NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach

被引:0
|
作者
Tahboush, Muhannad [1 ]
Hamdan, Adel [2 ]
Alzobi, Firas [1 ]
Husni, Moath [3 ]
Adawy, Mohammad [1 ]
机构
[1] World Islamic Sci & Educ Univ, Informat & Networks Syst Dept, Amman, Jordan
[2] World Islamic Sci & Educ Univ, Dept Comp Sci, Amman, Jordan
[3] World Islamic Sci & Educ Univ, Software Engn Dept, Amman, Jordan
关键词
Network security; DoS attack; cyberattack; network traffic; ATTACKS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that will consume and disrupt victim resources to limit access to information services by flooding a target system with a high volume of traffic, thereby preventing the availability of the resources to the legitimate users. However, several solutions were developed to overcome the DoS attack, but still suffer from limitations such as requiring additional hardware, fail to provide a unified solution and incur a high delay of detection accuracy. Therefore, the network traffic detection approach (NTDA) is proposed to detect the DoS attack in a more optimistic manner based on various scenarios. First, the high network traffic measurements and mean deviation, second scenario relied on the transmission rate per second (TPS) of the sender. The proposed algorithm NTDA was simulated using MATLAB R2020a. The performance metrics taken into consideration are false negative rate, accuracy, detection rate and true positive rate. The simulation results show that the performance parameters of proposed NTDA algorithm outperformed in DoS detection the other well-known algorithms.
引用
收藏
页码:692 / 698
页数:7
相关论文
共 50 条
  • [31] Detection and Mitigation of Denial of Service Attacks Using Stratified Architecture
    Prakash, A.
    Satish, M.
    Bhargav, T. Sri Sai
    Bhalaji, N.
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 275 - 280
  • [32] A Queuing Analysis of Tolerating for Denial-of-Service (DoS) Attacks with a Proxy Network
    Aye, Myint Myint
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL II, PROCEEDINGS, 2009, : 366 - 368
  • [33] Mitigating network denial-of-service through diversity-based traffic management
    Matrawy, A
    van Orschot, PC
    Somayaji, A
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3531 : 104 - 121
  • [34] Harnessing feature pruning with optimal deep learning-based distributed denial of service cyberattack detection on IoT environment
    Aboalela, Rania
    Allehaibi, Khalid H.
    Alsaadi, Naif
    Alorfi, Almuhannad S.
    Maghrabi, Louai A.
    Ashary, Ehab Bahaudien
    Alghamdi, Wajdi
    Ragab, Mahmoud
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 120 : 584 - 597
  • [35] Detecting Distributed Denial of Service in Network Traffic with Deep Learning
    Rusyaidi, Muhammad
    Jaf, Sardar
    Ibrahim, Zunaidi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 34 - 41
  • [36] Hybrid and Spatiotemporal Detection of Cyberattack Network Traffic in Cloud Data Centers
    Yuan, Haitao
    Wang, Shen
    Bi, Jing
    Zhang, Jia
    Zhou, MengChu
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 18035 - 18046
  • [37] Distributed Denial of Service (DDoS) detection by traffic pattern analysis
    Theerasak Thapngam
    Shui Yu
    Wanlei Zhou
    S. Kami Makki
    Peer-to-Peer Networking and Applications, 2014, 7 : 346 - 358
  • [38] Smart detection of denial of service (DoS) attacks in internet of vehicles (IoV) networks
    Helal, Maha
    Bakhamis, Mohammed
    Al-Akhras, Mousa
    Atawneh, Samer
    Al-Oqily, Ibrahim
    Kashmeery, Tariq
    INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2024, 11 (11): : 28 - 36
  • [39] Stealthy Denial of Service (DoS) attack modelling and detection for HTTP/2 services
    Adi, Erwin
    Baig, Zubair
    Hingston, Philip
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 91 : 1 - 13
  • [40] Distributed Denial of Service (DDoS) detection by traffic pattern analysis
    Thapngam, Theerasak
    Yu, Shui
    Zhou, Wanlei
    Makki, S. Kami
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 346 - 358