href="#B139-jsan-12-00051" class="html-bibr">139</a>].</p> "> Figure 15
<p>Detection accuracies observed from different research studies: (<b>a</b>) conventional machine learning models such as SVM [<a href="#B127-jsan-12-00051" class="html-bibr">127</a>], DT [<a href="#B135-jsan-12-00051" class="html-bibr">135</a>], XGBoost with ANOVA [<a href="#B140-jsan-12-00051" class="html-bibr">140</a>], LR with RF [<a href="#B141-jsan-12-00051" class="html-bibr">141</a>], NB [<a href="#B149-jsan-12-00051" class="html-bibr">149</a>], LGMB [<a href="#B150-jsan-12-00051" class="html-bibr">150</a>], and RF [<a href="#B158-jsan-12-00051" class="html-bibr">158</a>], (<b>b</b>) deep learning models such as DBN [<a href="#B11-jsan-12-00051" class="html-bibr">11</a>], RBF with PSO [<a href="#B154-jsan-12-00051" class="html-bibr">154</a>], LSTM [<a href="#B166-jsan-12-00051" class="html-bibr">166</a>], AE [<a href="#B170-jsan-12-00051" class="html-bibr">170</a>], SAE with DNN [<a href="#B176-jsan-12-00051" class="html-bibr">176</a>], and GRU with RNN [<a href="#B178-jsan-12-00051" class="html-bibr">178</a>].</p> ">
Abstract
:1. Introduction
- A thorough description of DDoS attack categories and architecture was provided in this paper. Attack detection methods were classified, and research studies under each category are extensively discussed. The research studies in each category are then compared and analysed;
- Attack scenarios and detection studies in emerging networks such as IoDs, IoFT, FANET, RPL-based IoT, and NDN are also investigated;
- This paper covers Chi-square, Chao-based, and queueing model-based attack detection methods that were not covered in existing surveys;
- Apart from the DDoS attacks and detection methods, our survey also provides an overview of the benchmark dataset used for attack detection validation;
- Finally, several research issues and challenges associated with these methods are identified. A focus for future studies is also provided.
2. Taxonomy of DDoS Attacks
2.1. DDoS Attack Architecture
2.2. DDoS Attack Classification and Types in IoT Networks
2.2.1. Volumetric-Based DDoS Attacks
2.2.2. Protocol-Based DDoS Attacks
2.2.3. Application-Based DDoS Attacks
3. DDoS Attack Detection Methods
3.1. DDoS Attack Detection Studies Based on the Traditional Approach
3.2. DDoS Attack Detection Studies Using Signature-Based Methods
3.2.1. Traffic Pattern Analysis
3.2.2. Correlation of IP Address
3.3. DDoS Attack Detection Studies Using Anomaly-Based Methods
3.3.1. Entropy-Based Detection Method
3.3.2. Queue Modelling-Based Detection Methods
3.3.3. Statistical-Based Detection Methods
3.3.4. Attack Detection Methods Based on Chaos Theory
3.3.5. Heuristic-Based Detection System (HBDS)
3.3.6. Machine Learning-Based Detection Methods
3.3.7. Deep Learning-Based Detection Methods
4. Benchmark Databases and Performance Evaluation Metrics
4.1. Dataset Used
4.1.1. DARPA’98/99
4.1.2. KDD Cup’99
4.1.3. NSL–KDD
4.1.4. SSENeT-11
4.1.5. SSENet-14
4.1.6. Kent2016
4.1.7. ISCX2012
4.1.8. CIC DoS
4.1.9. DDoS2016
4.1.10. NDSec-1
4.1.11. CICIDS2017
4.1.12. CICIDS2018
4.1.13. CICDDoS2019
4.1.14. IoTID20
4.1.15. UAV-IDS-2020
4.2. Evaluation Metrics
4.2.1. Detection Accuracy
4.2.2. Error Rate
4.2.3. Specificity
4.2.4. Precision
4.2.5. Sensitivity/Recall(s)
4.2.6. F-Measure/F1-Score
5. Key Findings and Discussions
6. Challenges and Future Research Directions
6.1. Detection Speed and Computational Overhead
6.2. Real-Time Realization under Resource Constraints for IoT Devices
6.3. Adaptive Threshold and Feature Selection
6.4. Self-Learning and Adaptation
6.5. Data Quality Issues
6.6. Lack of Real-Time Datasets
7. Conclusions and Limitations
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Kiran, S.; Sriramoju, S.B. A study on the applications of IoT. Indian J. Public Health Res. Dev. 2018, 9, 1173–1175. [Google Scholar] [CrossRef]
- Khan, M.A. Challenges facing the application of IoT in medicine and healthcare. Int. J. Comput. Inf. Manuf. 2021, 1, 39–55. [Google Scholar] [CrossRef]
- Banafshehvaragh, S.T.; Rahmani, A.M. Intrusion, anomaly, and attack detection in smart vehicles. Microprocess. Microsyst. 2023, 96, 104726. [Google Scholar] [CrossRef]
- Svaigen, A.R.; Boukerche, A.; Ruiz, L.B.; Loureiro, A.A. Trajectory Matters: Impact of jamming attacks over the drone path planning on the internet of drones. Ad Hoc Netw. 2023, 146, 103179. [Google Scholar] [CrossRef]
- Rahman, K.; Aziz, M.A.; Usman, N.; Kiren, T.; Cheema, T.A.; Shoukat, H.; Bhatia, T.K.; Abdollahi, A.; Sajid, A. Cognitive lightweight logistic regression-based IDS for IoT-enabled FANET to detect cyberattacks. Mob. Inf. Syst. 2023, 2023, 7690322. [Google Scholar] [CrossRef]
- Almasoud, A. Jamming-aware optimization for UAV trajectory design and internet of things devices clustering. Complex Intell. Syst. 2023, 1–20. [Google Scholar] [CrossRef]
- Srivastava, A.; Prakash, J. Internet of low-altitude UAVs (IoLoUA): A methodical modelling on integration of internet of “things” with “UAV” possibilities and tests. Artif. Intell. Rev. 2023, 56, 2279–2324. [Google Scholar] [CrossRef]
- Mykytyn, P.; Brzozowski, M.; Dyka, Z.; Langendoerfer, P. GPS-spoofing attack detection mechanism for UAV swarms. arXiv 2023, arXiv:2301.12766. [Google Scholar]
- Mekdad, Y.; Aris, A.; Babun, L.; El Fergougui, A.; Conti, M.; Lazzeretti, R.; Uluagac, A.S. A survey on security and privacy issues of UAVs. Comput. Netw. 2023, 224, 109626. [Google Scholar] [CrossRef]
- Wu, S.; Li, Y.; Wang, Z.; Tan, Z.; Pan, Q. A highly interpretable framework for generic low-cost UAV attack detection. IEEE Sens. J. 2023, 23, 7288–7300. [Google Scholar] [CrossRef]
- Xie, Z.; Li, Z.; Gui, J.; Liu, A.; Xiong, N.N.; Zhang, S. UWPEE: Using UAV and wavelet packet energy entropy to predict traffic-based attacks under limited communication, computing and caching for 6G wireless systems. Future Gener. Comput. Syst. 2023, 140, 238–252. [Google Scholar] [CrossRef]
- Mohsan, S.A.H.; Othman, N.Q.H.; Li, Y.; Alsharif, M.H.; Khan, M.A. Unmanned aerial vehicles (UAVs): Practical aspects, applications, open challenges, security issues, and future trends. Intell. Serv. Robot. 2023, 2023, 109–137. [Google Scholar] [CrossRef] [PubMed]
- Nayfeh, M.; Li, Y.; Al Shamaileh, K.; Devabhaktuni, V.; Kaabouch, N. Machine learning modelling of GPS features with applications to UAV location spoofing detection and classification. Comput. Secur. 2023, 126, 103085. [Google Scholar] [CrossRef]
- Escorcia-Gutierrez, J.; Gamarra, M.; Leal, E.; Madera, N.; Soto, C.; Mansour, R.F.; Alharbi, M.; Alkhayyat, A.; Gupta, D. Sea turtle foraging algorithm with hybrid deep learning-based intrusion detection for the internet of drones environment. Comput. Electr. Eng. 2023, 108, 108704. [Google Scholar] [CrossRef]
- Altaweel, A.; Mukkath, H.; Kamel, I. GPS Spoofing attacks in FANETs: A systematic literature review. IEEE Access 2023, 11, 55233–55280. [Google Scholar] [CrossRef]
- Wei, X.; Aman, M.N.; Sikdar, B. A Light-Weight Technique to Detect GPS Spoofing Using Attenuated Signal Envelopes. IEEE Open J. Comput. Soc. 2023, 4, 158–170. [Google Scholar] [CrossRef]
- Tong, F.; Zhang, Z.; Zhu, Z.; Zhang, Y.; Chen, C. A novel scheme based on coarse-grained localization and fine-grained isolation for defending against Sybil attack in low power and lossy networks. Asian J. Control 2023, 2023, 1–12. [Google Scholar] [CrossRef]
- Bang, A.; Rao, U.P. Performance evaluation of RPL protocol under decreased and increased rank attacks: A focus on smart home use-case. SN Comput. Sci. 2023, 4, 329. [Google Scholar] [CrossRef]
- Babu, V.J.; Jose, M.V. Dynamic forest of random subsets-based one-time signature-based capability enhancing security architecture for named data networking. Int. J. Inf. Technol. 2023, 15, 773–788. [Google Scholar] [CrossRef]
- F5. DDoS Architecture Diagram and White Paper. 2020. Available online: https://www.f5.com/services/resources/white-papers/the-f5-ddos-protection-reference-architecture (accessed on 15 November 2022).
- Gil, T.M.; Poletto, M. MULTOPS: A data-structure for bandwidth attack detection. In Proceedings of the 10th USENIX Security Symposium, Washington, DC, USA, 13–17 August 2001. [Google Scholar]
- Waizumi, Y.; Sato, T.; Nemoto, Y. A new traffic pattern matching for DDoS traceback using independent component analysis. World Acad. Sci. Eng. Technol. 2011, 60, 760–766. [Google Scholar]
- Zargar, S.T.; Joshi, J.; Tipper, D. A survey of defence mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 2013, 15, 2046–2069. [Google Scholar] [CrossRef] [Green Version]
- Sonar, K.; Upadhyay, H. A survey: DDOS attack on internet of things. Int. J. Eng. Res. Dev. 2014, 10, 58–63. [Google Scholar]
- Kaur, P.; Kumar, M.; Bhandari, A. A review of detection approaches for distributed denial of service attacks. Syst. Sci. Control Eng. 2017, 5, 301–320. [Google Scholar] [CrossRef] [Green Version]
- Kamboj, P.; Trivedi, M.C.; Yadav, V.K.; Singh, V.K. Detection techniques of DDoS attacks: A survey. In Proceedings of the 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics, Mathura, India, 26–28 October 2017; pp. 675–679. [Google Scholar]
- Abdul-Ghani, H.A.; Konstantas, D.; Mahyoub, M. A comprehensive IoT attacks survey based on a building-blocked reference model. Int. J. Adv. Comput. Sci. Appl. 2018, 9, 355–373. [Google Scholar]
- Alhajri, R.; Zagrouba, R.; Al-Haidari, F. Survey for anomaly detection of IoT botnets using machine learning auto-encoders. Int. J. Appl. Eng. Res. 2019, 14, 2417–2421. [Google Scholar]
- Khalaf, B.A.; Mostafa, S.A.; Mustapha, A.; Mohammed, M.A.; Abduallah, M.W. Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access 2019, 7, 51691–51713. [Google Scholar] [CrossRef]
- Vishwakarma, R.; Jain, A.K. A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 2020, 73, 3–25. [Google Scholar] [CrossRef]
- Tayyab, M.; Belaton, B.; Anbar, M. ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review. IEEE Access 2020, 8, 170529–170547. [Google Scholar] [CrossRef]
- Nooribakhsh, M.; Mollamotalebi, M. A review on statistical approaches for anomaly detection in DDoS attacks. Inf. Secur. J. A Glob. Perspect. 2020, 29, 118–133. [Google Scholar] [CrossRef]
- Haji, S.H.; Ameen, S.Y. Attack and anomaly detection in IoT networks using machine learning techniques: A review. Asian J. Res. Comput. Sci. 2021, 9, 30–46. [Google Scholar] [CrossRef]
- Huang, K.; Yang, L.Y.; Yang, X.; Xiang, Y.; Tang, Y.Y. A low-cost distributed denial-of-service attack architecture. IEEE Access 2020, 8, 42111–42119. [Google Scholar] [CrossRef]
- De Donno, M.; Giaretta, A.; Dragoni, N.; Spognardi, A. A taxonomy of distributed denial of service attacks. In Proceedings of the IEEE International Conference on Information Society, Dublin, Ireland, 17–19 July 2017; pp. 100–107. [Google Scholar]
- Shorey, T.; Subbaiah, D.; Goyal, A.; Sakxena, A.; Mishra, A.K. Performance comparison and analysis of slowloris, goldeneye and xerxes DDoS attack tools. In Proceedings of the IEEE International Conference on Advances in Computing, Communications and Informatics, Bangalore, India, 19–22 September 2018; pp. 318–322. [Google Scholar]
- Douligeris, C.; Mitrokotsa, A. DDoS attacks and defense mechanisms; classification and state-of-the-art. Compt. Netw. 2004, 44, 643–666. [Google Scholar] [CrossRef]
- Singh, K.J.; De, T. Mathematical modelling of DDoS attack and detection using correlation. J. Cyber Secur. Technol. 2017, 1, 175–186. [Google Scholar] [CrossRef]
- Luo, J.; Yang, X.; Wang, J.; Xu, J.; Sun, J.; Long, K. On a mathematical model for low-rate shrew DDoS. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1069–1083. [Google Scholar] [CrossRef]
- Akamai. Threat Advisory: Internet of Things and the Rise of 300 Gbps DDoS Attacks. Available online: https://www.akamai.com/us/en/multimedia/documents/social/q4-state-of-the-internet-security-spotlight-iot-rise-of-300-gbp-ddos-attacks.pdf (accessed on 16 December 2022).
- Ibrahim, R.F.; Abu Al-Haija, Q.; Ahmad, A. DDoS attack prevention for internet of thing devices using ethereum blockchain technology. Sensors 2022, 22, 6806. [Google Scholar] [CrossRef]
- Shroff, J.; Walambe, R.; Singh, S.K.; Kotecha, K. Enhanced security against volumetric DDoS attacks using adversarial machine learning. Wirel. Commun. Mob. Comput. 2022, 2022, 5757164. [Google Scholar] [CrossRef]
- Salim, M.M.; Rathore, S.; Park, J.H. Distributed denial of service attacks and its defenses in IoT: A survey. J. Supercomput. 2020, 76, 5320–5363. [Google Scholar] [CrossRef]
- Erhan, D.; Anarim, E. Hybrid DDoS detection framework using matching pursuit algorithm. IEEE Access 2020, 8, 118912–118923. [Google Scholar] [CrossRef]
- Praseed, A.; Thilagam, P.S. DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications. IEEE Commun. Surv. Tutor. 2018, 21, 661–685. [Google Scholar] [CrossRef]
- F5 Labs. DDoS Attack Trends for 2020. Available online: https://www.f5.com/labs/articles/threat-intelligence/ddos-attack-trends-for-2020 (accessed on 19 November 2022).
- Nexus Guard. Threat Report Distributed Denial of Service. 2018. Available online: https://www.nexusguard.com/hubfs/Threat%20Report%20Q2%202018/Nexusguard_DDoS_Threat_Report_Q2_2018_EN.pdf (accessed on 31 December 2022).
