Full Paper View Go Back
A Survey on the Applications of Machine Learning in Identifying Predominant Network Attacks
Heyshanthini Pandiyakumari S.1 , Jaya R.2
- Department of CSE, NHCE, VTU, Bangalore, India.
- Department of CSE, NHCE, Bangalore, India.
Section:Survey Paper, Product Type: Journal-Paper
Vol.11 ,
Issue.5 , pp.16-22, Oct-2023
Online published on Oct 31, 2023
Copyright © Heyshanthini Pandiyakumari S., Jaya R. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Heyshanthini Pandiyakumari S., Jaya R., “A Survey on the Applications of Machine Learning in Identifying Predominant Network Attacks,” International Journal of Scientific Research in Computer Science and Engineering, Vol.11, Issue.5, pp.16-22, 2023.
MLA Style Citation: Heyshanthini Pandiyakumari S., Jaya R. "A Survey on the Applications of Machine Learning in Identifying Predominant Network Attacks." International Journal of Scientific Research in Computer Science and Engineering 11.5 (2023): 16-22.
APA Style Citation: Heyshanthini Pandiyakumari S., Jaya R., (2023). A Survey on the Applications of Machine Learning in Identifying Predominant Network Attacks. International Journal of Scientific Research in Computer Science and Engineering, 11(5), 16-22.
BibTex Style Citation:
@article{S._2023,
author = {Heyshanthini Pandiyakumari S., Jaya R.},
title = {A Survey on the Applications of Machine Learning in Identifying Predominant Network Attacks},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2023},
volume = {11},
Issue = {5},
month = {10},
year = {2023},
issn = {2347-2693},
pages = {16-22},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3282},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3282
TI - A Survey on the Applications of Machine Learning in Identifying Predominant Network Attacks
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Heyshanthini Pandiyakumari S., Jaya R.
PY - 2023
DA - 2023/10/31
PB - IJCSE, Indore, INDIA
SP - 16-22
IS - 5
VL - 11
SN - 2347-2693
ER -
Abstract :
Over the past decade, there has been an unprecedented surge in the number of intelligent devices, and in recent years, the proliferation of intelligent machines has surged significantly. Computer networks play a vital role in ensuring uninterrupted connectivity among interconnected IoT devices. The substantial increase in the use of smart devices has unfortunately paved the way for substantial unethical activities within networks. This study focuses on the predominant network threat known as the “Low Rate/Slow Denial of Service (LDoS) attack” which poses a substantial risk to the internet`s integrity. Detecting the source of these attacks is exceptionally challenging because they do not generate high volumes of traffic or sudden spikes in network activity. This survey explores the application of machine learning to enhance the detection of such attacks, aiming to achieve improved performance.
Key-Words / Index Term :
LDoS attack, DDoS attack, Anomaly detection, ML, RL, IDS, Hyperparameter optimization
References :
[1] Tang D, Gao C, Li X, Liang W, Xiao S and Yang Q, “A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm,” IEEE Transactions on Network Science and Engineering, Vol.10, Issue.4, pp.1952 -1963, 2023, DOI: 10.1109/TNSE.2023.3236970.
[2] Zhan S, Tang D, Man J, Dai R and Wang X, “Low-Rate DoS Attacks Detection Based on MAF-ADM,” MDPI Sensors, Vol.20, Issue.1, pp.189, 2020, https://doi.org/10.3390/s20010189.
[3] Liang Liu, Yue Yin, Zhijun Wu, Qingbo Pan and Meng Yue, “LDoS attack detection method based on traffic classification prediction,” IET information security, WILEY, Vol.16, Issue.2, pp.86-96, 2022, DOI: 10.1049/ise2.12046.
[4] Wu Zhijun, Li Wenjing, Liu Liang and Yue Meng, “Low-Rate DoS Attacks, Detection, Defense and Challenges: A Survey,” IEEE access, Vol.8, pp.43920-43943, 2020, DOI: 10.1109/ACCESS.2020.2976609.
[5] Wenwen Sun, Shaopeng Guan, Peng Wang, Qingyu Wu, “A hybrid deep learning model based low-rate DoS attack detection method for software defined network,” Emerging telecommunications technologies, Wiley, Vol.33, Issue.5, 2022, https://doi.org/10.1002/ett.4443.
[6] Harun Surej Ilango, Maode Ma and Rong Su, “A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT,” Engineering applications of artificial intelligence, Elsevier, Vol.114, 2022, https://doi.org/10.1016/j.engappai.2022.105059.
[7] Harun Surej Ilango, Maode Ma and Rong Su, “Low Rate DoS Attack Detection in IoT - SDN using Deep Learning,” IEEE international conference on iThings, Australia, 2022, DOI: 10.1109/iThings - GreenCom - CPSCom - SmartData-Cybermatics53846.2021.00031
[8] Yazhi Liu, Ding Sun, Rundong Zhang and Wei Li, “A Method for Detecting LDoS Attacks in SDWSN Based on Compressed Hilbert–Huang Transform and Convolutional Neural Networks,” MDPI Sensors, Vol.23, Issue.10, pp.4745, 2023, https://doi.org/10.3390/s23104745.
[9] D. Tang, S. Wang, B. Liu, W. Jin and J. Zhang, "GASF-IPP: Detection and Mitigation of LDoS Attack in SDN," IEEE Transactions on Services Computing, pp.1-12, 2023, DOI: 10.1109/TSC.2023.3266757.
[10] Xinmeng Li, Kai Zheng, Dan Tang, Zheng Qin, Zhiqing Zheng, Shihan Zhang, “LDoS Attack Detection Based on ASNNC-OFA Algorithm,” IEEE wireless communications and networking conference, China, 2021, DOI: 10.1109/WCNC49053.2021.9417400
[11] Dan tang, Jingwen chen, Xiyin wang, Siqi zhang,Yudong yan, “A new detection method for LDoS attacks based on data mining,” Future generation computer systems, Elsevier, Vol.16, Issue.128, pp.73-87, 2022, https://doi.org/10.1016/j.future.2021.09.039
[12] Wei shi, Dann tang, Sijia Zhan, Zheng Qin and Xiyin wang, “An approach for detecting LDoS attack based on cloud model,” Forensics of computer science, Springer, Vol.16, Issue.166821, 2022, https://doi.org/10.1007/s11704-022-0486-1.
[13] Naiji Zhang; Fehmi Jaafar; Yasir Malik, “Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning,” 6th IEEE international conference on cyber security and cloud computing, Paris, France, pp.59-62, 2019, DOI 10.1109/CSCloud/EdgeCom.2019.00020.
[14] Dan tang, Liu tang, Rui dai, Jingwen chen, Xiong Li and Joel J.P.C.Rodrigues, “MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost,”, Future generation computer systems, Elsevier, Vol.106, pp.347-359, 2020, https://doi.org/10.1016/j.future.2019.12.034.
[15] Jingtang Luo, Xiaolong Yang, Jin Wang, Jie Xu, Jian Sun and Keping Long, “On a Mathematical Model for Low-Rate Shrew,” IEEE Transactions on Information Forensics and Security, Vol.9, Issue.7, pp.1069-1083, 2014.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.