An Empirical Analysis of DDoS Attack Detection and Mitigation Techniques: A Comparative Review of Tools and Methods

Authors

  • Dr. Abhinandan Singh Dandotiya Department of IT, Prestige Institute of Management and Research, Gwalior, Madhya Pradesh, India Author
  • Palash Sharma Department of IT, Prestige Institute of Management and Research, Gwalior, Madhya Pradesh, India Author
  • Bharti gole Department of IT, Prestige Institute of Management and Research, Gwalior, Madhya Pradesh, India Author
  • Shruti Dubey Department of IT, Prestige Institute of Management and Research, Gwalior, Madhya Pradesh, India Author
  • Dr. Nidhi Dandotiya Department of CS and Engineering, (SOET) ITM University Gwalior, Madhya Pradesh, India Author

DOI:

https://doi.org/10.32628/CSEIT2410462

Keywords:

DDoS Attack, Network Security, Detection Strategies, Mitigation Techniques, Cyber Resilience, Comparative Analysis

Abstract

The availability and integrity of online services and networks are seriously threatened by distributed denial of service (DDoS) assaults. As a result, a plethora of detection and mitigation strategies have been created, all utilizing different instruments and approaches. By comparing various tools and approaches, this study provides an empirical examination of DDoS attack detection and mitigation strategies. We carefully assess the performance of top DDoS detection and mitigation solutions against a range of attack vectors and in diverse network contexts, taking into account their efficacy, efficiency, and accuracy. We examine the benefits, drawbacks, and real-world applications of both open-source and proprietary technologies for network defenders. Additionally, we look at how these tools and techniques adapt to changing threats and talk about new trends and difficulties in the DDoS assault arena. For network security practitioners, researchers, and policymakers looking for an understanding of the state of DDoS defence mechanisms and tactics for strengthening resilience against these disruptive cyber threats, this comparative assessment is an invaluable resource.

Downloads

Download data is not yet available.

References

Lee, Keunsoo, et al. "DDoS attack detection method using cluster analysis." Expert systems with applications 34.3 (2008): 1659-1665. DOI: https://doi.org/10.1016/j.eswa.2007.01.040

Lesmana, Desta, Mochammmad Afifuddin, and Agus Adriyanto. "Challenges and Cybersecurity Threats in Digital Economic Transformation." International Journal Of Humanities Education and Social Sciences (IJHESS) 2.6 (2023). DOI: https://doi.org/10.55227/ijhess.v2i6.515

Dandotiya, Nidhi, And Pallavi Khatri. "Modified Coap To Ensure Authentication In Iot Network." Architecture 1: 2.

Vanerio, Juan, Csaba Györgyi, and Stefan Schmid. "Poster: P4DME: DNS Threat Mitigation with P4 In-Network Machine Learning Offload." Proceedings of the 6th on European P4 Workshop. 2023. DOI: https://doi.org/10.1145/3630047.3630251

Ayinde, Kabiru Sunday, Pooja Lekhi, and Mahdi Toobaee. "Exploring Financial Service Innovations: Socioeconomic and Regulatory Concerns." Innovation, Sustainability, and Technological Megatrends in the Face of Uncertainties: Core Developments and Solutions. Cham: Springer Nature Switzerland, 2024. 201-209. DOI: https://doi.org/10.1007/978-3-031-46189-7_13

Dandotiya, Nidhi, and Pallavi Khatri. "A Middleware Approach for Authenticate user on IoT Devices Accessibility." NeuroQuantology 20.11 (2022): 8029.

Raju, Rajeswari, Nur Hidayah Abd Rahman, and Atif Ahmad. "Cyber security awareness in using digital platforms among students in a higher learning institution." Asian Journal of University Education 18.3 (2022): 756-766. DOI: https://doi.org/10.24191/ajue.v18i3.18967

Dotan, Maya, et al. "SOK: cryptocurrency networking context, state-of-the-art, challenges." Proceedings of the 15th International Conference on Availability, Reliability and Security. 2020. DOI: https://doi.org/10.1145/3407023.3407043

Nagpal, Bharti, et al. "DDoS tools: Classification, analysis and comparison." 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2015.