- Sekar, V.; Duffield, N.G.; Spatscheck, O.; van der Merwe, J.E.; Zhang, H. LADS: Large-scale automated DDoS detection system. In Proceedings of the USENIX Annual Technical Conference, Boston, MA, USA, 30 May–3 June 2006; pp. 171–184. [Google Scholar]
- Shafiq, M.Z.; Ji, L.; Liu, A.X.; Pang, J.; Wang, J. Large-scale measurement and characterization of cellular machine-to-machine traffic. IEEE/ACM Trans. Netw. 2013, 21, 1960–1973. [Google Scholar] [CrossRef]
- Moore, A.W.; Zuev, D. Internet traffic classification using Bayesian analysis techniques. In Proceedings of the 2005 ACM SIGMETRICS International Conference on Measurement and Modelling of Computer Systems, Banff, AB, Canada, 6–10 June 2005; pp. 50–60. [Google Scholar]
- Lima Filho, F.S.D.; Silveira, F.A.; de Medeiros Brito Junior, A.; Vargas-Solar, G.; Silveira, L.F. Smart detection An online approach for DoS/DDoS attack detection using machine learning. Secur. Commun. Netw. 2019, 2019, 1574749. [Google Scholar] [CrossRef]
- Shafiq, M.; Yu, X.; Bashir, A.K.; Chaudhry, H.N.; Wang, D. A machine learning approach for feature selection traffic classification using security analysis. J. Supercomput. 2018, 74, 4867–4892. [Google Scholar] [CrossRef]
- Wu, Y.C.; Tseng, H.R.; Yang, W.; Jan, R.H. DDoS detection and traceback with decision tree and grey relational analysis. Int. J. Ad Hoc Ubiquitous Comput. 2011, 7, 121–136. [Google Scholar] [CrossRef] [Green Version]
- Krasnov, A.E.; Nikol’Skii, D.N.; Repin, D.S.; Galyaev, V.S.; Zykova, E.A. Detecting DDoS attacks using the analysis of network traffic as dynamical system. In Proceedings of the IEEE International Scientific and Technical Conference Modern Computer Network Technologies, Moscow, Russia, 27–28 October 2018; pp. 1–7. [Google Scholar]
- Guo, F.; Chen, J.; Chiueh, T.C. Spoof detection for preventing dos attacks against DNS servers. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, Lisboa, Portugal, 4–7 July 2006; p. 37. [Google Scholar]
- Wang, Z.; Wang, X. DDoS attack detection algorithm based on the correlation of IP address analysis. In Proceedings of the IEEE International Conference on Electrical and Control Engineering, Yichang, China, 16–18 September 2011; pp. 2951–2954. [Google Scholar]
- ren Cheng, J.; ping Yin, J. Distributed denial of service attack detection method based on address correlation. Comput. Res. Dev. 2009, 46, 1334–1340. [Google Scholar]
- Xiao, P.; Qu, W.; Qi, H.; Li, Z. Detecting DDoS attacks against data center with correlation analysis. Comput. Commun. 2015, 67, 66–74. [Google Scholar] [CrossRef] [Green Version]
- Rastegari, S.; Saripan, M.I.; Rasid, M.F.A. Detection of denial-of-service attacks against domain name system using neural networks. Int. J. Comput. Sci. Issues 2009, 6, 23–27. [Google Scholar]
- Saied, A.; Overill, R.E.; Radzik, T. Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing 2016, 172, 385–393. [Google Scholar] [CrossRef]
- Giotis, K.; Argyropoulos, C.; Androulidakis, G.; Kalogeras, D.; Maglaris, V. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 2014, 62, 122–136. [Google Scholar] [CrossRef]
- Rahmani, H.; Sahli, N.; Kammoun, F. Joint entropy analysis of DDoS attack detection. In Proceedings of the 5th IEEE International Conference on Information Assurance and Security, Washington, DC, USA, 18–20 August 2009; pp. 267–271. [Google Scholar]
- Gaurav, A.; Gupta, B.B.; Hsu, C.H.; Yamaguchi, S.; Chui, K.T. Fog layer-based DDoS attack detection approach for internet-of-things (IoTs) devices. In Proceedings of the IEEE International Conference on Consumer Electronics, Las Vegas, NV, USA, 10–12 January 2021; pp. 1–5. [Google Scholar]
- Gaurav, A.; Gupta, B.B.; Hsu, C.H.; Peraković, D.; Peñalvo, F.J.G. Filtering of distributed denial of services (DDoS) attacks in cloud computing environment. In Proceedings of the IEEE International Conference on Communications Workshops, Montreal, QC, Canada, 14–18 June 2021; pp. 1–6. [Google Scholar]
- Lakhina, A.; Crovella, M.; Diot, C. Mining anomalies using traffic feature distributions. ACM SIGCOMM Comput. Commun. Rev. 2005, 35, 217–228. [Google Scholar] [CrossRef] [Green Version]
- Li, J.; Liu, M.; Xue, Z.; Fan, X.; He, X. RTVD: A real-time volumetric detection scheme for DDoS in the internet of things. IEEE Access 2020, 8, 36191–36201. [Google Scholar] [CrossRef]
- David, J.; Thomas, C. DDoS attack detection using fast entropy approach on flow-based network traffic. Procedia Comput. Sci. 2015, 50, 30–36. [Google Scholar] [CrossRef] [Green Version]
- David, J.; Thomas, C. Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic. Comput. Secur. 2019, 82, 284–295. [Google Scholar] [CrossRef]
- Winter, P.; Lampesberger, H.; Zeilinger, M.; Hermann, E. On detecting abrupt changes in network entropy time series. In Proceedings of the IFIP International Conference on Communications and Multimedia Security, Ghent, Belgium, 19–21 October 2011; pp. 194–205. [Google Scholar]
- Qin, X.; Xu, T.; Wang, C. DDoS attack detection using flow entropy and clustering technique. In Proceedings of the 11th IEEE International Conference on Computational Intelligence and Security, Shenzhen, China, 19–20 December 2015; pp. 412–415. [Google Scholar]
- Koay, A.; Chen, A.; Welch, I.; Seah, W.K. A new multi classifier system using entropy-based features in DDoS attack detection. In Proceedings of the IEEE International Conference on Information Networking, Chiang Mai, Thailand, 10–12 January 2018; pp. 162–167. [Google Scholar]
- Nychis, G.; Sekar, V.; Andersen, D.G.; Kim, H.; Zhang, H. An empirical evaluation of entropy-based traffic anomaly detection. In Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, Vouliagmeni, Greece, 20–22 October 2008; pp. 151–156. [Google Scholar]
- Bhalodiya, S.; Vaghela, K. Enhanced detection and recovery from flooding attack in MANETs using AODV routing protocol. Int. J. Comput. Appl. 2015, 125, 10–15. [Google Scholar] [CrossRef]
- Singh, N.; Ghrera, S.P.; Chaudhuri, P. Denial of service attack: Analysis of network traffic anomaly using queuing theory. J. Comput. Sci. Eng. 2010, 1, 48–51. [Google Scholar]
- Little, J.D.C.; Graves, S.C. Little’s law. In Building Intuition; Chhajed, D., Lowe, T.J., Eds.; Springer: New York, NY, USA, 2008; pp. 81–100. [Google Scholar]
- Syed, N.F.; Baig, Z.; Ibrahim, A.; Valli, C. Denial of service attack detection through machine learning for the IoT. J. Inf. Telecommun. 2020, 4, 482–503. [Google Scholar] [CrossRef]
- Ramanauskaitė, S.; Čenys, A.; Goranin, N.; Janulevicius, J. Modelling of two-tier DDoS by combining different type of DDoS models. In Proceedings of the IEEE Open Conference of Electrical, Electronic and Information Sciences, Vilnius, Lithuania, 27 April 2017; pp. 1–4. [Google Scholar]
- Rastogi, S.; Zaheer, H. Comparative analysis of queuing mechanisms: Droptail, RED and NLRED. Soc. Netw. Anal. Min. 2016, 6, 70. [Google Scholar] [CrossRef]
- Serrano, J.B.; Wang, S.; Chavez, K.M.G.; Hourani, A.; Sithamparanathan, K. A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. Eng. Sci. Technol. Int. J. 2022, 31, 101065. [Google Scholar]
- Hao, S.; Song, H.; Jiang, W.; Dai, Y. A queue model to detect DDos attacks. In Proceedings of the IEEE International Symposium on Collaborative Technologies and Systems, Saint Louis, MO, USA, 15–20 May 2005; pp. 106–112. [Google Scholar]
- Khan, S.; Traore, I. Queue-based analysis of DoS attacks. In Proceedings of the 6th Annual IEEE SMC Information Assurance Workshop, West Point, NY, USA, 15–17 June 2005; pp. 266–273. [Google Scholar]
- Jeong, S.; Kim, H.; Kim, S. An effective DDoS attack detection and packet-filtering scheme. IEICE Trans. Commun. 2006, 89, 2033–2042. [Google Scholar] [CrossRef]
- Lin, H.Y.; Chiang, T.C. Intrusion detection mechanisms based on queuing theory in remote distribution sensor networks. Adv. Mater. Res. 2010, 121, 58–63. [Google Scholar] [CrossRef]
