Distributed Denial of Service (DDoS) Attacks and D
Distributed Denial of Service (DDoS) Attacks and D
Volume 18 • Issue 1
Distributed Denial-of-Service
(DDoS) Attacks and Defense
Mechanisms in Various Web-
Enabled Computing Platforms:
Issues, Challenges, and Future Research Directions
Anshuman Singh, Infosys Ltd., India*
Brij B. Gupta, Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan &
Research and Innovation Department, Skyline University College, Sharjah, UAE & Staffordshire University, Stoke-on-
Trent, UK
ABSTRACT
The demand for internet security has escalated in the last two decades because the rapid proliferation
in the number of internet users has presented attackers with new detrimental opportunities. One
of the simple yet powerful attacks lurking around the internet today is the distributed denial-
of-service (DDoS) attack. The expeditious surge in the collaborative environments, like IoT,
cloud computing, and SDN, have provided attackers with countless new avenues to benefit
from the distributed nature of DDoS attacks. The attackers protect their anonymity by infecting
distributed devices and utilizing them to create a bot army to constitute a large-scale attack.
Thus, the development of an effective as well as efficient DDoS defense mechanism becomes
an immediate goal. In this exposition, the authors present a DDoS threat analysis along with a
few novel ground-breaking defense mechanisms proposed by various researchers for numerous
domains. Further, they talk about popular performance metrics that evaluate the defense schemes.
In the end, they list prevalent DDoS attack tools and open challenges.
Keywords
Blockchain, Botnet, Cloud Computing, Deep Learning, Distributed Denial-of-Service Attacks, IoT, Machine
Learning, Web-Enabled Computing Platforms
1. INTRODUCTION
One of the most notorious attacks, raging around the Internet for more than 30 years, are the Denial-
of-Service (DoS) attacks. The DoS attacks intend to paralyze the target by disrupting the connectivity
between the target and its intended users and preventing users from network access. It exhausts sever
resources like bandwidth, memory capacity, CPU processing power, etc. and brings down the entire
1
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
network at last. This activity forces the target to shut down and reboot. The emergence of Distributed
DoS attack was witnessed in summer 1999 (Criscuolo, 2000). Afterwards, the majority of DoS attacks
occurring on the Internet are distributed in nature. The foremost purpose of these attacks is to crash
the victim server and make it unavailable. It results in the revenue losses as well as economic overhead
due to high cost of alleviating the attack and restoring the services.
The advent of new technologies has bestowed significantly greater number of resources, which
has imparted attackers with novel ways to carry out cyber-attacks that cause more damage with less
effort. A number of DDoS attacks are now carried out using well-organized and remotely controlled
botnets. These botnets consist of thousands of malware-infected zombie machines that simultaneously
send huge volumes of data to the target continuously, slowing down and eventually crashing the target
system. Employing a bot army to execute an attack protects the anonymity of attacker by eliminating
the chances of source IP address trace back. It also magnifies the severity of DDoS attack drastically.
In the recent years, a new landscape for DDoS attacks has emerged strikingly, called “DDoS as
a Service”. These are easily affordable and accessible DDoS-for-hire websites that have altogether
remodeled the extent and impact of DDoS attacks around the Internet. Nowadays, the hackers carry
out DDoS attacks for others for as little as $5 per hour. Since the release of Mirai botnet source code,
powering 100,000 bots, for executing DDoS attacks on dark web in October 2016 (Bing, 2016), the
demand as well as the supply of these attack services have rocketed radically. According to Corero
COO Dave Larson, “as many as 40% of all network layer attacks are believed to be caused by such
DDoS-for-hire botnets.” These attack services are advertised as “Stresser” or “Booster” services that
provide troubleshooting and testing services in order to identify the vulnerabilities in the user’s network.
The recent studies have revealed that nowadays, not just numbers, the harshness of DDoS attacks
has also aggravated. Cisco has predicted that the DDoS attacks are going to be even more frequent
in the coming years, rising from 7.9 million in 2018 to a colossal figure of over 15 million in 2023.
According to the Annual DDoS Threat Report for the year 2020 released by Nexusguard (2020), the
frequency of DDoS attacks took an enormous jump from Q1 2019 to Q1 2020 with a year-over-year
increase of 341.21\%. One of the largest ever recorded DDoS attack was carried out against the Amazon
Web Services (AWS) in February 2020 with an attack volume that culminated to a breath-taking
2.3 Tbps (AWS, 2020). According to the Information Technology Intelligence Consulting (ITIC),
an hour of IT services downtime can cost the companies anywhere between $300,000 to $1,000,000
(ITIC, 2019). Given this figure, the amount of financial damage incurred is unimaginable when a
DDoS attack was brought down on thousands of Google’s IP addresses in October 2020. The attack
was perpetrated by three Chinese ISPs and lasted for six months, peaking at an astounding rate of
2.5 Tbps (Huntley, 2020).
The paper proposes a taxonomy of DDoS attacks followed by the detailed description of well-
known and frequently occurring attacks along with a detailed analysis of how DDoS attacks impact
various areas of the Internet. Despite being exhaustive, we do not claim that our proposed taxonomy
is absolute. There are many new attacks and defense mechanisms emerging every day. We have also
covered some published approaches available in research literature utilizing diverse technologies for
the detection and mitigation of DDoS attacks. The goal of this paper is to provide researchers a deep
insight that would trigger them to explore further and come up with diverse and innovative solutions
to address DDoS attacks. Apart from all the areas detailing multiple aspects of DDoS attacks, this
paper also encompasses DDoS attacks in multiple modern-day computing platforms, like IoT, Peer-
to-peer network, Blockchains, smart cities, etc. Table 1 presents a comparison of multiple related
works with our work in terms of various fields related to DDoS attacks that are surveyed and included
in the literature.
Following the Introduction, the rest of the paper is organized as follows: Section 2 lays out some
insights on the issue of DDoS attacks, why and how they are carried out along with a brief analysis
of the structure of botnets. Section 3 includes a taxonomy of various DDoS attacks prevalent on
the Internet today. Section 4 consists of a brief overview of multiple new web-enabled computing
2
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Platform-
Attack Traditional Integrated Performance Attack
Contributions Motivation Botnet specific
Taxonomy Defense Defense Metrics Tools
Attacks
Bhardwaj et
✓ ✓
al. (2016)
Kamboj et al.
✓ ✓
(2017)
Aamir et al.
✓ ✓ ✓ ✓
(2013)
Kumar et al.
✓ ✓
(2009)
Nagpal et al.
✓ ✓
(2015)
Zargar et al.
✓ ✓ ✓ ✓ ✓
(2013)
Peng et al.
✓ ✓ ✓
(2007)
Our work ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
platforms of the Internet that are affected by DDoS attacks. Section 5 presents a detailed analysis of
some published methods based on cutting-edge technologies such as machine learning, big data, and
blockchain, etc. Section 6 indexes major performance evaluation metrics that are utilized to assess
the quality, strength, and dependability of the solutions for DDoS. Section 7 investigates multiple
tools that are being employed to carry out DDoS attacks. Section 8 talks about some open research
opportunities in developing a distributed defense mechanism against DDoS attacks. Finally, section
9 concludes the paper.
2. BACKGROUND
3
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Year 2019 witnessed the rise of a global pandemic and consequently the businesses shifted
their workforce to a full-time work from home model where majority users depend on relatively less
secure infrastructure, paving the way for increased cyber-attacks (Bannister, 2020). According to
PurpleSec 2021 threat report, cybercrime has escalated by 600\% due to Covid-19 pandemic (Firch,
2021). Along with the previously targeted sectors, like education and government departments, the
coronavirus information websites also pose as potential targets to the attackers (Osborne, 2020). In
a report published by the American technology and security company, Neustar Inc., the number of
attacks mitigated by them have doubled from 2019 Q1 to 2020 Q1 (Leyden, 2020).
4
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
(Kaspersky, 2021) or due to ethical concerns like the attack on WikiLeaks (Schonfeld, 2010). The
material gains like financial or economic benefits are also a growing motivation behind DDoS attacks
against corporations. The business establishments too get tempted to launch DDoS attacks against
their market competitors (Ashford, 2017). Other significant motives behind DDoS attacks could be
political or strategic. Cyberwarfare is Usually conducted by a well-trained and organized group like
the military of a nation or a terrorist group, to adversely affect the enemy’s resources that may inflict
economic or physical loss on them (Hanna, 2021).
2.2.4 Botnets
One common way to execute DDoS attacks is by taking advantage of many compromised machines
called bots or zombies. These bots are connected to one another through the Internet, forming a group
called a botnet. Every botnet has a Botmaster that communicates with all the bots, commanding them
through a C&C server (Li et al., 2009) to carry out malicious activities. Figure 1 illustrates a DDoS
attack carried out by an attacker that utilize a botnet. These bots take orders from the botmaster and
perform specific tasks, may be repeatedly, to destroy the target network, system or web server.
2.2.4.1 Botnet Communications
The botnet communications are carried out by a Command and Control (C&C) server. The C&C
server is a computer that is controlled by the attacker to send commands to zombie systems to carry
out an attack. Several types of C&C mechanisms are proposed in the existing literature (Eslahi et al.,
2012; Hoque et al., 2015; Khattak et al., 2013) and the C&C architectures used for communication
are either centralized or decentralized:
• Centralized C&C servers: In this approach, the botmaster is connected to the C&C server
to command the bots and the bots are also connected to the server to receive commands and
updates. The centralized C&C servers are simple to manage on account of their single point of
failure, making the response fast.
• IRC botnet (Zargar et al., 2013): The IRC (Internet Relay Chat) is a text-based chat
system that allows computer users to communicate with multiple participants in a so-called
conversation channel. In a botnet, the bots connect to a specific channel in the IRC server
and wait for instructions. The IRC networks are relatively easy to construct. They use simple,
low bandwidth communication methods, making them widely used to host botnets. Also,
they are able to continually switch channels to avoid being taken down, making them an ideal
5
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
choice for coordinating DDoS attacks and spam campaigns (Eslahi et al. 2012). When an IRC
bot connects to a specific channel, it stays in the connected state, also known as the PUSH
approach (Gu et al., 2008a).
• HTTP botnet (Zargar et al., 2013): HTTP botnets use HTTP protocol for C&C communication
and to control the bots (Koo et al., 2011). HTTP botnet C&C server works just like a normal web
server and the bot works just like a normal web client. In a web-based botnet, bots connect to a
specific URL or IP address described by the botmaster that plays the role of the C&C server (Hsu
et al., 2017). Instead of the PUSH approach employed by the IRC botnet, the bots in the HTTP
based botnet make use of a PULL approach. The bots need not stay in the connected state after
connecting to the C&C server for the first time. Instead, the commands are posted on the specific
web server and the bots regularly update themselves by visiting those web servers to get new
commands at regular intervals, predefined by the botmaster (Eslahi et al. 2012; Gu et al., 2008b).
• Decentralized C&C servers: In this decentralized approach, the C&C botnet architecture is
based on the peer-to-peer (P2P) communication protocol. A P2P botnet offers high flexibility
to the network because every P2P node act as a bot as well as the C&C server. The P2P botnet
is relatively complex to manage as there is no central server to propagate the commands defined
by the botmaster. Each bot spreads the commands to its neighboring nodes until all the nodes
receive the commands issued by the botmaster (Eslahi et al. 2012). There is no single specific
channel or port for the bots to connect and thus P2P botnets are more difficult to detect, making
them highly resistant to termination. The PULL approach renders a special advantage that even
though some botnets are detected and taken down, the communication among the botmaster and
other P2P nodes could continue (Su et al., 2018).
With a diversified range of DDoS attacks present around the Internet, it becomes extremely difficult
to trace or detect these attacks owing to their distributed nature. The attackers usually spoof the IP
addresses i.e., create a false IP address that can be either the IP address of the target device or a
fake address, to disguise themselves and keep their identities hidden. This makes the identification
of a DDoS attack source even difficult. In order to deploy a successful mitigation scheme for DDoS
detection, it is extremely important to understand the characteristics and possible effects of DDoS
attacks. Numerous domain-specific classifications of DDoS attacks have been proposed by myriads
of researchers in past (Chen et al., 2004; Douligeris & Mitrokotsa, 2004; Li et al., 2009; Mirkovic
& Reiher, 2004; Peng et al., 2007; Riorey, 2012; Sharafaldin et al., 2019; Specht & Lee, 2003; Tariq
et al., 2006; Yue et al., 2009; Zargar et al., 2013; Zhijun et al., 2020). However, in this paper, we
6
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
present a classification of DDoS attacks based on the ways the attack is perpetrated and that covers
multiple domains. Figure 2 presents the proposed taxonomy of DDoS attacks. In the remainder of
the section, we analyze some of the most notorious DDoS attacks that are prominent in present-time.
7
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
8
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
9
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
10
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
11
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
cloud resources using a botnet. In such case, the cloud continuously allocates additional resources
as required and consequently, an exorbitant amount of bill is charged to the user.
12
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
system by utilizing their resources in discouraging the rational miners to stop mining. The attacker
only publishes the header of a generated block, implying a decrease in the expected profitability of
the rational miner. This causes the miner to stop mining and if a significant profitability decrease is
achieved, all the miners stop mining. At this point, the attacker can also stop mining with an advantage
of one block originally generated. It causes the blockchain to halt eventually.
Another type of DDoS attack is presented by Wu et al. (2020) that targets the mining pools. The
mining pools are a collection of miners that come together and pool their respective mining powers to
successfully mine a block and earn steady rewards. These miners are unable to find a block individually
owing to their limited resources. The miners in a mining pool share the earned reward proportional
to their respective mining power. Saad et al. (2019) discussed another form of DDoS attack on the
memory pool where an attacker can consume entire memory by issuing invalid transactions and
preventing further mining. Higher the size of mempool, higher is the mining fee paid by the user. By
flooding the mempool with invalidated transactions, the attacker tricks the user into paying more.
13
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
The inherent architecture of SDN provides it with the capability to detect and mitigate DDoS
attacks effectively in a cloud-based network, but this basic structure also renders SDN vulnerable to
DDoS attacks on itself. The separation of data plane and control presents attackers with new attack
planes (Dong et al., 2019). Figure 6 illustrates a DDoS attack scenario on an SDN architecture.
In one such attack scenario, the attacker floods the SDN network with fake requests. The SDN
switches hand over these requests, containing no valid return address or packet source IP, to the
controller for computation. These requests overwhelm the controller and renders the network
frozen. The controller waits for return address keeping the connection active for long time which
consequently leaving the network unreachable for legitimate users. The aim of attacker in such
attack cases is not to gather any confidential information but to deplete the resources of controller
by wasting time (Parashar et al., 2019).
14
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
15
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
The development of a strong DDoS defense mechanism is challenging because it should not only
detect the attack before it happens, but should also respond to an ongoing attack efficiently. There are
multiple challenges that are encountered to develop such defense mechanisms, like lack of detailed
information about the attack such as packet rate, packet size, duration of attack, quantum of damages,
etc. and the need for strong collaboration among networks. These challenges, if not dealt with, result
in a weak defense mechanism and thus allow DDoS attacks to lead disastrous consequences depending
on the attack domain and the severity of attack. To deal with such humongous and deleterious effects
of DDoS attacks, multiple defense mechanisms based on different research recommendations have
been proposed in the literature. Table 2 presents a comparison of multiple related works with our work
in terms of defense approaches, based on various modern technologies, included in the literature. In
this section, we outline some of the promising techniques and how they could be used for effective
DDoS detection and mitigation.
16
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Internet-
Traditional Cloud Machine Deep Big Data Blockchain
Contributions of- SDN
Environment Computing Learning Learning Analytics Technology
Things
Agrawal
& Tapaswi ✓
(2019)
Džaferović et
✓
al. (2019)
Asosheh &
Ramezani ✓
(2008)
Taj & Khalil
✓
(2018)
Saad et al.
✓
(2018)
Masdari and
✓
Jalali (2016)
Xu et al.
✓
(2019)
Yan and Yu
✓ ✓
(2015)
Eliyan & Di
✓ ✓
Pietro (2021)
Munshi et al.
✓
(2020)
Yuan et al.
✓
(2017)
Wen et al.
✓
(2021)
Douligeris &
Mitrokotsa ✓
(2004)
Aladaileh et al.
✓
(2020)
Specht & Lee
✓
(2003)
Farahmandian
✓
et al. (2013)
Li et al. (2018) ✓ ✓
Cheng et al.
✓
(2018)
Our work ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
agent systems, containing IDS which detects a malicious packet and alerts the server system about
the attack by embedding the packet in an ICMP Traceback (iTrace) message. Xiang & Zhou (2005)
proposed a packet marking mechanism that tags the incoming packets with a mark that contains the
source IP address at edge ingress routers and thus eliminating the possibility of mark-spoofing. The
17
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
mechanism also allocates a segment number to each mark that help in reconstructing the source IP
address of the packet.
18
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
servers for computation by finding a mitigation strategy that contains one allocation decision for each
request and maximizing the benefit. EDMGame uses an algorithm that, on completing, results in a
final mitigation strategy constituting all individual allocation decisions made in parallel.
Proposed Detection
Contributions Strength Weakness
Approach
Hong et al. (2017) Request Completion Timer Dynamic flow update Expensive SDN switches
Bandwidth and Throughput
Thomas & James (2017) Low performance overhead Vulnerable SDN controller
Monitoring
Sambandam et al. (2018) Entropy-based Detection Timely detection Vulnerable to slow attacks
Abdulkarem & Dawod
Ordered Flow Monitoring Early detection Vulnerable to slow attacks
(2020)
Bhushan & Gupta (2018) Flow Rate Probability Low computation overhead Expensive SDN switches
19
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
proposed solution utilizes Open vSwitches in an SDN architecture to detect abnormal traffic behavior
at the earliest possible stage. SDN controller extracts IP address of the biggest data source, sending
huge volumes of data to the server. The switches implement a packet filtering rule in order to drop
the malicious packets and let the normal traffic smoothly reach the server.
Bhushan & Gupta (2018) proposed a mechanism based on probability distribution of flow rule
hit count in the absence of DDoS attack and maintaining a flow lookup table for packet forwarding.
This is achieved using a counter field in the flow entry which gets incremented as the packet traverses
through the network. The count of DDoS attack packets is usually higher than normal traffic.
Probability distribution of incoming traffic flow rate is calculated when it surpasses the threshold
and compared with the probability distribution calculated with no attack. A difference between the
values, higher than a specific threshold value, is considered as a notification of potential DDoS attacks
and mitigation scheme is activated, dropping all requests arriving from the attacker.
Proposed Detection
Contributions Strength Weakness
Algorithm
Dong & Sarem (2019) K-Nearest Neighbours (NN) High detection rate Unknown dataset
Minimal implementation
Fouladi et al. (2016) Naïve Bayes Speed-accuracy Trade-off
complexity
Vishwakarma & Jain
IoT Honeypots Tackle unknown attacks High implementation cost
(2019)
Low accuracy for R2L
Lin et al. (2015) k-means Clustering and NN Less computational effort
attacks
High accuracy and less
Sudar et al. (2021) Decision Tree and SVM Expensive SDN switches
complexity
Multi-classifier Ensemble Implementation
Jia et al. (2017) Heuristic detection
Model complexity
High accuracy and low
Alsirhani et al. (2019) Fuzzy Logic System Inconsistent performance
latency
20
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
this approach is the implementation cost incurred. The classifier has to be implemented on each IoT
device of the network separately.
Lin et al. (2015) proposed an Intrusion Detection System (IDS) based on a novel approach,
called Cluster Center and Nearest Neighbors (CANN), by combining two well-known machine
learning algorithms. In CANN, two distances for each data point from training and testing data sets
are calculated. One, from data point to the cluster center and the other, from data point to the nearest
neighbors in the same cluster. The aggregate value of these two distances results in a new feature
value for training and test set which is utilized by the IDS for DDoS detection.
Sudar et al. (2021) presented a DDoS detection method utilizing machine learning algorithms
along with SDN-based architecture. The proposed method employed highly accurate and significantly
less complex machine learning algorithms, called Decision Tree (DT) and Support Vector Machine
(SVM) for the classification of incoming data traffic into normal or attack. After the model training
and feature extraction phases, SVM and DT classify the dataset as malicious if the flag value comes
out to be 1. In such cases, the Open vSwitches notify the SDN controller to update the flow table
and drop the attack traffic.
Jia et al. (2017) put forward an innovative detection mechanism by combining various component
classifiers based on Singular Value Decomposition (SVD) and Rotation Forest Method (RFM). It
involves a voting system that outputs the final classification mechanism for attack detection. Alsirhani
et al. (2019) utilized a similar approach by employing a Fuzzy Logic system to yield a dynamic
classification algorithm which is used to detect DDoS attack traffic from normal traffic. Only a single
classification algorithm, out of Naïve Bayes, Entropy-based Decision Tree, Gini Decision Tree, and
Random Forest algorithm, is used at any specific time for classification of incoming data traffic.
Table 6. Comparison of DDoS defences utilizing Deep Learning and Neural Networks
Proposed Detection
Contributions Strength Weakness
Approach
Li et al. (2018) RNN, LSTM, CNN and SDN High detection accuracy Expensive SDN switches
Yuan et al. (2017) RNN using Historical Data Minimal error rate Complex training
MLP, CNN, LSTM,
Roopak et al. (2019) Minimal supervision Resource-intensive
CNN+LSTM
Doriguzzi-Corin et al. Low computation
CNN Time-intensive training
(2020) overhead
CNN using Real Network Wrong Instantaneous attacks
Hussain et al. (2020) Lightweight
Data detection
21
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
the data packets are malicious in nature or not. If so, a statistics module examines the frequency of
all features and establishes a weight, according to which a flow entry is recorded in the flow table.
The OpenFlow switch deals with the attack packets as specified in the table.
Yuan et al. (2017) used another Deep Learning defense approach, called DeepDefense, that
creates a DDoS detection system using RNN and CNN. The detection system utilizes the historical
information of data packets to determine their legitimacy. For detecting and locating the repeated
patterns in the incoming data that represents a DDoS attack, this historical information is fed to the
RNN and attack is detected.
Roopak et al. (2019) came forward with an approach to detect cyber-attacks in IoT networks
using four different Deep Learning classification models: Multi-Layer Perceptron (MLP) model, CNN
model, Long-Short Term Memory (LSTM), and CNN+LSTM hybrid model. These approaches are
highly resource-intensive and unpractical to be deployed into real world.
Doriguzzi-Corin et al. (2020) proposed LUCID, a lightweight Deep Learning technique that
utilizes CNN to differentiate malicious traffic from safe traffic. After usual computation of CNN like
preprocessing, feature extraction, padding, and normalization, the output of CNN is passed through
a sigmoidal function, constraining the final output to 0 and 1. The data flow is considered safe if
output is below 0.5.
Another Deep Learning approach by Hussain et al. (2020) employs CNN for early detection of
DDoS attacks in a 5G cellular network. The model assembles already-available call detail record
(CDR) data containing three activity values: outgoing calls, outgoing SMS and Internet usage,
associated with every cell in the network. The CNN detects the legitimacy of new incoming traffic
based on training process over past CDR data.
Proposed Detection
Contributions Strength Weakness
Approach
Hameed & Ali (2016) HDFS, MapReduce Scalable Speed-time trade-off
Mizukoshi & Munetomo
Genetic Algorithm Scalable and adaptive Dataset dependent result
(2015)
Xu et al. (2019) Deep Forest Model High accuracy Slow real-time prediction
Detection from Historical Low computation No universal time
Cheng et al. (2018)
Data complexity interval
22
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
traffic is captured and examined by two different modules. The module containing Genetic Algorithm
develops a packet profile by detecting the features of incoming packets and stores the profile in the
DDoS filtering rule base module. The entropy-base module detects DDoS attack by analyzing the
frequencies of packet source IP addresses. In case of an attack, the DDoS filtering rule base module
is notified, which detects attack packet features and filters out packets arriving from malicious clients,
thus blocking a DDoS attack.
Xu et al. (2019) proposed a detection method for DRDoS using Deep Forest model in a Big
Data environment. The model utilizes statistical information of DRDoS attack flow. Based on this
information, a Host based DRDoS Threat Index (HDTI) is created. Using the HDTI, each IP address
in the network flow is classified into one of the four categories: normal, upstream, downstream, or
mixed upstream and downstream (MUD). The data packets coming from normal IP addresses are
allowed to pass. All the service requests coming from upstream identified IP addresses and all the
service responses sending to the downstream identified IP address are filtered out. If the IP address
is recognized as MUD, all the request and response packets for that IP are filtered.
Cheng et al. (2018) proposed a prediction approach where the model is trained based on normal
and attack traffic extracted from the network. Based on the training, a network flow abnormal index
value is created to detect the attack flow in the network. For a certain time, interval, a feature value,
called the PDRA, is calculated based on some parameters that includes number of new users, average
accessing rate of each new user, number of old users, etc. The PDRA is passed on to the classifier
which classifies the traffic into one of the three categories: normal, hotspot event, or DDoS attack.
Proposed Detection
Contributions Strength Weakness
Approach
Game-theory and Nash
Wu et al. (2020) Higher mining payoff Theoretical Analysis
Learning
Affects both legitimate/
Saad et al. (2018) Fee-based Approach Increased attack cost
illegitimate users
Reduced attack time Fast transactions cannot be
Saad et al. (2019) Age-based Approach
window verified
Ineffective against
Mirkin et al. (2020) Uncle Block Mechanism Expected profit not reduced
consensus blockchains
Abou El Houda et al. SDN, Ethereum Smart Flexible, secure and low Cost-intensive
(2019) Contracts effective implementation
23
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
In order to determine the nature of incoming data traffic, a standard set of indices are necessary
to evaluate the performance of DDoS detection and mitigation systems. Table 9 presents
a detailed comparison of datasets and performance metrics utilized by multiple defense
approaches proposed in multiple literatures over the years. Over the years, the following
characteristics are admitted by multiple researchers (Bhuyan et al., 2015; Mirkovic et al., 2006;
Mirkovic & Reiher, 2004; Mölsä, 2005; Zargar et al., 2013) as vital for a detection mechanism
to run effectively and efficiently:
1. Strength: The strength of a DDoS detection system is of paramount importance for achieving
effective results. The defense strength of a detection and mitigation system is defined by the
ability of the system in efficiently preventing an attack from taking place, detecting attacks in
their early phases, and mitigating an existing attack as quickly as possible. Strength of a system
24
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
is measured by multiple indexes that depend on the assumptions made by the detection system,
resulting in four possible results:
a. True Negative (TN) results are attained if all the normal data records are correctly classified
as safe traffic.
b. True Positive (TP) results are attained if all the attack data records are correctly classified
as malicious traffic.
c. False Positive (FP) results are attained if all the normal data records are incorrectly classified
as malicious traffic.
d. False Negative (FN) results are attained if all the attack data records are incorrectly classified
as safe traffic.
25
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Based on these outcomes, Stehman (1997) has introduced six primary indices for performance
evaluation:
• Accuracy is defined as the ratio of all the correct results of defense mechanism to total results
of the defense mechanism:
TP + TN
Accuracy = *100
TP + TN + FP + FN
• Precision is defined as the ratio of true positive results to all the results classified as positive by
the defense mechanism:
TP
Precision = *100
TP + FP
• Reliability is defined as the ratio of false positive results to all the results classified as positive
by the defense mechanism:
FP
Reliability = *100
FP + TP
• Sensitivity is defined as the ratio of true positive results to total actual positive results:
TP
Sensitivity = *100
TP + FN
• Specificity is defined as the ratio of true negative results to total actual negative results:
TN
Specificity = *100
TN + FP
• False Negative Rate is defined as the ratio of false negative results to all the results classified as
negative by the defense mechanism:
FN
False Negative Rate = *100
FN + TP
2. Scalable and Adaptive: The defense mechanism needs to be scalable as the number of users,
both legitimate and illegitimate, increases in order to successfully monitor the incoming traffic.
Apart from the users, if the attack traffic increases significantly in volume, the mechanism also
needs to adapt to such conditions. A non-scalable and non-adaptive defense mechanism may
present a potential attack avenue for the attackers by suffering from bottleneck of growing user
demands.
26
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
3. Quick: Detecting an attack in its early phase is another primary feature that, a defense mechanism
needs to have. The defense mechanism needs to validate the incoming data traffic as soon as
possible to reduce the response time and upgrade user experience.
4. Accuracy: Accuracy of a defense mechanism is defined by its ability to correctly differentiate
attack traffic from normal data traffic. Accuracy is measured by the amount of attack traffic
correctly recognized by the firewall i.e., true positive rate, and the amount of attack traffic it
passed on to the server i.e., false negative rate.
5. Service Response Time: The period between a service request is sent by the users to the server
and the response received by the them defines the service response time. An efficient defense
mechanism needs to monitor the traffic swiftly and reduce the response time as much as possible
to improve user experience.
6. Simple Implementation: For an effective defense mechanism, it is an important characteristic to
have a simple implementation. The implementation needs to be non-complex as well as realistic
i.e., the approach needs to be effective with large-scale, real-time network traffic instead of being
effective only in a simulated environment. Feasibility is a predominant metric while implementing
a defense mechanism.
7. Low Computation Overhead: While scanning the network for potential attacks, if the defense
mechanism suffers from high computational overheads, the user experience can be severely
degraded. As mentioned above, the occurrence of bottleneck at the firewall can introduce new
methods for attacking the target.
8. Proactive or Reactive: Another predominant characteristic for a defense mechanism, is
being proactive instead of reactive. Proactive approach is defined by a system’s ability to
detect DDoS attacks in their early stages, while reactive measures try to mitigate the attack
after it is successfully executed.
9. Cost: One of the most significant performance metrics, is the cost incurred while detecting and
mitigating an attack. For an effective defense system, this cost needs to be less than the amount
of losses caused by the DDoS attack. The cost of handling an attack is determined by multiple
factors, like bandwidth, available resources, computation, memory storage, etc.
In this section, we briefly discuss some of the well-known and commonly utilized tools for carrying
out DDoS attacks. Apart from the Slowloris and RUDY attack tools discussed in Section 3.4, myriads
of tools, with a diverse range of severity and impact, are available on the Internet today for executing
DDoS attacks against a target server (Behal & Kumar, 2017; Hoque et al., 2014). Table 10 presents
a detailed analysis and comparison of various functionalities provided by DDoS attack tools that
are included in this exposition. It is important to note that all DDoS tools are not harmful in nature.
Based on the reason behind their development, a DDoS tool can be classified into different categories,
like tools for attacking a specific target, tools for testing a network for potential vulnerabilities, or
defensive tools for detecting attacks by network monitoring:
1. LOIC: Low Orbit Ion Canon or LOIC (Praseed & Thilagam, 2018) is an open-source DDoS
attack tool which is highly prevalent, highly simplified and easily accessible on the Internet.
Once started, LOIC can be utilized to establish multiple connections with the target server and
eventually, carry out TCP, UDP, or HTTP attacks. The attackers do not require any prerequisite
technical knowledge to use LOIC for DDoS attack purposes as long as they know is the IP address/
URL of the website. The HIVEMIND mode of LOIC can be utilized to control remote systems
to execute an attack using a voluntary botnet. The only major drawback of LOIC is that it does
not hide the attackers’ IP address since the original purpose behind the development of LOIC
was stress testing one’s own server or website. After being utilized in perpetrating some major
27
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
cyber-attacks like Project Chanology in 2008 (Singel, 2008) and Operation Payback (Addley
& Halliday, 2017) by the notorious hacktivist group Anonymous, LOIC has gained notable
importance as a favorable tool for constituting DDoS attacks.
2. HOIC: High Orbit Ion Canon or HOIC is another open-source, easy to use DDoS attack tool
available legally as a stress testing tool. Developed by the hacktivist group Anonymous, HOIC
is the successor of the previously discussed LOIC and can have destructive consequences caused
by an attacker with limited or even no technical knowledge. HOIC is similar to its predecessor
in carrying out attack with minimum parameters and provides a traffic speed controller to
masquerade attack traffic as normal network traffic. Another similarity to LOIC is that HOIC
also does not hide the attack source address. Apart from all the similarities, unlike LOIC,
HOIC can only be utilized to carry out HTTP GET and POST attacks and not TCP and UDP
floods. Another major benefit of using HOIC is that it can attack up to 256 different domains
simultaneously allowing as few as 50 attackers to manually coordinate and perpetrate a serious
DDOS flooding attack against a single target. HOIC was first revealed as a DDoS attack tool
during Operation Megaupload (PCMag, 2010) against multiple websites including FBI and the
Justice Department of US carried out by Anonymous in 2012.
3. XOIC: XOIC is a DDoS attack tool that was created as a copy of LOIC. It has an easy-to-use
GUI which allows the attackers to carry out DDoS attacks on target IP addresses by specifying
the port number and the protocol. The XOIC can carry out IRC-based DDoS attacks using HTTP/
UDP/TCP/ICMP packets. It has three attack modes: test mode, basic DoS attack mode, and Dos
attack with HTTP/UDP/TCP/ICMP messages. It is an efficient attack tool for executing attacks
against small websites. One major drawback of XOIC is that the attack perpetrated by it is easily
detectable and therefore could be blocked.
4. Hping3: Hping3 is a TCL-based DDoS attack tool that could be used for various attacking as
well as testing purposes, like scanning the devices for open ports and vulnerabilities, testing the
efficacy of network firewall for multiple attack scenarios, etc. The hping3 provides the ability
to created malformed TCP/IP packets with spoofed IP addresses. The spoofed IP address could
either be a fake one or a legitimate IP address of any other device, including the target itself.
Apart from IP spoofing, hping3 also allows attacker to modify the attack traffic according to
size i.e., fragmentation of packets into arbitrary sizes. Once the destination address is registered,
the attacker can determine the desired attack volume and hping3 begins to strike the specified
IP address with manipulated attack traffic.
5. DDoSIM: As the name suggests, DDoS Simulator or DDoSIM (Praseed & Thilagam, 2018) is
another attack tool to carry out a protocol-based and application-based DDoS attack. DDoSIM
reveals the capacity of the target server or website to handle successful DDoS attacks. After that,
DDoSIM replicates multiple zombies with fake random IP addresses to secure the anonymity of
the attacker since the attack appears to be constituted by a botnet. Each of these simulated zombies
establishes a valid full TCP connection with the target server and floods it with attack traffic on
random network ports, once the connection is set up. DDoSIM can successfully perpetrate an
HTTP flooding attack with valid as well as invalid service requests along with SMTP and TCP
flooding attacks.
6. DAVOSET: The DDoS Attacks Via Other Sites Execution Tool, or DAVOSET, exploit the
vulnerabilities of various sites in order to execute DDoS attacks on the target site. The Abuse
of Functionality and XML External Entity (XXE) are the major vulnerabilities exploited by
this PERL-based command line attack tool. The Abuse of Functionality is an attack strategy
in which a website’s own aspects and attributes are abused to carry out attacks against itself
or other websites. The XXE vulnerability is a security flaw that enables attacker to corrupt the
XML data processing of a website. Instead of IP spoofing, DAVOSET provides attacker with the
ability to create a botnet by generating multiple zombies and command those zombies to carry
out HTTP-based attacks.
28
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
7. HULK: The HTTP Unbearable Load King (HULK) (Praseed & Thilagam, 2018) is an attack
tool for web servers, developed for research purposes. To emphasize how straightforward, it is
to attack a web server and eventually crash it, HULK was introduced as a proof-of-concept. It
is a free, easy to use tool that can generate huge volumes of data traffic towards a web server to
paralyze it. The HULK triggers massive floods of HTTP GET requests that are hard to detect
and directly hit the resource pool of the server, bypassing the traditional defense mechanisms.
A feature of HULK that makes it a strong tool for DDoS attacks is the generation of dynamic
requests. For each request, the HULK generates unique headers with invalid and counterfeit
fields. Subsequently, it attaches a random user-agent to the request, from a list of user-agents,
which hides the request from conventional caching mechanisms. Apart from this, the HULK
also comes with a safety option to abort the process and terminate the attack in the middle.
8. Tor’s Hammer: Tor’s Hammer is an application-layer DDoS attack tool that perpetrates slow post
attacks. It is a Python-based attack tool that spoofs the source IP address using the Tor network.
The attack traffic easily bypasses the server defense mechanisms because it is confused with
legitimate traffic owing to the normal rate and low volume. Therefore, it keeps on consuming
the server resources and eventually brings down the target. One major drawback of using this
tool is that the user interface is not straightforward. The users can launch effective DDoS attacks
efficiently only if they possess a little knowledge about this tool.
