DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges

IF 3.3 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Sensor and Actuator Networks Pub Date : 2023-07-06 DOI:10.3390/jsan12040051
K. Adedeji, A. Abu-Mahfouz, A. Kurien
{"title":"DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges","authors":"K. Adedeji, A. Abu-Mahfouz, A. Kurien","doi":"10.3390/jsan12040051","DOIUrl":null,"url":null,"abstract":"In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent security flaws, the attacks seek to deplete the resources of the target network by flooding it with numerous spoofed requests from a distributed system. Research studies have demonstrated that a DDoS attack has a considerable impact on the target network resources and can result in an extended operational outage if not detected. The detection of DDoS attacks has been approached using a variety of methods. In this paper, a comprehensive survey of the methods used for DDoS attack detection on selected internet-enabled networks is presented. This survey aimed to provide a concise introductory reference for early researchers in the development and application of attack detection methodologies in IoT-based applications. Unlike other studies, a wide variety of methods, ranging from the traditional methods to machine and deep learning methods, were covered. These methods were classified based on their nature of operation, investigated as to their strengths and weaknesses, and then examined via several research studies which made use of each approach. In addition, attack scenarios and detection studies in emerging networks such as the internet of drones, routing protocol based IoT, and named data networking were also covered. Furthermore, technical challenges in each research study were identified. Finally, some remarks for enhancing the research studies were provided, and potential directions for future research were highlighted.","PeriodicalId":37584,"journal":{"name":"Journal of Sensor and Actuator Networks","volume":" ","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Sensor and Actuator Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/jsan12040051","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 1

Abstract

In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent security flaws, the attacks seek to deplete the resources of the target network by flooding it with numerous spoofed requests from a distributed system. Research studies have demonstrated that a DDoS attack has a considerable impact on the target network resources and can result in an extended operational outage if not detected. The detection of DDoS attacks has been approached using a variety of methods. In this paper, a comprehensive survey of the methods used for DDoS attack detection on selected internet-enabled networks is presented. This survey aimed to provide a concise introductory reference for early researchers in the development and application of attack detection methodologies in IoT-based applications. Unlike other studies, a wide variety of methods, ranging from the traditional methods to machine and deep learning methods, were covered. These methods were classified based on their nature of operation, investigated as to their strengths and weaknesses, and then examined via several research studies which made use of each approach. In addition, attack scenarios and detection studies in emerging networks such as the internet of drones, routing protocol based IoT, and named data networking were also covered. Furthermore, technical challenges in each research study were identified. Finally, some remarks for enhancing the research studies were provided, and potential directions for future research were highlighted.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
互联网网络中的DDoS攻击和检测方法:概念、研究前景和挑战
近年来,分布式拒绝服务(DDoS)一直是互联网网络中最普遍的安全威胁之一,许多物联网(IoT)设备被用来进行攻击。由于其固有的安全缺陷,这些攻击试图通过从分布式系统向目标网络发送大量伪造请求来耗尽目标网络的资源。研究表明,DDoS攻击对目标网络资源有相当大的影响,如果没有检测到,可能会导致长期运营中断。DDoS攻击的检测方法多种多样。本文全面介绍了在选定的启用互联网的网络上进行DDoS攻击检测的方法。本调查旨在为早期研究人员在基于物联网的应用中开发和应用攻击检测方法提供简明的介绍性参考。与其他研究不同,涵盖了从传统方法到机器和深度学习方法的各种方法。这些方法根据其操作性质进行分类,调查其优缺点,然后通过使用每种方法的几项研究进行检查。此外,还涵盖了新兴网络中的攻击场景和检测研究,如无人机互联网、基于路由协议的物联网和命名数据网络。此外,还确定了每项研究中的技术挑战。最后,对加强研究提出了一些意见,并强调了未来研究的潜在方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Sensor and Actuator Networks
Journal of Sensor and Actuator Networks Physics and Astronomy-Instrumentation
CiteScore
7.90
自引率
2.90%
发文量
70
审稿时长
11 weeks
期刊介绍: Journal of Sensor and Actuator Networks (ISSN 2224-2708) is an international open access journal on the science and technology of sensor and actuator networks. It publishes regular research papers, reviews (including comprehensive reviews on complete sensor and actuator networks), and short communications. Our aim is to encourage scientists to publish their experimental and theoretical results in as much detail as possible. There is no restriction on the length of the papers. The full experimental details must be provided so that the results can be reproduced.
期刊最新文献
Dynamic and Distributed Intelligence over Smart Devices, Internet of Things Edges, and Cloud Computing for Human Activity Recognition Using Wearable Sensors Output Stream from the AQM Queue with BMAP Arrivals Multi-Objective Optimization of Gateway Location Selection in Long-Range Wide Area Networks: A Tradeoff Analysis between System Costs and Bitrate Maximization Robust ISAC Localization in Smart Cities: A Hybrid Network Approach for NLOS Challenges with Uncertain Parameters Reduction in Data Imbalance for Client-Side Training in Federated Learning for the Prediction of Stock Market Prices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1