An Empirical Analysis of DDoS Attack Detection and Mitigation Techniques: A Comparative Review of Tools and Methods
DOI:
https://doi.org/10.32628/CSEIT2410462Keywords:
DDoS Attack, Network Security, Detection Strategies, Mitigation Techniques, Cyber Resilience, Comparative AnalysisAbstract
The availability and integrity of online services and networks are seriously threatened by distributed denial of service (DDoS) assaults. As a result, a plethora of detection and mitigation strategies have been created, all utilizing different instruments and approaches. By comparing various tools and approaches, this study provides an empirical examination of DDoS attack detection and mitigation strategies. We carefully assess the performance of top DDoS detection and mitigation solutions against a range of attack vectors and in diverse network contexts, taking into account their efficacy, efficiency, and accuracy. We examine the benefits, drawbacks, and real-world applications of both open-source and proprietary technologies for network defenders. Additionally, we look at how these tools and techniques adapt to changing threats and talk about new trends and difficulties in the DDoS assault arena. For network security practitioners, researchers, and policymakers looking for an understanding of the state of DDoS defence mechanisms and tactics for strengthening resilience against these disruptive cyber threats, this comparative assessment is an invaluable resource.
Downloads
References
Lee, Keunsoo, et al. "DDoS attack detection method using cluster analysis." Expert systems with applications 34.3 (2008): 1659-1665. DOI: https://doi.org/10.1016/j.eswa.2007.01.040
Lesmana, Desta, Mochammmad Afifuddin, and Agus Adriyanto. "Challenges and Cybersecurity Threats in Digital Economic Transformation." International Journal Of Humanities Education and Social Sciences (IJHESS) 2.6 (2023). DOI: https://doi.org/10.55227/ijhess.v2i6.515
Dandotiya, Nidhi, And Pallavi Khatri. "Modified Coap To Ensure Authentication In Iot Network." Architecture 1: 2.
Vanerio, Juan, Csaba Györgyi, and Stefan Schmid. "Poster: P4DME: DNS Threat Mitigation with P4 In-Network Machine Learning Offload." Proceedings of the 6th on European P4 Workshop. 2023. DOI: https://doi.org/10.1145/3630047.3630251
Ayinde, Kabiru Sunday, Pooja Lekhi, and Mahdi Toobaee. "Exploring Financial Service Innovations: Socioeconomic and Regulatory Concerns." Innovation, Sustainability, and Technological Megatrends in the Face of Uncertainties: Core Developments and Solutions. Cham: Springer Nature Switzerland, 2024. 201-209. DOI: https://doi.org/10.1007/978-3-031-46189-7_13
Dandotiya, Nidhi, and Pallavi Khatri. "A Middleware Approach for Authenticate user on IoT Devices Accessibility." NeuroQuantology 20.11 (2022): 8029.
Raju, Rajeswari, Nur Hidayah Abd Rahman, and Atif Ahmad. "Cyber security awareness in using digital platforms among students in a higher learning institution." Asian Journal of University Education 18.3 (2022): 756-766. DOI: https://doi.org/10.24191/ajue.v18i3.18967
Dotan, Maya, et al. "SOK: cryptocurrency networking context, state-of-the-art, challenges." Proceedings of the 15th International Conference on Availability, Reliability and Security. 2020. DOI: https://doi.org/10.1145/3407023.3407043
Nagpal, Bharti, et al. "DDoS tools: Classification, analysis and comparison." 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2015.
Nagpal, Bharti, et al. "DDoS tools: Classification, analysis and comparison." 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2015.
Kumar, Vinod, and Krishan Kumar. "Classification of DDoS attack tools and its handling techniques and strategy at application layer." 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Fall). IEEE, 2016.
Gupta, Shashi Kant, Nidhi Birthare, and Neeraj Goyal. "Energy Optimization Routing Protocol for Heterogeneous Sensor Network." (2020). DOI: https://doi.org/10.32628/CSEIT206138
Mittal, Meenakshi, Krishan Kumar, and Sunny Behal. "DDoS-AT-2022: a distributed denial of service attack dataset for evaluating DDoS defense system." Proceedings of the Indian National Science Academy 89.2 (2023): 306-324. DOI: https://doi.org/10.1007/s43538-023-00159-9
Dandotiya, Abhinandan Singh, et al. "The vulnerability to computer security posed by key loggers' strategies." NeuroQuantology 21.5 (2023): 785.
Yousuf, Omerah, and Roohie Naaz Mir. "DDoS attack detection in Internet of Things using recurrent neural network." Computers and Electrical Engineering 101 (2022): 108034. DOI: https://doi.org/10.1016/j.compeleceng.2022.108034
Chakraborty, Chandrima, Anam Afreen, and Dipyaman Pal. "Crime against women in India: A state level analysis." Journal of International Women's Studies 22.5 (2021): 1-18.
Dandotiya, Abhinandan Singh, et al. "The vulnerability to computer security posed by key loggers' strategies." NeuroQuantology 21.5 (2023): 785.
Mangoli, R. N., and Ganapati N. Tarase. "Crime against women in India: A statistical review." International Journal of Criminology and Sociological Theory 2.2 (2009).
Maity, Shrabanti, and Sucharita Roy. "Analysis of growth and identifications of the determinants of crime against women: insight from India." Journal of International Women's Studies 22.1 (2021): 293-311.
Dandotiya, Nidhi, Abhinandan Singh Dandotiya. "Digital Auditing: A Technique to Ensure Security." (2020). DOI: https://doi.org/10.32628/CSEIT206391
Das, Priyanka, and Asit Kumar Das. "Behavioural analysis of crime against women using a graph based clustering approach." 2017 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2017. DOI: https://doi.org/10.1109/ICCCI.2017.8117714
Abhinandan Singh Dandotiya, Shashi Kant Gupta 2023 “Analysis and development of Security Framework for IoT Devices” published in International Journal of Tuijin Jishu journal of propulsion Technology ISSN 1001- 4055.DOI:https://doi.org/10.52783/tjjpt. v44.i4.955 (https://doi.org/10.52783/tjjpt.v44.i4.955) Vol. 44 ,No.4-Pg No: 955-1008 2023 DOI: https://doi.org/10.52783/tjjpt.v44.i4.955
Ravi Teja, K., et al. "Analysis of Crimes Against Women in India Using Machine Learning Techniques." Communication Software and Networks: Proceedings of INDIA 2019. Springer Singapore, 2021. DOI: https://doi.org/10.1007/978-981-15-5397-4_51
Rodríguez, Dalia Andrea, et al. "A systematic review of computer science solutions for addressing violence against women and children." IEEE Access 9 (2021): 114622-114639. DOI: https://doi.org/10.1109/ACCESS.2021.3103459
Dandotiya, abhinandan, et al. "A Secure Detection Framework for ARP, DHCP, and DoS Attacks on Kali Linux."
Singh, Rishabh, et al. "K-means clustering analysis of crimes on Indian women." Journal of Cybersecurity and Information Management (JCIM) 4.1 (2020): 5-
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.