- Hussain, S.M.; Beigh, G.R. Impact of DDoS attack (UDP Flooding) on queuing models. In Proceedings of the 4th IEEE International Conference on Computer and Communication Technology, Tiruchengode, India, 4–6 July 2013; pp. 210–216. [Google Scholar]
- Wei, W.; Song, H.; Wang, H.; Fan, X. Research and simulation of queue management algorithms in ad hoc networks under DDoS attack. IEEE Access 2017, 5, 27810–27817. [Google Scholar] [CrossRef]
- Feinstein, L.; Schnackenberg, D.; Balupari, R.; Kindred, D. Statistical approaches to DDoS attack detection and response. In Proceedings of the DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 22–24 April 2003; pp. 303–314. [Google Scholar]
- Abouzakhar, N.; Bakar, A. A Chi-square testing-based intrusion detection model. In Proceedings of the 4th International Conference on Cybercrime Forensics Education & Training, Canterbury, UK, 2–3 September 2010. [Google Scholar]
- Leu, F.Y.; Lin, L.L. A DoS/DDoS attack detection system using chi-square statistic approach. J. Syst. Cybern. Inform. 2010, 8, 41–51. [Google Scholar]
- Ye, N.; Chen, Q. An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Qual. Reliab. Eng. Int. 2001, 17, 105–112. [Google Scholar] [CrossRef]
- Siris, V.A.; Papagalou, F. Application of anomaly detection algorithms for detecting SYN flooding attacks. Comput. Commun. 2006, 29, 1433–1442. [Google Scholar] [CrossRef] [Green Version]
- Machaka, P.; Bagula, A.; Nelwamondo, F. Using exponentially weighted moving average algorithm to defend against DDoS attacks. In Proceedings of the IEEE Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference, Stellenbosch, South Africa, 30 November–2 December 2016; pp. 1–6. [Google Scholar]
- Zhan, S.; Tang, D.; Man, J.; Dai, R.; Wang, X. Low-rate dos attacks detection based on MAF-ADM. Sensors 2020, 20, 189. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Shinde, P.; Guntupalli, S. Early DoS attack detection using smoothened time-series and wavelet analysis. In Proceedings of the IEEE the 3rd International Symposium on Information Assurance and Security, Manchester, UK, 29–31 August 2007; pp. 215–220. [Google Scholar]
- De Moura, A.S. Anomaly detection using Holt-Winters forecast model. In Proceedings of the IADIS International Conference WWW/Internet, Rio De Janeiro, Brazil, 5–8 November 2011; pp. 349–356. [Google Scholar]
- Zhang, G.; Jiang, S.; Wei, G.; Guan, Q. A prediction-based detection algorithm against distributed denial-of-service attacks. In Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, Leipzig, Germany, 21–24 June 2009; pp. 106–110. [Google Scholar]
- Yaacob, A.H.; Tan, I.K.T.; Chien, S.F.; Tan, H.K. ARIMA based network anomaly detection. In Proceedings of the IEEE 2nd International Conference on Communication Software and Networks, Singapore, 26–28 February 2010; pp. 205–209. [Google Scholar]
- Nezhad, S.M.T.; Nazari, M.; Gharavol, E.A. A novel DoS and DDoS attacks detection algorithm using ARIMA time series model and chaotic system in computer networks. IEEE Commun. Lett. 2016, 20, 700–703. [Google Scholar] [CrossRef]
- Barbhuiya, S.; Kilpatrick, P.S.; Nikolopoulos, D. Linear regression-based DDoS attack detection. In Proceedings of the 13th International Conference on Machine Learning and Computing, Shenzhen, China, 26 February–1 March 2021; pp. 568–574. [Google Scholar]
- Fachkha, C.; Bou-Harb, E.; Debbabi, M. Towards a forecasting model for distributed denial of service activities. In Proceedings of the IEEE 12th International Symposium on Network Computing and Applications, Cambridge, MA, USA, 22–24 August 2013; pp. 110–117. [Google Scholar]
- Khan, M.S.; Ferens, K.; Kinsner, W. A chaotic measure for cognitive machine classification of distributed denial of service attacks. In Proceedings of the IEEE 13th International Conference on Cognitive Informatics and Cognitive Computing, London, UK, 18–20 August 2014; pp. 100–108. [Google Scholar]
- Chen, C.L. A new detection method for distributed denial-of-service attack traffic based on statistical test. J. Univ. Comput. Sci. 2009, 15, 488–504. [Google Scholar]
- Machaka, P.; McDonald, A.; Nelwamondo, F.; Bagula, A. Using the cumulative sum algorithm against distributed denial of service attacks in internet of things. In Proceedings of the 4th EAI International Conference on Context-Aware Systems and Applications, Ho Chi Minh City, Vietnam, 26–27 November 2015; pp. 62–72. [Google Scholar]
- Zhang, T. Cumulative sum algorithm for detecting SYN flooding attacks. arXiv 2012, arXiv:1212.5129. [Google Scholar]
- Özcelik, I.; Brooks, R.R. Cusum-entropy: An efficient method for DDoS attack detection. In Proceedings of the 4th IEEE International Istanbul Smart Grid Congress and Fair, Istanbul, Turkey, 20–21 April 2016; pp. 1–5. [Google Scholar]
- Udhayan, J.; Hamsapriya, T. Statistical segregation method to minimize the false detections during DDoS attacks. Int. J. Netw. Secur. 2011, 13, 152–160. [Google Scholar]
- Tan, Z.; Jamdagni, A.; He, X.; Nanda, P.; Liu, R.P. A system for denial-of-service attack detection based on multivariate correlation analysis. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 447–456. [Google Scholar]
- Jin, S.; Yeung, D.S. A covariance analysis model for DDoS attack detection. In Proceedings of the IEEE International Conference on Communications, Paris, France, 20–24 June 2004; pp. 1882–1886. [Google Scholar]
- Fortunati, S.; Gini, F.; Greco, M.S.; Farina, A.; Graziano, A.; Giompapa, S. An improvement of the state-of-the-art covariance-based methods for statistical anomaly detection algorithms. Signal Image Video Process. 2016, 10, 687–694. [Google Scholar] [CrossRef]
- Peng, T.; Leckie, C.; Ramamohanarao, K. Detecting distributed denial of service attacks by sharing distributed beliefs. In Information Security and Privacy; Lecture Notes in Computer Science; Safavi-Naini, R., Seberry, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2003; Volume 2727. [Google Scholar]
- Hoque, H.; Bhattacharyya, D.K.; Kalita, J.K. FFSc: A novel measure for low-rate and high-rate DDoS attack detection using multivariate data analysis. Secur. Commun. Netw. 2016, 9, 2032–2041. [Google Scholar] [CrossRef] [Green Version]
- Grimit, E.P.; Gneiting, T.; Berrocal, V.J.; Johnson, N.A. The continuous ranked probability score for circular variables and its application to mesoscale forecast ensemble verification. Q. J. R. Meteorol. Soc. A J. Atmos. Sci. Appl. Meteorol. Phys. Oceanogr. 2006, 132, 2925–2942. [Google Scholar]
- Bouyeddou, B.; Kadri, B.; Harrou, F.; Sun, Y. DDOS-attacks detection using an efficient measurement-based statistical mechanism. Eng. Sci. Technol. Int. J. 2020, 23, 870–878. [Google Scholar] [CrossRef]
- Harrou, F.; Sun, Y.; Madakyaru, M.; Bouyedou, B. An improved multivariate chart using partial least squares with continuous ranked probability score. IEEE Sens. J. 2018, 18, 6715–6726. [Google Scholar] [CrossRef] [Green Version]
- Sharma, D.K.; Dhankhar, T.; Agrawal, G.; Singh, S.K.; Gupta, D.; Nebhen, J.; Razzak, I. Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks. Ad Hoc Netw. 2021, 121, 102603. [Google Scholar] [CrossRef]
- Wolf, A.; Swift, J.B.; Swinney, H.L.; Vastano, J.A. Determining lyapunov exponents from a time series. Phys. D Nonlinear Phenom. 1992, 16, 285–317. [Google Scholar] [CrossRef] [Green Version]
- Chonka, A.; Singh, J.; Zhou, W. Chaos theory-based detection against network mimicking DDoS attacks. IEEE Commun. Lett. 2009, 13, 717–719. [Google Scholar] [CrossRef] [Green Version]
- Iyengar, N.C.S.N.; Ganapathy, G. Chaotic theory based defensive mechanism against distributed denial of service attack in cloud computing environment. Int. J. Secur. Its Appl. 2015, 9, 197–212. [Google Scholar] [CrossRef]
