737 366
Review Article
Fusion: Practice and Applications
Volume 7 , Issue 1, PP: 08-14 , 2022 | Cite this article as | XML | Html |PDF

Title

A Review of the Common DDoS Attack: Types and Protection Approaches Based on Artificial Intelligence

Authors Names :   N. A. Majeed alhammadi   1 *     K. Hameed Zaboon   2     A. Abdulhadi Abdullah   3  

1  Affiliation :  Department of computer sciences, shatt al-arab University college, Al Basrah, 61001, Iraq

    Email :  Nafeaalhamadi@yahoo.com


2  Affiliation :  Department of computer sciences, shatt al-arab University college, Al Basrah, 61001, Iraq

    Email :  Khalid.Hameed842@gmail.com


3  Affiliation :  Department of computer sciences, shatt al-arab University college, Al Basrah, 61001, Iraq

    Email :  ammarabdulhadiabdullah@sa-uc.edu.iq



Doi   :   https://doi.org/10.54216/FPA.070101


Abstract :

Recently, technology become an important part of our life, and it is employed to work together with Medicine, Space Science, Agriculture, industry, and more else. Stored the information in the servers and cloud become required. It is a global force that has transformed people's lives with the availability of various web applications that serve billions of websites every day. However, there are many types of attacks that could be targeting the internet, and there is a need to recognize, classify and protect thesis types of attack.  Due to its important global role, it has become important to ensure that web applications are secure, accurate, and of high quality. One of the basic problems found on the Web is DDoS attacks. In this work, the review classifies and delineates attack types, test characteristics, evaluation techniques; evaluation methods, and test data sets used in the proposed Strategic Strategy methodology. Finally, this work affords guidance and possible targets in the fight against creating better events to overcome the most dangerous Cyber-attack types which are DDoS attacks.

Keywords :

SYN Flood; ICMP; Flood; UDP flood Protection Methods.

References :

[1]     K. Igor and A. Ulanov, “Agent-based simulation of DDOS attacks and defense mechanisms,” International Journal of Computing vol. 4, pp. 113-123, 2014.

[2]     K. Sharma and B. Gupta, “Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices, “International Journal of E-Services and Mobile Applications (IJESMA),” vol. 10, pp. 58-74, 2018.

[3]     A. Saied, R. Overill and T. Radzik, “Detection of known and unknown DDoS attacks using Artificial Neural Networks,” Neurocomputing, vol. 172, pp. 385-393, 2016.

[4]     K. Prasad, A. Reddy and K. Rao, “DoS and DDoS attacks: defense, detection and traceback mechanisms-a survey,” Global Journal of Computer Science and Technology, 2014.

[5]     N. Z., Bawany, J. A., Shamsi & K. Salah, “DDoS attack detection and mitigation using SDN: methods, practices, and solutions “. Arabian Journal for Science and Engineering, 42(2), 425-441, 2017.

[6]     J. Ye, Cheng, X., J. Zhu, L. Feng & L. Song, “A DDoS attack detection method based on SVM in software defined network. Security and Communication Networks, 2018.

[7]     Z. Tan, A. Jamdagni, X. He, P. Nanda, & R. P.  Liu, “A system for denial-of-service attack detection based on multivariate correlation analysis, “. IEEE transactions on parallel and distributed systems, 25(2), 447-456, 2013.

[8]     J. Gonzalez, M. Anwar and J. Joshi, A trust-based approach against IP-spoofing attacks,” In Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on (pp. 63-70). IEEE. (2011, July).

[9]     S. Shiaeles, V. Katos, A. Karakos, and B. Papadopoulos, “Real time DDoS detection using fuzzy estimators,” computers & security, vol. 31, pp. 782-790, 2012.

[10]  A. H. Azizan, S. A. Mostafa, A. Mustapha, C. F. M. Foozy, M. H. Abd Wahab, M. A. Mohammed and B. A. Khalaf,” A Machine Learning Approach for Improving the Performance of Network Intrusion Detection Systems,” Annals of Emerging Technologies in Computing (AETiC), 5(5), 2021.

[11]  N. Garcia, T. Alcaniz, A. González-Vidal, J. B. Bernabe, D. Rivera, and A. Skarmeta,” Distributed real-time SlowDoS attacks detection over encrypted traffic using Artificial Intelligence”, Journal of Network and Computer Applications, 173, 102871, 2021.

[12]  D. M. Abdullah and A. M. Abdulazeez,” Machine Learning Applications based on SVM Classification A Review,” Qubahan Academic Journal, 1(2), 81-902021.

[13]  A. Rahul, S. Prashanth, S. Kumar and G. Arun, “Detection of Intruders and Flooding In Voip Using IDS, Jacobson Fast And Hellinger Distance Algorithms,” IOSR Journal of Computer Engineering (IOSRJCE), vol. 2, pp. 30-36, 2012.

[14]  N. Chambers, B. Fry and J. McMasters, “Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security,” In Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long Papers) (Vol. 1, pp. 1626-1635). (2018).

[15]  D. Juneja, R. Chawla and A. Singh, “An Agent-Based Framework to Counter attack DDoS Attacks,” International Journal of Wireless Networks and Communications, vol. 1, p. 193, 2009.

 

 


Cite this Article as :
N. A. Majeed alhammadi , K. Hameed Zaboon , A. Abdulhadi Abdullah, A Review of the Common DDoS Attack: Types and Protection Approaches Based on Artificial Intelligence, Fusion: Practice and Applications, Vol. 7 , No. 1 , (2022) : 08-14 (Doi   :  https://doi.org/10.54216/FPA.070101)