NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach

Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that wil...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of advanced computer science & applications 2024, Vol.15 (3)
Hauptverfasser: Tahboush, Muhannad, Hamdan, Adel, Alzobi, Firas, Husni, Moath, Adawy, Mohammad
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 3
container_start_page
container_title International journal of advanced computer science & applications
container_volume 15
creator Tahboush, Muhannad
Hamdan, Adel
Alzobi, Firas
Husni, Moath
Adawy, Mohammad
description Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that will consume and disrupt victim resources to limit access to information services by flooding a target system with a high volume of traffic, thereby preventing the availability of the resources to the legitimate users. However, several solutions were developed to overcome the DoS attack, but still suffer from limitations such as requiring additional hardware, fail to provide a unified solution and incur a high delay of detection accuracy. Therefore, the network traffic detection approach (NTDA) is proposed to detect the DoS attack in a more optimistic manner based on various scenarios. First, the high network traffic measurements and mean deviation, second scenario relied on the transmission rate per second (TPS) of the sender. The proposed algorithm NTDA was simulated using MATLAB R2020a. The performance metrics taken into consideration are false negative rate, accuracy, detection rate and true positive rate. The simulation results show that the performance parameters of proposed NTDA algorithm outperformed in DoS detection the other well-known algorithms.
doi_str_mv 10.14569/IJACSA.2024.0150370
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3046786356</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3046786356</sourcerecordid><originalsourceid>FETCH-LOGICAL-c274t-4f5a40c0aee88f2b3e98754f3d2ed555085cffcfd206633f795c6e8b3eba5f953</originalsourceid><addsrcrecordid>eNotkMtOwzAQRS0EElXpH7CwxAYWKY5fcdiFlEdRKYsGiZ3lOuM2bWmK44L696SP2cxdnLkjHYSuY9KPuZDp_fAtyydZnxLK-yQWhCXkDHVoLGQkRELOD1lFMUm-LlGvaRakHZZSqVgHzcbFIHvAxRzwexWqmQlVvca1wwNYV2a1TxPwv5UFfDuoJ3c4303BmxCMXeJH00CJW34M4a_2S1x441xl2-MA9tCUbTa-NnZ-hS6cWTXQO-0u-nx-KvLXaPTxMsyzUWRpwkPEnTCcWGIAlHJ0yiBVieCOlRRKIQRRwjpnXUmJlIy5JBVWgmq5qREuFayLbo697dufLTRBL-qtX7cvNSNcJkoyIVuKHynr66bx4PTGV9_G73RM9MGqPlrVe6v6ZJX9Ayhhacs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3046786356</pqid></control><display><type>article</type><title>NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Tahboush, Muhannad ; Hamdan, Adel ; Alzobi, Firas ; Husni, Moath ; Adawy, Mohammad</creator><creatorcontrib>Tahboush, Muhannad ; Hamdan, Adel ; Alzobi, Firas ; Husni, Moath ; Adawy, Mohammad</creatorcontrib><description>Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that will consume and disrupt victim resources to limit access to information services by flooding a target system with a high volume of traffic, thereby preventing the availability of the resources to the legitimate users. However, several solutions were developed to overcome the DoS attack, but still suffer from limitations such as requiring additional hardware, fail to provide a unified solution and incur a high delay of detection accuracy. Therefore, the network traffic detection approach (NTDA) is proposed to detect the DoS attack in a more optimistic manner based on various scenarios. First, the high network traffic measurements and mean deviation, second scenario relied on the transmission rate per second (TPS) of the sender. The proposed algorithm NTDA was simulated using MATLAB R2020a. The performance metrics taken into consideration are false negative rate, accuracy, detection rate and true positive rate. The simulation results show that the performance parameters of proposed NTDA algorithm outperformed in DoS detection the other well-known algorithms.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2024.0150370</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Accuracy ; Algorithms ; Availability ; Communications traffic ; Computer networks ; Computer science ; Cybersecurity ; Data encryption ; Denial of service attacks ; Education ; Information services ; Information systems ; Machine learning ; Performance measurement</subject><ispartof>International journal of advanced computer science &amp; applications, 2024, Vol.15 (3)</ispartof><rights>2024. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,4022,27921,27922,27923</link.rule.ids></links><search><creatorcontrib>Tahboush, Muhannad</creatorcontrib><creatorcontrib>Hamdan, Adel</creatorcontrib><creatorcontrib>Alzobi, Firas</creatorcontrib><creatorcontrib>Husni, Moath</creatorcontrib><creatorcontrib>Adawy, Mohammad</creatorcontrib><title>NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach</title><title>International journal of advanced computer science &amp; applications</title><description>Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that will consume and disrupt victim resources to limit access to information services by flooding a target system with a high volume of traffic, thereby preventing the availability of the resources to the legitimate users. However, several solutions were developed to overcome the DoS attack, but still suffer from limitations such as requiring additional hardware, fail to provide a unified solution and incur a high delay of detection accuracy. Therefore, the network traffic detection approach (NTDA) is proposed to detect the DoS attack in a more optimistic manner based on various scenarios. First, the high network traffic measurements and mean deviation, second scenario relied on the transmission rate per second (TPS) of the sender. The proposed algorithm NTDA was simulated using MATLAB R2020a. The performance metrics taken into consideration are false negative rate, accuracy, detection rate and true positive rate. The simulation results show that the performance parameters of proposed NTDA algorithm outperformed in DoS detection the other well-known algorithms.