Nagpal, Bharti, et al. "DDoS tools: Classification, analysis and comparison." 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom). IEEE, 2015.

Kumar, Vinod, and Krishan Kumar. "Classification of DDoS attack tools and its handling techniques and strategy at application layer." 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Fall). IEEE, 2016.

Gupta, Shashi Kant, Nidhi Birthare, and Neeraj Goyal. "Energy Optimization Routing Protocol for Heterogeneous Sensor Network." (2020). DOI: https://doi.org/10.32628/CSEIT206138

Mittal, Meenakshi, Krishan Kumar, and Sunny Behal. "DDoS-AT-2022: a distributed denial of service attack dataset for evaluating DDoS defense system." Proceedings of the Indian National Science Academy 89.2 (2023): 306-324. DOI: https://doi.org/10.1007/s43538-023-00159-9

Dandotiya, Abhinandan Singh, et al. "The vulnerability to computer security posed by key loggers' strategies." NeuroQuantology 21.5 (2023): 785.

Yousuf, Omerah, and Roohie Naaz Mir. "DDoS attack detection in Internet of Things using recurrent neural network." Computers and Electrical Engineering 101 (2022): 108034. DOI: https://doi.org/10.1016/j.compeleceng.2022.108034

Chakraborty, Chandrima, Anam Afreen, and Dipyaman Pal. "Crime against women in India: A state level analysis." Journal of International Women's Studies 22.5 (2021): 1-18.

Dandotiya, Abhinandan Singh, et al. "The vulnerability to computer security posed by key loggers' strategies." NeuroQuantology 21.5 (2023): 785.

Mangoli, R. N., and Ganapati N. Tarase. "Crime against women in India: A statistical review." International Journal of Criminology and Sociological Theory 2.2 (2009).

Maity, Shrabanti, and Sucharita Roy. "Analysis of growth and identifications of the determinants of crime against women: insight from India." Journal of International Women's Studies 22.1 (2021): 293-311.

Dandotiya, Nidhi, Abhinandan Singh Dandotiya. "Digital Auditing: A Technique to Ensure Security." (2020). DOI: https://doi.org/10.32628/CSEIT206391

Das, Priyanka, and Asit Kumar Das. "Behavioural analysis of crime against women using a graph based clustering approach." 2017 International Conference on Computer Communication and Informatics (ICCCI). IEEE, 2017. DOI: https://doi.org/10.1109/ICCCI.2017.8117714

Abhinandan Singh Dandotiya, Shashi Kant Gupta 2023 “Analysis and development of Security Framework for IoT Devices” published in International Journal of Tuijin Jishu journal of propulsion Technology ISSN 1001- 4055.DOI:https://doi.org/10.52783/tjjpt. v44.i4.955 (https://doi.org/10.52783/tjjpt.v44.i4.955) Vol. 44 ,No.4-Pg No: 955-1008 2023 DOI: https://doi.org/10.52783/tjjpt.v44.i4.955

Ravi Teja, K., et al. "Analysis of Crimes Against Women in India Using Machine Learning Techniques." Communication Software and Networks: Proceedings of INDIA 2019. Springer Singapore, 2021. DOI: https://doi.org/10.1007/978-981-15-5397-4_51

Rodríguez, Dalia Andrea, et al. "A systematic review of computer science solutions for addressing violence against women and children." IEEE Access 9 (2021): 114622-114639. DOI: https://doi.org/10.1109/ACCESS.2021.3103459

Dandotiya, abhinandan, et al. "A Secure Detection Framework for ARP, DHCP, and DoS Attacks on Kali Linux."

Singh, Rishabh, et al. "K-means clustering analysis of crimes on Indian women." Journal of Cybersecurity and Information Management (JCIM) 4.1 (2020): 5-

Downloads

Published

30-11-2024

Issue

Section

Research Articles

Similar Articles

1-10 of 482

You may also start an advanced similarity search for this article.