NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach
Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that wil...
Gespeichert in:
Veröffentlicht in: | International journal of advanced computer science & applications 2024, Vol.15 (3) |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 3 |
container_start_page | |
container_title | International journal of advanced computer science & applications |
container_volume | 15 |
creator | Tahboush, Muhannad Hamdan, Adel Alzobi, Firas Husni, Moath Adawy, Mohammad |
description | Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that will consume and disrupt victim resources to limit access to information services by flooding a target system with a high volume of traffic, thereby preventing the availability of the resources to the legitimate users. However, several solutions were developed to overcome the DoS attack, but still suffer from limitations such as requiring additional hardware, fail to provide a unified solution and incur a high delay of detection accuracy. Therefore, the network traffic detection approach (NTDA) is proposed to detect the DoS attack in a more optimistic manner based on various scenarios. First, the high network traffic measurements and mean deviation, second scenario relied on the transmission rate per second (TPS) of the sender. The proposed algorithm NTDA was simulated using MATLAB R2020a. The performance metrics taken into consideration are false negative rate, accuracy, detection rate and true positive rate. The simulation results show that the performance parameters of proposed NTDA algorithm outperformed in DoS detection the other well-known algorithms. |
doi_str_mv | 10.14569/IJACSA.2024.0150370 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3046786356</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3046786356</sourcerecordid><originalsourceid>FETCH-LOGICAL-c274t-4f5a40c0aee88f2b3e98754f3d2ed555085cffcfd206633f795c6e8b3eba5f953</originalsourceid><addsrcrecordid>eNotkMtOwzAQRS0EElXpH7CwxAYWKY5fcdiFlEdRKYsGiZ3lOuM2bWmK44L696SP2cxdnLkjHYSuY9KPuZDp_fAtyydZnxLK-yQWhCXkDHVoLGQkRELOD1lFMUm-LlGvaRakHZZSqVgHzcbFIHvAxRzwexWqmQlVvca1wwNYV2a1TxPwv5UFfDuoJ3c4303BmxCMXeJH00CJW34M4a_2S1x441xl2-MA9tCUbTa-NnZ-hS6cWTXQO-0u-nx-KvLXaPTxMsyzUWRpwkPEnTCcWGIAlHJ0yiBVieCOlRRKIQRRwjpnXUmJlIy5JBVWgmq5qREuFayLbo697dufLTRBL-qtX7cvNSNcJkoyIVuKHynr66bx4PTGV9_G73RM9MGqPlrVe6v6ZJX9Ayhhacs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3046786356</pqid></control><display><type>article</type><title>NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Tahboush, Muhannad ; Hamdan, Adel ; Alzobi, Firas ; Husni, Moath ; Adawy, Mohammad</creator><creatorcontrib>Tahboush, Muhannad ; Hamdan, Adel ; Alzobi, Firas ; Husni, Moath ; Adawy, Mohammad</creatorcontrib><description>Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that will consume and disrupt victim resources to limit access to information services by flooding a target system with a high volume of traffic, thereby preventing the availability of the resources to the legitimate users. However, several solutions were developed to overcome the DoS attack, but still suffer from limitations such as requiring additional hardware, fail to provide a unified solution and incur a high delay of detection accuracy. Therefore, the network traffic detection approach (NTDA) is proposed to detect the DoS attack in a more optimistic manner based on various scenarios. First, the high network traffic measurements and mean deviation, second scenario relied on the transmission rate per second (TPS) of the sender. The proposed algorithm NTDA was simulated using MATLAB R2020a. The performance metrics taken into consideration are false negative rate, accuracy, detection rate and true positive rate. The simulation results show that the performance parameters of proposed NTDA algorithm outperformed in DoS detection the other well-known algorithms.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2024.0150370</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Accuracy ; Algorithms ; Availability ; Communications traffic ; Computer networks ; Computer science ; Cybersecurity ; Data encryption ; Denial of service attacks ; Education ; Information services ; Information systems ; Machine learning ; Performance measurement</subject><ispartof>International journal of advanced computer science & applications, 2024, Vol.15 (3)</ispartof><rights>2024. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4022,27921,27922,27923</link.rule.ids></links><search><creatorcontrib>Tahboush, Muhannad</creatorcontrib><creatorcontrib>Hamdan, Adel</creatorcontrib><creatorcontrib>Alzobi, Firas</creatorcontrib><creatorcontrib>Husni, Moath</creatorcontrib><creatorcontrib>Adawy, Mohammad</creatorcontrib><title>NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach</title><title>International journal of advanced computer science & applications</title><description>Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that will consume and disrupt victim resources to limit access to information services by flooding a target system with a high volume of traffic, thereby preventing the availability of the resources to the legitimate users. However, several solutions were developed to overcome the DoS attack, but still suffer from limitations such as requiring additional hardware, fail to provide a unified solution and incur a high delay of detection accuracy. Therefore, the network traffic detection approach (NTDA) is proposed to detect the DoS attack in a more optimistic manner based on various scenarios. First, the high network traffic measurements and mean deviation, second scenario relied on the transmission rate per second (TPS) of the sender. The proposed algorithm NTDA was simulated using MATLAB R2020a. The performance metrics taken into consideration are false negative rate, accuracy, detection rate and true positive rate. The simulation results show that the performance parameters of proposed NTDA algorithm outperformed in DoS detection the other well-known algorithms.