Systematic literature review and taxonomy for DDoS attack detection and prediction
Distributed denial of service (DDoS) attack has been significantly discussed in the computer security domain, particularly due to the damaging effects it causes to organisations’ assets. However, it confronts the challenge under massive growth of internet user traffic and lightning speed of computer...
| Main Authors: | Yusof, Ahmad Riza’ain, Udzir, Nur Izura, Selamat, Ali |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Inderscience Publishers
2019
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/82127/ http://psasir.upm.edu.my/id/eprint/82127/1/Systematic%20literature%20review%20.pdf |
Similar Items
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
Chaos Theory Based Detection against Network Mimicking DDoS Attacks
by: Chonka, A., et al.
Published: (2009)
by: Chonka, A., et al.
Published: (2009)
Evaluation of boruta algorithm in DDoS detection
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
by: Noor Farhana, Mohd Zuki, et al.
Published: (2023)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
by: Bouke, Mohamed Aly, et al.
Published: (2023)
by: Bouke, Mohamed Aly, et al.
Published: (2023)
Performance analysis based on DDoS attack at MAC layer in WLAN / Zati Bayani Harun
by: Harun, Zati Bayani
Published: (2019)
by: Harun, Zati Bayani
Published: (2019)
An improved DDoS detection using hybrid N-Gram heuristic technique
by: Maslan, Andi, et al.
Published: (2017)
by: Maslan, Andi, et al.
Published: (2017)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection
System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2023)
by: Dheyab, Saad Ahmed, et al.
Published: (2023)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Ahmed Dheyab, Saad, et al.
Published: (2022)
by: Ahmed Dheyab, Saad, et al.
Published: (2022)
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
by: Dheyab, Saad Ahmed, et al.
Published: (2022)
DDoS detection using active and idle features of revised CICFlowMeter and statistical approaches
by: Ali, Basheer Husham, et al.
Published: (2022)
by: Ali, Basheer Husham, et al.
Published: (2022)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Adaptive feature selection for denial of services (DoS) attack
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
by: Yusof, Ahmad Riza'ain, et al.
Published: (2017)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Secure AdHoc on demand distance vector routing protocol using media access control and symmetric encryption against black hole and DDoS attacks in manet
by: Khan, Samia
Published: (2018)
by: Khan, Samia
Published: (2018)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Wireshark window authentication based packet captureing scheme to pervent DDoS related security issues in cloud network nodes
by: Waqar, Ali, et al.
Published: (2015)
by: Waqar, Ali, et al.
Published: (2015)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Generalized Entropy-Based Approach With A Dynamic Threshold To Detect Ddos Attacks On Software Defined Networking Controller
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
by: Aladaileh, Mohammad Adnan Ahmad
Published: (2021)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Similar Items
-
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
by: Yusof, Ahmad Riza’ain, et al.
Published: (2016) -
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020) -
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015) -
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017) -
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)