- Chen, Y.; Ma, X.; Wu, X. DDoS detection algorithm based on preprocessing network traffic predicted method and chaos theory. IEEE Commun. Lett. 2013, 17, 1052–1054. [Google Scholar] [CrossRef]
- Ma, X.; Chen, Y. DDoS detection method based on chaos analysis of network traffic entropy. IEEE Commun. Lett. 2013, 18, 114–117. [Google Scholar] [CrossRef]
- Wu, X.; Chen, Y. Validation of chaos hypothesis in NADA and improved DDoS detection algorithm. IEEE Commun. Lett. 2013, 17, 2396–2399. [Google Scholar] [CrossRef]
- Procopiou, A.; Komninos, N.; Douligeris, C. ForChaos: Real time application DDoS detection using forecasting and chaos theory in smart home IoT network. Wirel. Commun. Mob. Comput. 2019, 2019, 8469410. [Google Scholar] [CrossRef]
- Kumar, P.A.R.; Selvakumar, S. Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems. Comput. Commun. 2013, 36, 303–319. [Google Scholar] [CrossRef]
- Roopak, M.; Tian, G.Y.; Chambers, J. An intrusion detection system against DDoS attacks in IoT networks. In Proceedings of the 10th IEEE Annual Computing and Communication Workshop and Conference, Las Vegas, NV, USA, 6–8 January 2020; pp. 0562–0567. [Google Scholar]
- Roopak, M.; Tian, G.Y.; Chambers, J. Multi-objective-based feature selection for DDoS attack detection in IoT networks. IET Netw. 2020, 9, 120–127. [Google Scholar] [CrossRef]
- Yin, J.; Tao, T.; Xu, J. A multi-label feature selection algorithm based on multi-objective optimization. In Proceedings of the IEEE International Joint Conference on Neural Networks, Killarney, Ireland, 12–17 July 2015; pp. 1–7. [Google Scholar]
- Saeed, A.A.; Jameel, N.G.M. Intelligent feature selection using particle swarm optimization algorithm with a decision tree for DDoS attack detection. Int. J. Adv. Intell. Inform. 2021, 7, 37–48. [Google Scholar] [CrossRef]
- Velliangiri, S.; Karthikeyan, P.; Vinoth Kumar, V. Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks. J. Exp. Theor. Artif. Intell. 2021, 33, 405–424. [Google Scholar] [CrossRef]
- Varghese, M.; Victor Jose, M. An optimized radial bias function neural network for intrusion detection of distributed denial of service attack in the cloud. Concurr. Comput. Pract. Exp. 2022, 34, e7321. [Google Scholar] [CrossRef]
- Sokkalingam, S.; Ramakrishnan, R. An intelligent intrusion detection system for distributed denial of service attacks: A support vector machine with hybrid optimization algorithm-based approach. Concurr. Comput. Pract. Exp. 2022, 34, e7334. [Google Scholar] [CrossRef]
- Amma, N.G.; Selvakumar, S. Optimization of vector convolutional deep neural network using binary real cumulative incarnation for detection of distributed denial of service attacks. Neural Comput. Appl. 2022, 34, 2869–2882. [Google Scholar] [CrossRef]
- Alshamrani, A.; Chowdhary, A.; Pisharody, S.; Lu, D.; Huang, D. A defense system for defeating DDoS attacks in SDN based networks. In Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, Miami, FL, USA, 21–25 November 2017; pp. 83–92. [Google Scholar]
- Ye, J.; Cheng, X.; Zhu, J.; Feng, L.; Song, L. A DDoS attack detection method based on SVM in software defined network. Secur. Commun. Netw. 2018, 2018, 9804061. [Google Scholar] [CrossRef]
- Khuphiran, P.; Leelaprute, P.; Uthayopas, P.; Ichikawa, K.; Watanakeesuntorn, W. Performance comparison of machine learning models for DDoS attacks detection. In Proceedings of the 22nd IEEE International Computer Science and Engineering Conference, Chiang Mai, Thailand, 21–24 November 2018; pp. 1–4. [Google Scholar]
- Rahman, O.; Quraishi, M.A.G.; Lung, C.H. DDoS attacks detection and mitigation in SDN using machine learning. In Proceedings of the IEEE World Congress on Services, Milan, Italy, 8–13 July 2019; pp. 184–189. [Google Scholar]
- Khashab, F.; Moubarak, J.; Feghali, A.; Bassil, C. DDoS attack detection and mitigation in SDN using machine learning. In Proceedings of the IEEE 7th International Conference on Network Softwarization, Tokyo, Japan, 28 June–2 July 2021; pp. 395–401. [Google Scholar]
- Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef] [Green Version]
- Gopalan, S.S. Towards Effective Detection of Botnet Attacks Using BoT-IoT Dataset. Master’s Thesis, Department of Computer Science, Rochester Institute of Technology, Rochester, NY, USA, 2021. [Google Scholar]
- Almaraz-Rivera, J.G.; Perez-Diaz, J.A.; Cantoral-Ceballos, J.A. Transport and application layer DDos attacks detection to IoT devices by using machine learning and deep learning model. Sensors 2022, 22, 3367. [Google Scholar] [CrossRef] [PubMed]
- Chen, Y.W.; Sheu, J.P.; Kuo, Y.C.; Van Cuong, V. Design and implementation of IoT DDoS attacks detection system based on machine learning. In Proceedings of the IEEE European Conference on Networks and Communications, Dubrovnik, Croatia, 15–18 June 2020; pp. 122–127. [Google Scholar]
- Mihoub, A.; Fredj, O.B.; Cheikhrouhou, O.; Derhab, A.; Krichen, M. Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Comput. Electr. Eng. 2022, 98, 107716. [Google Scholar] [CrossRef]
- Alzahrani, R.J.; Alzahrani, A. Security analysis of DDoS attacks using machine learning algorithms in networks traffic. Electronics 2021, 10, 2919. [Google Scholar] [CrossRef]
- Santos, R.; Souza, D.; Santo, W.; Ribeiro, A.; Moreno, E. Machine learning algorithms to detect DDoS attacks in SDN. Concurr. Comput. Pract. Exp. 2020, 32, e5402. [Google Scholar] [CrossRef]
- Aslam, M.; Ye, D.; Tariq, A.; Asad, M.; Hanif, M.; Ndzi, D.; Chelloug, S.A.; Elaziz, M.A.; Al-Qaness, M.A.; Jilani, S.F. Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT. Sensors 2022, 22, 2697. [Google Scholar] [CrossRef] [PubMed]
- Gaur, V.; Kumar, R. Analysis of machine learning classifiers for early detection of DDoS attacks on IoT devices. Arab. J. Sci. Eng. 2022, 47, 1353–1374. [Google Scholar] [CrossRef]
- Aldaej, A.; Ahanger, T.A.; Atiquzzaman, M.; Ullah, I.; Yousufudin, M. Smart cybersecurity framework for IoT-empowered drones: Machine learning perspective. Sensors 2022, 22, 2630. [Google Scholar] [CrossRef]
- Nishanth, N.; Mujeeb, A. Modelling and detection of flooding-based denial-of-service attack in wireless ad hoc network using Bayesian inference. IEEE Syst. J. 2021, 15, 17–26. [Google Scholar] [CrossRef]
- Ouiazzane, S.; Addou, M.; Barramou, F. A multiagent and machine learning based denial of service intrusion detection system for drone networks. In Geospatial Intelligence. Advances in Science, Technology & Innovation; Barramou, F., El Briichi, E.H., Mansouri, K., Dehbi, Y., Eds.; Springer: Cham, Switzerland, 2022; pp. 51–65. [Google Scholar]
- Musaddiq, A.; Zikria, Y.B.; Kim, S.W. Routing protocol for low-power and lossy networks for heterogeneous traffic network. EURASIP J. Wirel. Commun. Netw. 2020, 2020, 21. [Google Scholar] [CrossRef] [Green Version]
- Airehrour, D.; Gutierrez, J.; Ray, S.K. Secure routing for internet of things: A survey. J. Netw. Comput. Appl. 2016, 66, 198–213. [Google Scholar] [CrossRef]
- Mayzaud, A.; Badonnel, R.; Chrisment, I. A taxonomy of attacks in RPL-based internet of things. Int. J. Netw. Secur. 2016, 18, 459–473. [Google Scholar]
- Sharma, G.; Grover, J.; Verma, A. Performance evaluation of mobile RPL-based IoT networks under version number attack. Comput. Commun. 2023, 197, 12–22. [Google Scholar] [CrossRef]
- Al-Amiedy, T.A.; Anbar, M.; Belaton, B.; Kabla, A.H.H.; Hasbullah, I.H.; Alashhab, Z.R. A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things. Sensors 2022, 22, 3400. [Google Scholar] [CrossRef]
- Mehbodniya, A.; Webber, J.L.; Shabaz, M.; Mohafez, H.; Yadav, K. Machine learning technique to detect sybil attack on IoT based sensor network. IETE J. Res. 2021, 2021, 1–9. [Google Scholar] [CrossRef]
- Osman, M.; He, J.; Mokbal, F.M.M.; Zhu, N.; Qureshi, S. ML-LGBM: A machine learning model based on light gradient boosting machine for the detection of version number attacks in RPL-based networks. IEEE Access 2021, 9, 83654–83665. [Google Scholar] [CrossRef]
- Sharma, S.; Verma, V.K. AIEMLA: Artificial intelligence enabled machine learning approach for routing attacks on internet of things. J. Supercomput. 2021, 77, 13757–13787. [Google Scholar] [CrossRef]
- Verma, A.; Ranga, V. ELNIDS: Ensemble learning based network intrusion detection system for RPL based internet of things. In Proceedings of the 4th IEEE International Conference on Internet of Things: Smart Innovation and Usages, Ghaziabad, India, 18–19 April 2019; pp. 1–6. [Google Scholar]
- Sharma, M.; Elmiligi, H.; Gebali, F.; Verma, A. Simulating attacks for RPL and generating multi-class dataset for supervised machine learning. In Proceedings of the IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference, Vancouver, BC, Canada, 17–19 October 2019; pp. 20–26. [Google Scholar]
- Karami, A.; Guerrero-Zapata, M. A hybrid multi-objective RBF-PSO method for mitigating dos attacks in named data networking. Neurocomputing 2015, 151, 1262–1282. [Google Scholar] [CrossRef] [Green Version]
- Lee, R.; Leau, Y.; Park, Y.J.; Anbar, M. A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges. IETE Tech. Rev. 2022, 39, 1027–1045. [Google Scholar] [CrossRef]
- Kumar, N.; Singh, A.K.; Srivastava, S. Feature selection for interest flooding attack in named data networking. Int. J. Comput. Appl. 2021, 43, 537–546. [Google Scholar] [CrossRef]
- Zhi, T.; Liu, Y.; Wang, J.; Zhang, H. Resist interest flooding attacks via entropy–SVM and Jensen–Shannon divergence in information-centric networking. IEEE Syst. J. 2019, 14, 1776–1787. [Google Scholar] [CrossRef]
- Yue, M.; Zheng, H.; Feng, W.; Wu, Z. A detection method for I-CIFA attack in NDN network. In Proceedings of the 6th International Conference on Smart Computing and Communication, New York, NY, USA, 29–31 December 2021; pp. 364–373. [Google Scholar]
- Doriguzzi-Corin, R.; Millar, S.; Scott-Hayward, S.; Martinez-del-Rincon, J.; Siracusa, D. LUCID: A practical, lightweight deep learning solution for DDoS attack detection. IEEE Trans. Netw. Serv. Manag. 2020, 17, 876–889. [Google Scholar] [CrossRef] [Green Version]
- Liu, H.; Lang, B. Machine learning and deep learning methods for intrusion detection system: A survey. Appl. Sci. 2019, 9, 4396. [Google Scholar] [CrossRef] [Green Version]
- Hasan, M.Z.; Hasan, K.Z.; Sattar, A. Burst header packet flood detection in optical burst switching network using deep learning model. Procedia Comput. Sci. 2018, 143, 970–977. [Google Scholar] [CrossRef]
- Alzahrani, S.; Hong, L. Detection of distributed denial of service (DDoS) attacks using artificial intelligence on cloud. In Proceedings of the IEEE World Congress on Services, San Francisco, CA, USA, 2–7 July 2018; pp. 35–36. [Google Scholar]
- Zhu, M.; Ye, K.; Xu, C.Z. Network anomaly detection and identification based on deep learning methods. In Cloud Computing—CLOUD 2018; Lecture Notes in Computer Science; Luo, M., Zhang, L.J., Eds.; Springer: Cham, Switzerland, 2018. [Google Scholar]
- Priyadarshini, R.; Barik, R.K. A deep learning based intelligent framework to mitigate DDoS attack in fog environment. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 825–831. [Google Scholar] [CrossRef]
- Yuan, X.; Li, C.; Li, X. DeepDefense: Identifying DDoS attack via deep learning. In Proceedings of the IEEE International Conference on Smart Computing, Hong Kong, China, 29–31 May 2017; pp. 1–8. [Google Scholar]
- Shurman, M.M.; Khrais, R.M.; Yateem, A.A. DoS and DDoS attack detection using deep learning and IDS. Int. Arab J. Inf. Technol. 2020, 17, 655–661. [Google Scholar] [CrossRef] [PubMed]
- Ge, M.; Syed, N.F.; Fu, X.; Baig, Z.; Robles-Kelly, A. Towards a deep learning-driven intrusion detection approach for Internet of things. Comput. Netw. 2021, 186, 107784. [Google Scholar] [CrossRef]
- Elsayed, M.S.; Le-Khac, N.A.; Dev, S.; Jurcut, A.D. Ddosnet: A deep-learning model for detecting network attacks. In Proceedings of the IEEE 21st International Symposium on A World of Wireless, Mobile and Multimedia Networks, Cork, Ireland, 31 August–3 September 2020; pp. 391–396. [Google Scholar]
- Roopak, M.; Tian, G.Y.; Chambers, J. Deep learning models for cyber security in IoT networks. In Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, Las Vegas, NV, USA, 7–9 January 2019; pp. 0452–0457. [Google Scholar]
- Abeshu, A.; Chilamkurti, N. Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE Commun. Mag. 2018, 56, 169–175. [Google Scholar] [CrossRef]
- McDermott, C.D.; Majdani, F.; Petrovski, A.V. Botnet detection in the internet of things using deep learning approaches. In Proceedings of the IEEE International Joint Conference on Neural Networks, Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–8. [Google Scholar]
- Ramadan, R.A.; Emara, A.H.; Al-Sarem, M.; Elhamahmy, M. Internet of drones intrusion detection using deep learning. Electronics 2021, 10, 2633. [Google Scholar] [CrossRef]
- Abu Al-Haija, Q.; Al Badawi, A. High-performance intrusion detection system for networked UAVs via deep learning. Neural Comput. Appl. 2022, 34, 10885–10900. [Google Scholar] [CrossRef]
- Alissa, K.A.; Alotaibi, S.S.; Alrayes, F.S.; Aljebreen, M.; Alazwari, S.; Alshahrani, H.; Ahmed Elfaki, M.; Othman, M.; Motwakel, A. Crystal structure optimization with deep-autoencoder-based intrusion detection for secure internet of drones environment. Drones 2022, 6, 297. [Google Scholar] [CrossRef]
- Zhang, Z.; Zhang, Y.; Niu, J.; Guo, D. Unknown network attack detection based on open-set recognition and active learning in drone network. Trans. Emerg. Telecommun. Technol. 2022, 33, e4212. [Google Scholar] [CrossRef]
- Morales-Molina, C.D.; Hernandez-Suarez, A.; Sanchez-Perez, G.; Toscano-Medina, L.K.; Perez-Meana, H.; Olivares-Mercado, J.; Portillo-Portillo, J.; Sanchez, V.; Garcia-Villalba, L.J. A dense neural network approach for detecting clone ID attacks on the RPL protocol of the IoT. Sensors 2021, 21, 3173. [Google Scholar] [CrossRef] [PubMed]
- Anitha, A.A.; Arockiam, L. ANNIDS: Artificial neural network-based intrusion detection system for internet of things. Int. J. Innov. Technol. Explor. Eng. 2019, 8, 2583–2588. [Google Scholar] [CrossRef]
- Cakir, S.; Toklu, S.; Yalcin, N. RPL attack detection and prevention in the internet of things networks using a GRU based deep learning. IEEE Access 2020, 8, 183678–183689. [Google Scholar] [CrossRef]
- Yavuz, F.Y.; Ünal, D.; Gül, E. Deep learning for detection of routing attacks in the internet of things. Int. J. Comput. Intell. Syst. 2018, 12, 39–58. [Google Scholar] [CrossRef] [Green Version]
- Zeng, Y.; Wu, G.; Wang, R.; Obaidat, M.S.; Hsiao, K.F. False-locality attack detection using CNN in named data networking. In Proceedings of the IEEE Global Communications Conference, Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Kumar, N.; Singh, A.K.; Srivastava, S. Evaluating machine learning algorithms for detection of interest flooding attack in named data networking. In Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, India, 13–15 October 2015; pp. 299–302. [Google Scholar]
- MIT Lincoln Laboratory. 1998 DARPA Intrusion Detection Evaluation Dataset. Available online: https://www.ll.mit.edu/r-d/datasets/1998-darpa-intrusion-detection-dataset (accessed on 12 November 2022).
- Lippmann, R.; Haines, J.W.; Fried, D.J.; Korba, J.; Das, K. The 1999 DARPA off-line intrusion detection evaluation. Comput. Netw. 2000, 34, 579–595. [Google Scholar] [CrossRef]
- KDD CUP. Information and Computer Science University of California, Irvine U.S. California. 1999. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 12 November 2022).