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Availability</subject><subject>Communications traffic</subject><subject>Computer networks</subject><subject>Computer science</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>Denial of service attacks</subject><subject>Education</subject><subject>Information services</subject><subject>Information systems</subject><subject>Machine learning</subject><subject>Performance measurement</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNotkMtOwzAQRS0EElXpH7CwxAYWKY5fcdiFlEdRKYsGiZ3lOuM2bWmK44L696SP2cxdnLkjHYSuY9KPuZDp_fAtyydZnxLK-yQWhCXkDHVoLGQkRELOD1lFMUm-LlGvaRakHZZSqVgHzcbFIHvAxRzwexWqmQlVvca1wwNYV2a1TxPwv5UFfDuoJ3c4303BmxCMXeJH00CJW34M4a_2S1x441xl2-MA9tCUbTa-NnZ-hS6cWTXQO-0u-nx-KvLXaPTxMsyzUWRpwkPEnTCcWGIAlHJ0yiBVieCOlRRKIQRRwjpnXUmJlIy5JBVWgmq5qREuFayLbo697dufLTRBL-qtX7cvNSNcJkoyIVuKHynr66bx4PTGV9_G73RM9MGqPlrVe6v6ZJX9Ayhhacs</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Tahboush, Muhannad</creator><creator>Hamdan, Adel</creator><creator>Alzobi, Firas</creator><creator>Husni, Moath</creator><creator>Adawy, Mohammad</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2024</creationdate><title>NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach</title><author>Tahboush, Muhannad ; Hamdan, Adel ; Alzobi, Firas ; Husni, Moath ; Adawy, Mohammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c274t-4f5a40c0aee88f2b3e98754f3d2ed555085cffcfd206633f795c6e8b3eba5f953</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Availability</topic><topic>Communications traffic</topic><topic>Computer networks</topic><topic>Computer science</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>Denial of service attacks</topic><topic>Education</topic><topic>Information services</topic><topic>Information systems</topic><topic>Machine learning</topic><topic>Performance measurement</topic><toplevel>online_resources</toplevel><creatorcontrib>Tahboush, Muhannad</creatorcontrib><creatorcontrib>Hamdan, Adel</creatorcontrib><creatorcontrib>Alzobi, Firas</creatorcontrib><creatorcontrib>Husni, Moath</creatorcontrib><creatorcontrib>Adawy, Mohammad</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science & applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tahboush, Muhannad</au><au>Hamdan, Adel</au><au>Alzobi, Firas</au><au>Husni, Moath</au><au>Adawy, Mohammad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach</atitle><jtitle>International journal of advanced computer science & applications</jtitle><date>2024</date><risdate>2024</risdate><volume>15</volume><issue>3</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that will consume and disrupt victim resources to limit access to information services by flooding a target system with a high volume of traffic, thereby preventing the availability of the resources to the legitimate users. However, several solutions were developed to overcome the DoS attack, but still suffer from limitations such as requiring additional hardware, fail to provide a unified solution and incur a high delay of detection accuracy. Therefore, the network traffic detection approach (NTDA) is proposed to detect the DoS attack in a more optimistic manner based on various scenarios. First, the high network traffic measurements and mean deviation, second scenario relied on the transmission rate per second (TPS) of the sender. The proposed algorithm NTDA was simulated using MATLAB R2020a. The performance metrics taken into consideration are false negative rate, accuracy, detection rate and true positive rate. The simulation results show that the performance parameters of proposed NTDA algorithm outperformed in DoS detection the other well-known algorithms.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2024.0150370</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2158-107X |
ispartof | International journal of advanced computer science & applications, 2024, Vol.15 (3) |
issn | 2158-107X 2156-5570 |
language | eng |
recordid | cdi_proquest_journals_3046786356 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Accuracy Algorithms Availability Communications traffic Computer networks Computer science Cybersecurity Data encryption Denial of service attacks Education Information services Information systems Machine learning Performance measurement |
title | NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T10%3A47%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=NTDA:%20The%20Mitigation%20of%20Denial%20of%20Service%20(DoS)%20Cyberattack%20Based%20on%20Network%20Traffic%20Detection%20Approach&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Tahboush,%20Muhannad&rft.date=2024&rft.volume=15&rft.issue=3&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2024.0150370&rft_dat=%3Cproquest_cross%3E3046786356%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3046786356&rft_id=info:pmid/&rfr_iscdi=true |