Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/3804
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | KHALAF, BASHAR AHMED | - |
dc.contributor.author | Mostafa, Salama A. | - |
dc.contributor.author | Mustapha, Aida | - |
dc.contributor.author | Mohammed, Mazin Abed | - |
dc.contributor.author | ABDUALLAH, WAFAA MUSTAFA | - |
dc.date.accessioned | 2022-10-20T09:01:00Z | - |
dc.date.available | 2022-10-20T09:01:00Z | - |
dc.date.issued | 2019-04-16 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/3804 | - |
dc.description.abstract | Until now, an effective defense method against Distributed Denial of Service (DDoS) attacks is yet to be offered by security systems. Incidents of serious damage due to DDoS attacks have been increasing, thereby leading to an urgent need for new attack identification, mitigation, and prevention mechanisms. To prevent DDoS attacks, the basic features of the attacks need to be dynamically analyzed because their patterns, ports, and protocols or operation mechanisms are rapidly changed and manipulated. Most of the proposed DDoS defense methods have different types of drawbacks and limitations. Some of these methods have signature-based defense mechanisms that fail to identify new attacks and others have anomaly-based defense mechanisms that are limited to specific types of DDoS attacks and yet to be applied in open environments. Subsequently, extensive research on applying artificial intelligence and statistical techniques in the defense methods has been conducted in order to identify, mitigate, and prevent these attacks. However, the most appropriate and effective defense features, mechanisms, techniques, and methods for handling such attacks remain to be an open question. This review paper focuses on the most common defense methods against DDoS attacks that adopt artificial intelligence and statistical approaches. Additionally, the review classifies and illustrates the attack types, the testing properties, the evaluation methods and the testing datasets that are utilized in the methodology of the proposed defense methods. Finally, this review provides a guideline and possible points of encampments for developing improved solution models of defense methods against DDoS attacks. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE Access | en_US |
dc.relation.ispartofseries | 7; | - |
dc.subject | DDoS attack | en_US |
dc.subject | DDoS defense | en_US |
dc.subject | artificial intelligence technique, | en_US |
dc.subject | statistical technique | en_US |
dc.title | Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods | en_US |
dc.type | Article | en_US |
Appears in Collections: | قسم نظم المعلومات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Comprehensive_Review_of_Artificial_Intelligence_and_Statistical_Approaches_in_Distributed_Denial_of_Service_Attack_and_Defense_Methods.pdf | 10.11 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.