Cargando…
An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment
Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10383483/ https://www.ncbi.nlm.nih.gov/pubmed/37514868 http://dx.doi.org/10.3390/s23146574 |
_version_ | 1785080921387433984 |
---|---|
author | Riskhan, Basheer Safuan, Halawati Abd Jalil Hussain, Khalid Elnour, Asma Abbas Hassan Abdelmaboud, Abdelzahir Khan, Fazlullah Kundi, Mahwish |
author_facet | Riskhan, Basheer Safuan, Halawati Abd Jalil Hussain, Khalid Elnour, Asma Abbas Hassan Abdelmaboud, Abdelzahir Khan, Fazlullah Kundi, Mahwish |
author_sort | Riskhan, Basheer |
collection | PubMed |
description | Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating such attacks. Syn Flood is the most common sort of DDoS assault, up from 76% to 81% in Q2, according to Kaspersky’s Q3 report. Direct and indirect approaches are also available for launching DDoS attacks. While in a DDoS attack, controlled traffic is transmitted indirectly through zombies to reflectors to compromise the target host, in a direct attack, controlled traffic is sent directly to zombies in order to assault the victim host. Reflectors are uncompromised systems that only send replies in response to a request. To mitigate such assaults, traffic shaping and pushback methods are utilised. The SYN Flood Attack Detection and Mitigation Technique (SFaDMT) is an adaptive heuristic-based method we employ to identify DDoS SYN flood assaults. This study suggested an effective strategy to identify and resist the SYN assault. A decision support mechanism served as the foundation for the suggested (SFaDMT) approach. The suggested model was simulated, analysed, and compared to the most recent method using the OMNET simulator. The outcome demonstrates how the suggested fix improved detection. |
format | Online Article Text |
id | pubmed-10383483 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-103834832023-07-30 An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment Riskhan, Basheer Safuan, Halawati Abd Jalil Hussain, Khalid Elnour, Asma Abbas Hassan Abdelmaboud, Abdelzahir Khan, Fazlullah Kundi, Mahwish Sensors (Basel) Article Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating such attacks. Syn Flood is the most common sort of DDoS assault, up from 76% to 81% in Q2, according to Kaspersky’s Q3 report. Direct and indirect approaches are also available for launching DDoS attacks. While in a DDoS attack, controlled traffic is transmitted indirectly through zombies to reflectors to compromise the target host, in a direct attack, controlled traffic is sent directly to zombies in order to assault the victim host. Reflectors are uncompromised systems that only send replies in response to a request. To mitigate such assaults, traffic shaping and pushback methods are utilised. The SYN Flood Attack Detection and Mitigation Technique (SFaDMT) is an adaptive heuristic-based method we employ to identify DDoS SYN flood assaults. This study suggested an effective strategy to identify and resist the SYN assault. A decision support mechanism served as the foundation for the suggested (SFaDMT) approach. The suggested model was simulated, analysed, and compared to the most recent method using the OMNET simulator. The outcome demonstrates how the suggested fix improved detection. MDPI 2023-07-21 /pmc/articles/PMC10383483/ /pubmed/37514868 http://dx.doi.org/10.3390/s23146574 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Riskhan, Basheer Safuan, Halawati Abd Jalil Hussain, Khalid Elnour, Asma Abbas Hassan Abdelmaboud, Abdelzahir Khan, Fazlullah Kundi, Mahwish An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment |
title | An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment |
title_full | An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment |
title_fullStr | An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment |
title_full_unstemmed | An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment |
title_short | An Adaptive Distributed Denial of Service Attack Prevention Technique in a Distributed Environment |
title_sort | adaptive distributed denial of service attack prevention technique in a distributed environment |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10383483/ https://www.ncbi.nlm.nih.gov/pubmed/37514868 http://dx.doi.org/10.3390/s23146574 |
work_keys_str_mv | AT riskhanbasheer anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT safuanhalawatiabdjalil anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT hussainkhalid anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT elnourasmaabbashassan anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT abdelmaboudabdelzahir anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT khanfazlullah anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT kundimahwish anadaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT riskhanbasheer adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT safuanhalawatiabdjalil adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT hussainkhalid adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT elnourasmaabbashassan adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT abdelmaboudabdelzahir adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT khanfazlullah adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment AT kundimahwish adaptivedistributeddenialofserviceattackpreventiontechniqueinadistributedenvironment |