- Ring, M.; Wunderlich, S.; Scheuring, D.; Landes, D.; Hotho, A. A survey of network-based intrusion detection data sets. Comput. Secur. 2019, 86, 147–167. [Google Scholar] [CrossRef] [Green Version]
- Sahingoz, O.K. A clustering approach for intrusion detection with big data processing on parallel computing platform. Balk. J. Electr. Comput. Eng. 2019, 7, 286–293. [Google Scholar] [CrossRef] [Green Version]
- UNB. NSL-KDD Dataset. Available online: https://www.unb.ca/cic/datasets/nsl.html (accessed on 12 November 2022).
- Vasudevan, A.; Harshini, E.; Selvakumar, S. SSENet-2011: A network intrusion detection system dataset and its comparison with KDD CUP 99 dataset. In Proceedings of the IEEE 2nd Asian Himalayas International Conference on Internet, Kathmundu, Nepal, 4–6 November 2011; pp. 1–5. [Google Scholar]
- Bhattacharya, S.; Selvakumar, S. Ssenet-2014 dataset: A dataset for detection of multiconnection attacks. In Proceedings of the IEEE 3rd International Conference on Eco-friendly Computing and Communication Systems, Mangalore, India, 18–21 December 2014; pp. 121–126. [Google Scholar]
- Kent, A.D. Comprehensive, Multi-Source Cyber-Security Events Dataset; Los Alamos National Laboratory: Los Alamos, NM, USA, 2015. [CrossRef]
- Shiravi, A.; Shiravi, H.; Tavallaee, M.; Ghorbani, A.A. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Comput. Secur. 2012, 31, 357–374. [Google Scholar] [CrossRef]
- Canadian Institute for Cybersecurity. Datasets. Available online: http:www.unb.ca/cic/datasets/dos-dataset.html (accessed on 14 November 2022).
- Alkasassbeh, M.; Al-Naymat, G.; Hassanat, A.B.; Almseidin, M. Detecting distributed denial of service attacks using data mining techniques. Int. J. Adv. Comput. Sci. Appl. 2016, 7, 436–445. [Google Scholar] [CrossRef] [Green Version]
- Beer, F.; Hofer, T.; Karimi, D.; Bühler, U. A new attack composition for network security. In Proceedings of the 10th DFN-Forum Kommunikationstechnologien, Berlin, Germany, 30–31 May 2017; pp. 1–8. [Google Scholar]
- Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of the International Conference on Information Systems Security and Privacy, Funchal, Portugal, 22–24 January 2018; pp. 108–116. [Google Scholar]
- Canadian Institute for Cybersecurity. Intrusion Detection Evaluation Dataset (CIC-IDS2017). 2017. Available online: https://www.unb.ca/cic/datasets/ids-2017.html (accessed on 11 November 2022).
- A Realistic Cyber Defense Dataset (CSE-CIC-IDS2018). Available online: https://registry.opendata.aws/cse-cic-ids2018 (accessed on 23 November 2022).
- Sharafaldin, I.; Lashkari, A.H.; Hakak, S.; Ghorbani, A.A. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In Proceedings of the IEEE International Carnahan Conference on Security Technology, Chennai, India, 1–3 October 2019; pp. 1–8. [Google Scholar]
- Canadian Institute for Cybersecurity. DDoS Evaluation Dataset (CIC-DDoS2019). 2019. Available online: https://www.unb.ca/cic/datasets/ddos-2019.html (accessed on 11 November 2022).
- Ullah, I.; Mahmoud, Q.H. A technique for generating a botnet dataset for anomalous activity detection in IoT networks. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Toronto, ON, Canada, 11–14 October 2020; pp. 134–140. [Google Scholar]
- Mbona, I.; Eloff, A. Detecting zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access 2022, 10, 69822–69838. [Google Scholar] [CrossRef]
- Faloutsos, M.; Faloutsos, P.; Faloutsos, C. On power-law relationships of the internet topology. ACM SIGCOMM Comput. Commun. Rev. 1999, 29, 251–262. [Google Scholar] [CrossRef]
- Wang, S.; Chen, Y.; Tian, H. An intrusion detection algorithm based on chaos theory for selecting the detection window size. In Proceedings of the 8th IEEE International Conference on Communication Software and Networks, Beijing, China, 4–6 June 2016; pp. 556–560. [Google Scholar]
- Ding, H.; Chen, L.; Dong, L.; Fu, Z.; Cui, X. Imbalanced data classification A KNN and generative adversarial networks-based hybrid approach for intrusion detection. Future Gener. Comput. Syst. 2022, 131, 240–254. [Google Scholar] [CrossRef]
- Batchu, R.K.; Seetha, H. On improving the performance of DDoS attack detection system. Microprocess. Microsyst. 2022, 93, 104571. [Google Scholar] [CrossRef]
- Khanam, S.; Ahmedy, I.; Idris, M.Y.I.; Jaward, M.H. Towards an effective intrusion detection model using focal loss variational autoencoder for internet of things (IoT). Sensors 2022, 22, 5822. [Google Scholar] [CrossRef]
- Riddell, L.; Ahmed, M.; Haskell-Dowland, P. Establishment and mapping of heterogeneous anomalies in network intrusion datasets. Connect. Sci. 2022, 34, 2755–2783. [Google Scholar] [CrossRef]
Topics Covered | [23] | [24] | [25] | [26] | [27] | [28] | [29] | [30] | [31] | [32] | [33] | Our Work |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Security issues in IoT | ||||||||||||
Detailed taxonomy of DDoS attacks | ||||||||||||
Entropy-based detection | ||||||||||||
Chaos-based detection | ||||||||||||
Detection-based on Chi-square | ||||||||||||
Detection-based on queuing model | ||||||||||||
Statistical forecasts methods | ||||||||||||
Traffic pattern analysis | ||||||||||||
Correlation of IP address | ||||||||||||
Heuristic-based detection | ||||||||||||
Detection via machine learning | ||||||||||||
Detection via deep learning | ||||||||||||
Attack and detection studies in IoD, FANET, RPL-based IoT, and NDN | ||||||||||||
Comparison of the research studies under each detection methods | ||||||||||||
Benchmarked datasets | ||||||||||||
Evaluation metrics | ||||||||||||
Open challenges |
Architecture | Advantages | Limitations |
---|---|---|
Centralized architecture |
|
|
Decentralized architecture |
|
|
Attack Type | Features | Attack Magnitude | Effect on Target Server | Attack Complexity | Affected Layer | Frequency of Occurrence |
---|---|---|---|---|---|---|
Volumetric-based | The use of a huge amount of traffic to saturate the bandwidth of the target server | Bits per second (bps), Gbps, flood | Access to the target resources may be totally blocked by the attack’s sheer volume of traffic. | Easy to generate using simple amplification techniques | Network layer | Most common |
Protocol-based | It exploits the weakness in layers 3 and 4 of the protocol stack to make the target server not accessible. | Packets per second (pps) | It disrupts service by consuming all the target server’s processing power or resources, including the firewall. | Less complex | Network and transport | More common |
Application-based | It harnesses the flaws in layer 7 of the protocol stack to make the target server not accessible. | Requests per second (rps) | It creates a session with the target and then uses up its resources by completely dominating processes. | Complex and difficult to detect | Application | Less common |
Attack Type | Classification | Features | IP Spoofing | Attacked Layer | Effect |
---|---|---|---|---|---|
TCP–SYN flood | Protocol-based | Exploits TCP’s three-way handshaking. | Spoofed | Transport | Obsess the server’s resources |
HTTP flood | Application-based | Exploits HTTP GET and HTTP POST request. | Non-spoofed | Application | Consumes server’s entire resources |
Slowloris | Application-based | Maintains the HTTP sessions for the longest feasible time. | Non-spoofed | Application | Consumes all sockets |
HTTP fragmentation | Application-based | Splits an HTTP packet into smaller pieces and broadcast them at the slowest rates possible. | Non-spoofed | Application | Consumes all sockets |
IP packet option field/IP null | Protocol-based | Sets 1 to all quality-of-service bits. | Spoofed | Network layer | The victim’s processing capacity is overloaded |
