Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods

被引:73
|
作者
Khalaf, Bashar Ahmed [1 ]
Mostafa, Salama A. [1 ]
Mustapha, Aida [1 ]
Mohammed, Mazin Abed [2 ]
Abduallah, Wafaa Mustafa [3 ]
机构
[1] Univ Tun Hussein Onn Malaysia, Fac Comp Sci & Informat Technol, Batu Pahat 86400, Malaysia
[2] Univ Anbar, Planning & Follow Up Dept, Anbar 31001, Iraq
[3] Nawroz Univ, Fac Comp Sci & Informat Technol, Duhok 44001, Iraq
来源
IEEE ACCESS | 2019年 / 7卷
关键词
DDoS attack; DDoS defense; artificial intelligence technique; statistical technique; NETWORK INTRUSION DETECTION; DDOS ATTACKS; ANOMALY DETECTION; DOS ATTACKS; SYSTEM; MECHANISMS; INTERNET; TRENDS; SCHEME;
D O I
10.1109/ACCESS.2019.2908998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks have been increasing, thereby leading to an urgent need for new attack identification, mitigation, and prevention mechanisms. To prevent DDoS attacks, the basic features of the attacks need to be dynamically analyzed because their patterns, ports, and protocols or operation mechanisms are rapidly changed and manipulated. Most of the proposed DDoS defense methods have different types of drawbacks and limitations. Some of these methods have signature-based defense mechanisms that fail to identify new attacks and others have anomaly-based defense mechanisms that are limited to specific types of DDoS attacks and yet to be applied in open environments. Subsequently, extensive research on applying artificial intelligence and statistical techniques in the defense methods has been conducted in order to identify, mitigate, and prevent these attacks. However, the most appropriate and effective defense features, mechanisms, techniques, and methods for handling such attacks remain to be an open question. This review paper focuses on the most common defense methods against DDoS attacks that adopt artificial intelligence and statistical approaches. Additionally, the review classifies and illustrates the attack types, the testing properties, the evaluation methods and the testing datasets that are utilized in the methodology of the proposed defense methods. Finally, this review provides a guideline and possible points of encampments for developing improved solution models of defense methods against DDoS attacks.
引用
收藏
页码:51691 / 51713
页数:23
相关论文
共 50 条
  • [31] Detection of Distributed Denial of Service Attacks in Large-Scale Networks Based on Methods of Mathematical Statistics and Artificial Intelligence
    Alekseev, I., V
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 952 - 957
  • [32] Honeypot Scheme for Distributed Denial-of-Service Attack
    Das, Vinu V.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501
  • [33] Intrusion detection of distributed denial of service attack in cloud
    S. Velliangiri
    J. Premalatha
    Cluster Computing, 2019, 22 : 10615 - 10623
  • [34] Attack Detection of Distributed Denial of Service Based on Splunk
    Su, Te-Jen
    Wang, Shih-Ming
    Chen, Yi-Feng
    Liu, Chao-Liang
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, : 397 - 400
  • [35] Modeling and simulation for detecting a distributed denial of service attack
    Seo, HS
    Cho, HT
    AL 2002: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2002, 2557 : 179 - 190
  • [36] Intrusion detection of distributed denial of service attack in cloud
    Velliangiri, S.
    Premalatha, J.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 10615 - 10623
  • [37] Characterization and Comparison of Distributed Denial of Service Attack Tools
    Kaur, Harjeet
    Behal, Sunny
    Kumar, Krishan
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1139 - 1145
  • [38] Distributed Denial of Service attack on Cloud: Detection and Prevention
    Khadka, Bikram
    Withana, Chandana
    Alsadoon, Abeer
    Elchouemi, Amr
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [39] Distributed Denial of Service Attack Prevention at Source Machines
    Misono, Masanori
    Yoshida, Kaito
    Hwang, Juho
    Shinagawa, Takahiro
    2018 16TH IEEE INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP, 16TH IEEE INT CONF ON PERVAS INTELLIGENCE AND COMP, 4TH IEEE INT CONF ON BIG DATA INTELLIGENCE AND COMP, 3RD IEEE CYBER SCI AND TECHNOL CONGRESS (DASC/PICOM/DATACOM/CYBERSCITECH), 2018, : 488 - 495
  • [40] A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
    Chen, Chin-Ling
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (02) : 488 - 504