Evans Owusu;Mohamed Rahouti;Senthil Kumar Jagatheesaperumal;Kaiqi Xiong;Yufeng Xin;Lu Lu;D. Frank Hsu
{"title":"在线网络 DoS/DDoS 检测:采样、变化点检测和机器学习方法","authors":"Evans Owusu;Mohamed Rahouti;Senthil Kumar Jagatheesaperumal;Kaiqi Xiong;Yufeng Xin;Lu Lu;D. Frank Hsu","doi":"10.1109/COMST.2024.3488580","DOIUrl":null,"url":null,"abstract":"Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks continue to pose significant threats to networked systems, causing disruptions that can lead to substantial financial losses. These attacks exploit vulnerabilities in network architecture to overwhelm systems, rendering them unavailable to legitimate users. The complexity and evolving nature of DoS/DDoS attacks necessitate advanced detection techniques that can operate effectively in real-time environments. This paper comprehensively examines current methodologies for online DoS/DDoS attack detection. We explore integrating sampling techniques and Change Point Detection (CPD) with Machine Learning (ML) approaches to enhance the detection and identification of DoS/DDoS activities in network traffic. We further assess the various sampling methods and their impact on the performance of online detection, considering both the efficiency and accuracy of these techniques in real-world applications. Lastly, we delve into the challenges of deploying these technologies in operational network environments, highlighting practical implications and future research directions. Our review synthesizes findings from recent studies, providing a critical analysis of existing strategies and proposing a unified framework that leverages CPD, ML, and targeted sampling to improve the resilience of networks against these disruptive cyber threats.","PeriodicalId":55029,"journal":{"name":"IEEE Communications Surveys and Tutorials","volume":"27 4","pages":"2543-2580"},"PeriodicalIF":34.4000,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Online Network DoS/DDoS Detection: Sampling, Change Point Detection, and Machine Learning Methods\",\"authors\":\"Evans Owusu;Mohamed Rahouti;Senthil Kumar Jagatheesaperumal;Kaiqi Xiong;Yufeng Xin;Lu Lu;D. Frank Hsu\",\"doi\":\"10.1109/COMST.2024.3488580\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks continue to pose significant threats to networked systems, causing disruptions that can lead to substantial financial losses. These attacks exploit vulnerabilities in network architecture to overwhelm systems, rendering them unavailable to legitimate users. The complexity and evolving nature of DoS/DDoS attacks necessitate advanced detection techniques that can operate effectively in real-time environments. This paper comprehensively examines current methodologies for online DoS/DDoS attack detection. We explore integrating sampling techniques and Change Point Detection (CPD) with Machine Learning (ML) approaches to enhance the detection and identification of DoS/DDoS activities in network traffic. We further assess the various sampling methods and their impact on the performance of online detection, considering both the efficiency and accuracy of these techniques in real-world applications. Lastly, we delve into the challenges of deploying these technologies in operational network environments, highlighting practical implications and future research directions. Our review synthesizes findings from recent studies, providing a critical analysis of existing strategies and proposing a unified framework that leverages CPD, ML, and targeted sampling to improve the resilience of networks against these disruptive cyber threats.\",\"PeriodicalId\":55029,\"journal\":{\"name\":\"IEEE Communications Surveys and Tutorials\",\"volume\":\"27 4\",\"pages\":\"2543-2580\"},\"PeriodicalIF\":34.4000,\"publicationDate\":\"2024-10-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Communications Surveys and Tutorials\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10738394/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Communications Surveys and Tutorials","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10738394/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Online Network DoS/DDoS Detection: Sampling, Change Point Detection, and Machine Learning Methods
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks continue to pose significant threats to networked systems, causing disruptions that can lead to substantial financial losses. These attacks exploit vulnerabilities in network architecture to overwhelm systems, rendering them unavailable to legitimate users. The complexity and evolving nature of DoS/DDoS attacks necessitate advanced detection techniques that can operate effectively in real-time environments. This paper comprehensively examines current methodologies for online DoS/DDoS attack detection. We explore integrating sampling techniques and Change Point Detection (CPD) with Machine Learning (ML) approaches to enhance the detection and identification of DoS/DDoS activities in network traffic. We further assess the various sampling methods and their impact on the performance of online detection, considering both the efficiency and accuracy of these techniques in real-world applications. Lastly, we delve into the challenges of deploying these technologies in operational network environments, highlighting practical implications and future research directions. Our review synthesizes findings from recent studies, providing a critical analysis of existing strategies and proposing a unified framework that leverages CPD, ML, and targeted sampling to improve the resilience of networks against these disruptive cyber threats.
期刊介绍:
IEEE Communications Surveys & Tutorials is an online journal published by the IEEE Communications Society for tutorials and surveys covering all aspects of the communications field. Telecommunications technology is progressing at a rapid pace, and the IEEE Communications Society is committed to providing researchers and other professionals the information and tools to stay abreast. IEEE Communications Surveys and Tutorials focuses on integrating and adding understanding to the existing literature on communications, putting results in context. Whether searching for in-depth information about a familiar area or an introduction into a new area, IEEE Communications Surveys & Tutorials aims to be the premier source of peer-reviewed, comprehensive tutorials and surveys, and pointers to further sources. IEEE Communications Surveys & Tutorials publishes only articles exclusively written for IEEE Communications Surveys & Tutorials and go through a rigorous review process before their publication in the quarterly issues.
A tutorial article in the IEEE Communications Surveys & Tutorials should be designed to help the reader to become familiar with and learn something specific about a chosen topic. In contrast, the term survey, as applied here, is defined to mean a survey of the literature. A survey article in IEEE Communications Surveys & Tutorials should provide a comprehensive review of developments in a selected area, covering its development from its inception to its current state and beyond, and illustrating its development through liberal citations from the literature. Both tutorials and surveys should be tutorial in nature and should be written in a style comprehensible to readers outside the specialty of the article.