Ping of death | Protocol-based | Forms a data packet that exceeds maximum packet size. | Spoofed | Network layer | Overloads the buffer and causes system crash |
UDP flood | Volumetric-based | Sends a significant volume of UDP packets to a target’s specified or random port. | Spoofed | Transport layer | Consumes network bandwidth |
ICMP flood | Volumetric-based | Utilizes the ECHO request packet of ICMP. | Spoofed | IP layer | Saturates victim’s network bandwidth |
Fraggle | Volumetric-based | Sends UDP_ECHO packets to the network amplifier. | Spoofed | IP layer | Saturates victim’s network bandwidth |
NTP amplification | Volumetric-based | Exploits NTP using MON_GETLIST command. | Spoofed | Application layer | Saturates victim’s network bandwidth |
DNS flooding | Application-based | Utilizes an amplified DNS response query. | Spoofed | Application layer | Saturates victim’s network bandwidth |
Methods | Features | Advantages | Limitations |
---|---|---|---|
Traditional methods | Measures the volume of traffic. |
|
|
Signature-based detection | Attacks are recognized using signatures of well-known attacks that have been stored in the database. |
|
|
Anomaly-based detection | Establishes a baseline profile for normal traffic behavioural pattern collected over a predetermined period. |
|
|
Methods | Features | Advantages | Limitations |
---|---|---|---|
Traffic pattern analysis [49,50,51,52,53,54] | Compares the traffic patterns of infected hosts to the benign hosts |
|
|
Correlation of IP address [53,54,55] | Correlates attacker’s spoofed IP to the host server’s IP. |
|
|
Study | Method Used | Description | Application Domain | Dataset | Results |
[11] | Entropy (UWPEE) |
| UAV network | Real |
|
[66] | Joint entropy metrics |
| IoT | DARPA’99 and CICDDoS2019 |
|
[74] | M/M/1 queue theory |
| IoT | Simulated |
|
[81] | M/M/1/K queue |
| SDN-fog computing | ISCX2012, and real data |
|
[87] | Chi-square |
| IoT | CAIDA |
|
[91] | EWMA |
| IoT | Traffic data from the MIT Lincoln Laboratory |
|
[100] | Chaos theory |
| – | DDoS amplification dataset |
|
[101] | Two-sample t-test |
| IoT | Simulated |
|
[103] | CUMSUM |
| IoT | DARPA’98/’99 |
|
[105] | SSM |
| IoT | CAIDA |
|
Study | Method Used | Description | Dataset | Application Domain | Remarks |
---|---|---|---|---|---|
[13] | RF, k-NN, MLP, LR, DT, SVM, NB |
| Synthesized | FANET |
|
[131] | SVM |
| NSL–KDD | IoT–SDN |
|
[139] | DT |
| Generated | Multi-layer IoT |
|
[144] | RF, DT, k-NN and XGBoost |
| CICDDoS2019 | IoT |
|
[145] | LR and RF |
| KDD drone data | IoD |
|
[146] | Bayesian inference |
| DARPA’99 | MANET, VANET, FANET |
|
[147] | Agent-base and DT |
| CICIDS2017 | IoD |
|
[153] | NB, RF, LR |
| Simulated | RPL-based IoT |
|
[154] | LGBM |
| Simulated | RPL-based IoT |
|
[155] | ANN |
| Simulated | RPL-based IoT |
|
[157] | RF, NB, J48 |
| Simulated | RPL-based IoT |
|
[160] | DT, J48, MLP + BP |
| Simulated | NDN |
|
[162] | RF |
| Simulated | NDN |
|
Study | Method Used | Description | Dataset | Application Domain | Results |
---|---|---|---|---|---|
[14] | DBN |
| TON_IoT and UNSW-NB15 | IoD network |
|
[158] | RBF with PSO |
| Simulated | NDN |
|
[170] | LSTM |
| CICDDoS2019 | IoT environment |
|
[171] | FNN |
| Generated | IoT |
|
[172] | RNN, AE |
| CICDDoS2019 | SDN |
|
[174] | AE |
| NSL-KDD | IoT |
|
[177] | DCNN |
| UAV-IDS-2020 dataset | UAV network |
|
[179] | CNN, CNN-LSTM |
| CICIDS2017 | IoD network |
|
[180] | SAE + DNN |
| Simulated | RPL-based IoT |
|
[181] | MLP |
| Simulated | RPL-based IoT |
|
[182] | GRU + RNN |
| Simulated | RPL-based IoT |
|
[183] | MLP |
| Simulated | RPL-based IoT |
|
[184] | CNN |
| Simulated | NDN |
|
Methods | Features | Advantages | Limitations |
---|---|---|---|
Entropy -based | Compares estimated entropy of traffic features against a pre-defined threshold. |
|
|
Chaos-based | Uses an estimate of Lyapunov exponent in network traffic orbit to determine attack. |
|
|
Queuing theory | Uses queue management algorithm. |
|
|
Statistical approach | Statistical tests are performed to verify if the observed pattern is different from the expected pattern based on historical data. |
|
|
Heuristic-based | Uses algorithmic logic to analyse statistical features of network traffic. |
|
|
Machine learning | Uses algorithms to identify malicious traffic from a pool of network traffics just by learning the characteristics of the network traffic. |
|
|
Deep learning | Utilizes the advantages of supervised and unsupervised learning with its feature extraction and classification module. |
|
|
Dataset | Year | Publicly Available? | Traffic Category | Format | Traffic Volume | Span | Traffic Present | Attack Type |
---|---|---|---|---|---|---|---|---|
DARPA’98/’99 | 1998/1999 | Yes | Simulated | .pcap, logs | n/a | 7.5 weeks | Normal and attack traffic | DoS, privilege escalation, probing |
KDD Cup’99 | 1999 | Yes | Simulated | - | 5 M points | - | Normal and attack traffic | TCP, DoS, privilege escalation, probing |
NSL–KDD | 1999 | Yes | Simulated | - | 150 k points | - | Normal and attack traffic | DoS, probing |
SSENet-11 | 2011 | No | Simulated | - | n/a | 4 h | Normal and attack traffic | DoS, port scan |
ISCX2012 | 2012 | Yes | Real | .pcap, .csv | 2 M flows | 7 days | Normal and attack traffic | Infiltration, DDoS, SSH brute force, HTTP DoS |
CIC DoS | 2012 | Yes | Simulated | .pcap | 4.6 GB packets | 24 h | Normal and attack traffic | Slowloris, slowbody, slowread, Hulk, app. layer DoS |
SSENet-14 | 2014 | No | Simulated | - | 200 K points | 4 h | Normal and attack traffic | Botnet, flooding, port scan |
NDSeC-1 | 2016 | No | Simulated | .pcap, logs | 3.5 M packets | - | Attack traffic only | Botnet, HTTP flood, SYN flood, UDP flood, SSL proxy, SQL injection, spoofing, exploits |
DDoS 2016 | 2016 | Yes | Synthetic | .pcap | 2.1 M packets | - | Normal and attack traffic | HTTP flood, Smurf ICMP flood, UDP flood |
CICIDS2017 | 2017 | Yes | Simulated | .pcap, .csv | 3.1 M flows | 5 days | Normal and attack traffic | Botnet, LOIC, SQL injection, slowloris, SSH brute force |
CICIDS2018 | 2018 | Yes | Simulated | .pcap, .csv | 6.89 GB packets | 10 days | Normal and attack traffic | Brute force, botnet, Heartbleed, DoS, DDoS, web attacks, infiltration |
CICDDoS2019 | 2019 | Yes | Simulated | .pcap, .csv | 13.01 GB packets | 2 days | Normal and attack traffic | PortMap, NetBIOS, MSSQL, UDP, UDP-Lag, SYN, NTP, DNS, SNMP, SSDP, TFTP, Web-DDoS |
IoTID20 | 2020 | No | Simulated | .csv | - | - | Normal and attack traffic | SYN, UDP, HTTP, ACK floods, Host brute force, port scan |
UAV-IDS-2020 | 2020 | Yes | Real | .csv | - | - | Normal and attack traffic | GPS spoofing, jamming, DoS |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Adedeji, K.B.; Abu-Mahfouz, A.M.; Kurien, A.M. DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges. J. Sens. Actuator Netw. 2023, 12, 51. https://doi.org/10.3390/jsan12040051
Adedeji KB, Abu-Mahfouz AM, Kurien AM. DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges. Journal of Sensor and Actuator Networks. 2023; 12(4):51. https://doi.org/10.3390/jsan12040051
Chicago/Turabian StyleAdedeji, Kazeem B., Adnan M. Abu-Mahfouz, and Anish M. Kurien. 2023. "DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges" Journal of Sensor and Actuator Networks 12, no. 4: 51. https://doi.org/10.3390/jsan12040051
APA StyleAdedeji, K. B., Abu-Mahfouz, A. M., & Kurien, A. M. (2023). DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges. Journal of Sensor and Actuator Networks, 12(4), 51. https://doi.org/10.3390/jsan12040051