Cargando…

An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment

Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating...

Descripción completa

Detalles Bibliográficos
Autores principales: Riskhan, Basheer, Safuan, Halawati Abd Jalil, Hussain, Khalid, Elnour, Asma Abbas Hassan, Abdelmaboud, Abdelzahir, Khan, Fazlullah, Kundi, Mahwish
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10383483/
https://www.ncbi.nlm.nih.gov/pubmed/37514868
http://dx.doi.org/10.3390/s23146574
_version_ 1785080921387433984
author Riskhan, Basheer
Safuan, Halawati Abd Jalil
Hussain, Khalid
Elnour, Asma Abbas Hassan
Abdelmaboud, Abdelzahir
Khan, Fazlullah
Kundi, Mahwish
author_facet Riskhan, Basheer
Safuan, Halawati Abd Jalil
Hussain, Khalid
Elnour, Asma Abbas Hassan
Abdelmaboud, Abdelzahir
Khan, Fazlullah
Kundi, Mahwish
author_sort Riskhan, Basheer
collection PubMed
description Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating such attacks. Syn Flood is the most common sort of DDoS assault, up from 76% to 81% in Q2, according to Kaspersky’s Q3 report. Direct and indirect approaches are also available for launching DDoS attacks. While in a DDoS attack, controlled traffic is transmitted indirectly through zombies to reflectors to compromise the target host, in a direct attack, controlled traffic is sent directly to zombies in order to assault the victim host. Reflectors are uncompromised systems that only send replies in response to a request. To mitigate such assaults, traffic shaping and pushback methods are utilised. The SYN Flood Attack Detection and Mitigation Technique (SFaDMT) is an adaptive heuristic-based method we employ to identify DDoS SYN flood assaults. This study suggested an effective strategy to identify and resist the SYN assault. A decision support mechanism served as the foundation for the suggested (SFaDMT) approach. The suggested model was simulated, analysed, and compared to the most recent method using the OMNET simulator. The outcome demonstrates how the suggested fix improved detection.
format Online
Article
Text
id pubmed-10383483
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-103834832023-07-30 An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment Riskhan, Basheer Safuan, Halawati Abd Jalil Hussain, Khalid Elnour, Asma Abbas Hassan Abdelmaboud, Abdelzahir Khan, Fazlullah Kundi, Mahwish Sensors (Basel) Article Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating such attacks. Syn Flood is the most common sort of DDoS assault, up from 76% to 81% in Q2, according to Kaspersky’s Q3 report. Direct and indirect approaches are also available for launching DDoS attacks. While in a DDoS attack, controlled traffic is transmitted indirectly through zombies to reflectors to compromise the target host, in a direct attack, controlled traffic is sent directly to zombies in order to assault the victim host. Reflectors are uncompromised systems that only send replies in response to a request. To mitigate such assaults, traffic shaping and pushback methods are utilised. The SYN Flood Attack Detection and Mitigation Technique (SFaDMT) is an adaptive heuristic-based method we employ to identify DDoS SYN flood assaults. This study suggested an effective strategy to identify and resist the SYN assault. A decision support mechanism served as the foundation for the suggested (SFaDMT) approach. The suggested model was simulated, analysed, and compared to the most recent method using the OMNET simulator. The outcome demonstrates how the suggested fix improved detection. MDPI 2023-07-21 /pmc/articles/PMC10383483/ /pubmed/37514868 http://dx.doi.org/10.3390/s23146574 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Riskhan, Basheer
Safuan, Halawati Abd Jalil
Hussain, Khalid
Elnour, Asma Abbas Hassan
Abdelmaboud, Abdelzahir
Khan, Fazlullah
Kundi, Mahwish
An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
title An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
title_full An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
title_fullStr An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
title_full_unstemmed An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
title_short An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
title_sort adaptive distributed denial of service attack prevention technique in a distributed environment
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10383483/
https://www.ncbi.nlm.nih.gov/pubmed/37514868
http://dx.doi.org/10.3390/s23146574
work_keys_str_mv AT riskhanbasheer anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT safuanhalawatiabdjalil anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT hussainkhalid anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT elnourasmaabbashassan anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT abdelmaboudabdelzahir anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT khanfazlullah anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT kundimahwish anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT riskhanbasheer adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT safuanhalawatiabdjalil adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT hussainkhalid adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT elnourasmaabbashassan adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT abdelmaboudabdelzahir adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT khanfazlullah adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment
AT kundimahwish adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment