A survey and meta-analysis of application-layer distributed denial-of-service attack

dc.authoridMisra, Sanjay/0000-0002-3556-9331
dc.authoridFernandez-Sanz, Luis/0000-0003-0778-0073
dc.authoridAbayomi-Alli, Olusola/0000-0003-2513-5318
dc.authoridAbayomi-Alli, Adebayo/0000-0002-3875-1606
dc.authorscopusid57200193777
dc.authorscopusid56962766700
dc.authorscopusid56811478400
dc.authorscopusid57218001210
dc.authorscopusid25630384100
dc.authorwosidMisra, Sanjay/K-2203-2014
dc.authorwosidFernandez, Luis/KHX-5442-2024
dc.authorwosidFernandez-Sanz, Luis/J-4895-2012
dc.authorwosidAbayomi-Alli, Olusola Oluwakemi/ABC-2838-2021
dc.contributor.authorMısra, Sanjay
dc.contributor.authorMisra, Sanjay
dc.contributor.authorAbayomi-Alli, Olusola
dc.contributor.authorAbayomi-Alli, Adebayo
dc.contributor.authorFernandez-Sanz, Luis
dc.contributor.otherComputer Engineering
dc.date.accessioned2024-07-05T15:39:55Z
dc.date.available2024-07-05T15:39:55Z
dc.date.issued2020
dc.departmentAtılım Universityen_US
dc.department-temp[Odusami, Modupe; Misra, Sanjay] Covenant Univ, Dept Elect & Informat Engn, Ota, Nigeria; [Misra, Sanjay] Atilim Univ, Dept Comp Engn, Ankara, Turkey; [Abayomi-Alli, Olusola] Kaunas Univ Technol, Dept Software Engn, Kaunas, Lithuania; [Abayomi-Alli, Adebayo] Fed Univ Agr, Dept Comp Sci, Abeokuta, Nigeria; [Fernandez-Sanz, Luis] Univ Alcala De Henares, Dept Comp Sci, Alcala De Henares, Spainen_US
dc.descriptionMisra, Sanjay/0000-0002-3556-9331; Fernandez-Sanz, Luis/0000-0003-0778-0073; Abayomi-Alli, Olusola/0000-0003-2513-5318; Abayomi-Alli, Adebayo/0000-0002-3875-1606en_US
dc.description.abstractBackground One of the significant attacks targeting the application layer is the distributed denial-of-service (DDoS) attack. It degrades the performance of the server by usurping its resources completely, thereby denying access to legitimate users and causing losses to businesses and organizations. Aim This study aims to investigate existing methodologies for application-layer DDoS (APDDoS) attack defense by using specific measures: detection methods/techniques, attack strategy, and feature exploration of existing APDDoS mechanisms. Methodology The review is carried out on a database search of relevant literature in IEEE Xplore, ACM, Science Direct, Springer, Wiley, and Google Search. The search dates to capture journals and conferences are from 2000 to 2019. Review papers that are not in English and not addressing the APDDoS attack are excluded. Three thousand seven hundred eighty-nine studies are identified and streamlined to a total of 75 studies. A quantifiable assessment is performed on the selected articles using six search procedures, namely: source, methods/technique, attack strategy, datasets/corpus, status, detection metric, and feature exploration. Results Based on existing methods/techniques for detection, the results show that machine learning gave the highest proportion with 36%. However, assessment based on attack strategy shows that several studies do not consider an attack form for deploying their solution. Result based on existing features for the APDDoS detection technique shows request stream during a user session and packet pattern gave the highest result with 47%. Unlike packet header information with 33%, request stream during absolute time interval with 12% and web user features 8%. Conclusion Research findings show that a large proportion of the solutions for APDDoS attack detection utilized features based on request stream during user session and packet pattern. The optimization of features will improve detection accuracy. Our study concludes that researchers need to exploit all attack strategies using deep learning algorithms, thus enhancing effective detection of APDDoS attack launch from different botnets.en_US
dc.identifier.citation8
dc.identifier.doi10.1002/dac.4603
dc.identifier.issn1074-5351
dc.identifier.issn1099-1131
dc.identifier.issue18en_US
dc.identifier.scopus2-s2.0-85091608271
dc.identifier.scopusqualityQ2
dc.identifier.urihttps://doi.org/10.1002/dac.4603
dc.identifier.urihttps://hdl.handle.net/20.500.14411/3257
dc.identifier.volume33en_US
dc.identifier.wosWOS:000573153300001
dc.identifier.wosqualityQ3
dc.language.isoenen_US
dc.publisherWileyen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectapplication-layer DDoSen_US
dc.subjectapplication-layer flooding attacken_US
dc.subjectDDoS attacken_US
dc.subjectextensive reviewen_US
dc.subjectnetwork securityen_US
dc.titleA survey and meta-analysis of application-layer distributed denial-of-service attacken_US
dc.typeArticleen_US
dspace.entity.typePublication
relation.isAuthorOfPublication53e88841-fdb7-484f-9e08-efa4e6d1a090
relation.isAuthorOfPublication.latestForDiscovery53e88841-fdb7-484f-9e08-efa4e6d1a090
relation.isOrgUnitOfPublicatione0809e2c-77a7-4f04-9cb0-4bccec9395fa
relation.isOrgUnitOfPublication.latestForDiscoverye0809e2c-77a7-4f04-9cb0-4bccec9395fa

Files

Collections