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Availability</subject><subject>Communications traffic</subject><subject>Computer networks</subject><subject>Computer science</subject><subject>Cybersecurity</subject><subject>Data encryption</subject><subject>Denial of service attacks</subject><subject>Education</subject><subject>Information services</subject><subject>Information systems</subject><subject>Machine learning</subject><subject>Performance measurement</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNotkMtOwzAQRS0EElXpH7CwxAYWKY5fcdiFlEdRKYsGiZ3lOuM2bWmK44L696SP2cxdnLkjHYSuY9KPuZDp_fAtyydZnxLK-yQWhCXkDHVoLGQkRELOD1lFMUm-LlGvaRakHZZSqVgHzcbFIHvAxRzwexWqmQlVvca1wwNYV2a1TxPwv5UFfDuoJ3c4303BmxCMXeJH00CJW34M4a_2S1x441xl2-MA9tCUbTa-NnZ-hS6cWTXQO-0u-nx-KvLXaPTxMsyzUWRpwkPEnTCcWGIAlHJ0yiBVieCOlRRKIQRRwjpnXUmJlIy5JBVWgmq5qREuFayLbo697dufLTRBL-qtX7cvNSNcJkoyIVuKHynr66bx4PTGV9_G73RM9MGqPlrVe6v6ZJX9Ayhhacs</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Tahboush, Muhannad</creator><creator>Hamdan, Adel</creator><creator>Alzobi, Firas</creator><creator>Husni, Moath</creator><creator>Adawy, Mohammad</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2024</creationdate><title>NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach</title><author>Tahboush, Muhannad ; Hamdan, Adel ; Alzobi, Firas ; Husni, Moath ; Adawy, Mohammad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c274t-4f5a40c0aee88f2b3e98754f3d2ed555085cffcfd206633f795c6e8b3eba5f953</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Availability</topic><topic>Communications traffic</topic><topic>Computer networks</topic><topic>Computer science</topic><topic>Cybersecurity</topic><topic>Data encryption</topic><topic>Denial of service attacks</topic><topic>Education</topic><topic>Information services</topic><topic>Information systems</topic><topic>Machine learning</topic><topic>Performance measurement</topic><toplevel>online_resources</toplevel><creatorcontrib>Tahboush, Muhannad</creatorcontrib><creatorcontrib>Hamdan, Adel</creatorcontrib><creatorcontrib>Alzobi, Firas</creatorcontrib><creatorcontrib>Husni, Moath</creatorcontrib><creatorcontrib>Adawy, Mohammad</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science &amp; applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Tahboush, Muhannad</au><au>Hamdan, Adel</au><au>Alzobi, Firas</au><au>Husni, Moath</au><au>Adawy, Mohammad</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach</atitle><jtitle>International journal of advanced computer science &amp; applications</jtitle><date>2024</date><risdate>2024</risdate><volume>15</volume><issue>3</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>Security is one of the important aspects which is used to protect data availability from being compromised. Denial of service (DoS) attack is a common type of cyberattack and becomes serious security threats to information systems and current computer networks. DoS aims to explicit attempts that will consume and disrupt victim resources to limit access to information services by flooding a target system with a high volume of traffic, thereby preventing the availability of the resources to the legitimate users. However, several solutions were developed to overcome the DoS attack, but still suffer from limitations such as requiring additional hardware, fail to provide a unified solution and incur a high delay of detection accuracy. Therefore, the network traffic detection approach (NTDA) is proposed to detect the DoS attack in a more optimistic manner based on various scenarios. First, the high network traffic measurements and mean deviation, second scenario relied on the transmission rate per second (TPS) of the sender. The proposed algorithm NTDA was simulated using MATLAB R2020a. The performance metrics taken into consideration are false negative rate, accuracy, detection rate and true positive rate. The simulation results show that the performance parameters of proposed NTDA algorithm outperformed in DoS detection the other well-known algorithms.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2024.0150370</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2158-107X
ispartof International journal of advanced computer science & applications, 2024, Vol.15 (3)
issn 2158-107X
2156-5570
language eng
recordid cdi_proquest_journals_3046786356
source EZB-FREE-00999 freely available EZB journals
subjects Accuracy
Algorithms
Availability
Communications traffic
Computer networks
Computer science
Cybersecurity
Data encryption
Denial of service attacks
Education
Information services
Information systems
Machine learning
Performance measurement
title NTDA: The Mitigation of Denial of Service (DoS) Cyberattack Based on Network Traffic Detection Approach
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T10%3A47%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=NTDA:%20The%20Mitigation%20of%20Denial%20of%20Service%20(DoS)%20Cyberattack%20Based%20on%20Network%20Traffic%20Detection%20Approach&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Tahboush,%20Muhannad&rft.date=2024&rft.volume=15&rft.issue=3&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2024.0150370&rft_dat=%3Cproquest_cross%3E3046786356%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3046786356&rft_id=info:pmid/&rfr_iscdi=true