Cargando…

High-Speed Network DDoS Attack Detection: A Survey

Having a large number of device connections provides attackers with multiple ways to attack a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can cause fiscal harm and corrupt data. Thus, irregularity detection in traffic data is crucial in detecting malicious...

Descripción completa

Detalles Bibliográficos
Autores principales: Haseeb-ur-rehman, Rana M. Abdul, Aman, Azana Hafizah Mohd, Hasan, Mohammad Kamrul, Ariffin, Khairul Akram Zainol, Namoun, Abdallah, Tufail, Ali, Kim, Ki-Hyung
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10422513/
https://www.ncbi.nlm.nih.gov/pubmed/37571632
http://dx.doi.org/10.3390/s23156850
_version_ 1785089229011812352
author Haseeb-ur-rehman, Rana M. Abdul
Aman, Azana Hafizah Mohd
Hasan, Mohammad Kamrul
Ariffin, Khairul Akram Zainol
Namoun, Abdallah
Tufail, Ali
Kim, Ki-Hyung
author_facet Haseeb-ur-rehman, Rana M. Abdul
Aman, Azana Hafizah Mohd
Hasan, Mohammad Kamrul
Ariffin, Khairul Akram Zainol
Namoun, Abdallah
Tufail, Ali
Kim, Ki-Hyung
author_sort Haseeb-ur-rehman, Rana M. Abdul
collection PubMed
description Having a large number of device connections provides attackers with multiple ways to attack a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can cause fiscal harm and corrupt data. Thus, irregularity detection in traffic data is crucial in detecting malicious behavior in a network, which is essential for network security and the integrity of modern Cyber–Physical Systems (CPS). Nevertheless, studies have shown that current techniques are ineffective at detecting DDoS attacks on networks, especially in the case of high-speed networks (HSN), as detecting attacks on the latter is very complex due to their fast packet processing. This review aims to study and compare different approaches to detecting DDoS attacks, using machine learning (ML) techniques such as k-means, K-Nearest Neighbors (KNN), and Naive Bayes (NB) used in intrusion detection systems (IDSs) and flow-based IDSs, and expresses data paths for packet filtering for HSN performance. This review highlights the high-speed network accuracy evaluation factors, provides a detailed DDoS attack taxonomy, and classifies detection techniques. Moreover, the existing literature is inspected through a qualitative analysis, with respect to the factors extracted from the presented taxonomy of irregular traffic pattern detection. Different research directions are suggested to support researchers in identifying and designing the optimal solution by highlighting the issues and challenges of DDoS attacks on high-speed networks.
format Online
Article
Text
id pubmed-10422513
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-104225132023-08-13 High-Speed Network DDoS Attack Detection: A Survey Haseeb-ur-rehman, Rana M. Abdul Aman, Azana Hafizah Mohd Hasan, Mohammad Kamrul Ariffin, Khairul Akram Zainol Namoun, Abdallah Tufail, Ali Kim, Ki-Hyung Sensors (Basel) Review Having a large number of device connections provides attackers with multiple ways to attack a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can cause fiscal harm and corrupt data. Thus, irregularity detection in traffic data is crucial in detecting malicious behavior in a network, which is essential for network security and the integrity of modern Cyber–Physical Systems (CPS). Nevertheless, studies have shown that current techniques are ineffective at detecting DDoS attacks on networks, especially in the case of high-speed networks (HSN), as detecting attacks on the latter is very complex due to their fast packet processing. This review aims to study and compare different approaches to detecting DDoS attacks, using machine learning (ML) techniques such as k-means, K-Nearest Neighbors (KNN), and Naive Bayes (NB) used in intrusion detection systems (IDSs) and flow-based IDSs, and expresses data paths for packet filtering for HSN performance. This review highlights the high-speed network accuracy evaluation factors, provides a detailed DDoS attack taxonomy, and classifies detection techniques. Moreover, the existing literature is inspected through a qualitative analysis, with respect to the factors extracted from the presented taxonomy of irregular traffic pattern detection. Different research directions are suggested to support researchers in identifying and designing the optimal solution by highlighting the issues and challenges of DDoS attacks on high-speed networks. MDPI 2023-08-01 /pmc/articles/PMC10422513/ /pubmed/37571632 http://dx.doi.org/10.3390/s23156850 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Haseeb-ur-rehman, Rana M. Abdul
Aman, Azana Hafizah Mohd
Hasan, Mohammad Kamrul
Ariffin, Khairul Akram Zainol
Namoun, Abdallah
Tufail, Ali
Kim, Ki-Hyung
High-Speed Network DDoS Attack Detection: A Survey
title High-Speed Network DDoS Attack Detection: A Survey
title_full High-Speed Network DDoS Attack Detection: A Survey
title_fullStr High-Speed Network DDoS Attack Detection: A Survey
title_full_unstemmed High-Speed Network DDoS Attack Detection: A Survey
title_short High-Speed Network DDoS Attack Detection: A Survey
title_sort high-speed network ddos attack detection: a survey
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10422513/
https://www.ncbi.nlm.nih.gov/pubmed/37571632
http://dx.doi.org/10.3390/s23156850
work_keys_str_mv AT haseeburrehmanranamabdul highspeednetworkddosattackdetectionasurvey
AT amanazanahafizahmohd highspeednetworkddosattackdetectionasurvey
AT hasanmohammadkamrul highspeednetworkddosattackdetectionasurvey
AT ariffinkhairulakramzainol highspeednetworkddosattackdetectionasurvey
AT namounabdallah highspeednetworkddosattackdetectionasurvey
AT tufailali highspeednetworkddosattackdetectionasurvey
AT kimkihyung highspeednetworkddosattackdetectionasurvey