9. GoldenEye: The GoldenEye is a simple yet effective open-source tool for DDoS attacks on web
servers. It creates a single zombie that generates a high attack volume using multiple legitimate
HTTP requests to the target server. It establishes a valid TCP connection with the server and
employs the HTTP KeepAlive messages to prevent server from timing out. It exhausts the
resources of the server by consuming all the available HTTP/S sockets by utilizing Cache-Control
options in order to disallow socket connections from busting. The attack traffic generated by this
Python-based DDoS attack tool is highly randomized by incorporating both HTTP GET and
POST requests. This magnifies the complexity of attack detection.
10. PyLoris: PyLoris (Praseed & Thilagam, 2018) is a platform independent tool for testing the
network vulnerabilities by directly executing a DDoS attack on the service. Unlike other tools
setting up TCP connections, PyLoris carries out an attack by utilizing SSL connections and
SOCKS proxies. It has an easy-to-use interface where the attack can configure the multiple attack
parameters like number of connections, speed of the attack traffic, proxy type, and address of the
host etc. Once configured, PyLoris opens multiple connections and keeps them open for as long
as server timeout permits, eventually creating a Denial-of-Service condition. PyLoris provides
a total of 500 simultaneous connections in the form of 50 threads with 10 connections limit on
every thread. Multiple protocols like HTTP, FTP, SMTP, IMAP, and Telnet can be attacked by
PyLoris. One major limitation of using PyLoris is the Python dependencies that renders the
installation process difficult for users.
In this paper, we have presented a broad classification of DDoS attacks and their consequences
on various environments along with a brief analysis of multiple defense approaches proposed by
researchers. In this section, we discuss some of the major features of these environments that hinders
their proper utilization in defensive strategies. We also present some open opportunities for further
research and various short-term and long-term goals that we expect to see from researchers and
service providers in the future:
1. Accurate detection of an attack is inversely proportional to successful mitigation of the attack i.e.,
the most accurate detection of an attack can be done when it has already reached its destination
target but the best mitigation strategy is the one that stops the attack at its source. For an effective
29
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Type of Botnet IP
Attack Tool Year Type of Attack Traffic Language
Interface Formation Spoofing
LOIC 2008 GUI TCP, UDP, HTTP, ICMP Yes No C-sharp
HOIC 2012 GUI HTTP Yes No Basic
XOIC 2010 GUI TCP, UDP, ICMP Yes No C-sharp
Hping3 2005 CLI TCP, UDP, ICMP No Yes TCL
DDoSIM 2009 CLI TCP, UDP, HTTP, SMTP Yes No C++
DAVOSET 2010 CLI HTTP Yes No Perl
HULK 2012 CLI HTTP No No Python
Tor’s
2009 CLI HTTP Yes No Python
Hammer
GoldenEye 2012 CLI HTTP No No Python
TCP, UDP, HTTP, SMTP, IMAP,
PyLoris 2010 CLI Yes Yes Python
FTP, Telnet
and efficient DDoS defense mechanism, the attack needs to be detected as close to its source
as possible so that it can abuse as fewer network resources as possible on its way. Cooperation
among network nodes is extremely crucial for this to happen.
2. Attackers’ incentives also need to be kept in calculations while developing defense strategies.
Establishment of stringent laws against cyber-criminals and well-defined cyber-insurance policies
can lead to a DDoS defense mechanism incorporating attackers’ motivation behind perpetrating
cyber-attacks.
3. The extent of collaborative environments like cloud computing (Bhushan & Gupta, 2018; Joshi
et al., 2012; Mishra et al., 2021; Xiao & Xiao, 2012; Yan & Yu, 2015; Yan et al., 2015) and
IoT (Chui et al., 2019; Cvitić et al., 2021; Evans, 2011; Kolias et al., 2017; Marr, 2021; Munshi
et al., 2020; Sambandam et al., 2018; Zargar et al., 2011) present more and more new avenues
for attackers to exploit, like the IoT botnets that include dedicated systems as well as mobile
devices, simple home appliances, and IoV-based automotive, etc. DDoS-for-hire services have
also increased due to such simple targets since these devices lack significantly in terms of
security. This amplifies the requirement of more effective and more rugged security protocols
that are easy to implement in these devices. On account of such vulnerabilities in these fields,
several researches have emerged with novel techniques, like authentication using RFID tags and
detection based on relevant packet metadata (Tewari & Gupta, 2020; Vishnoi et al., 2021).
4. The SDN has many characteristics that assist the researchers in developing some strong DDoS
detection mechanisms (Abdulkarem & Dawod, 2020; Dharma et al., 2015; Hong et al., 2017;
Li et al., 2018; Mishra et al., 2021; Mladenov, 2019; Sun et al., 2019; Thomas & James, 2017;
Yan and Yu, 2015), like dynamic updates for flow rule, centralized control of the entire network,
software-based analysis, separating data plane from control plane, etc. However, the above
characteristics also render SDN a potential target for several types of overloading DDoS attacks
(Bhushan & Gupta, 2019), e.g., an attack against the centralized SDN controller can crash the
entire SDN-based cloud. Even though some studies have been conducted in this area (Bessani,
2011; Garcia et al., 2011; Giacomoni, 2013; Lee et al., 2014; Wei et al., 2014; Yu et al., 2010),
the method of inducting SDN controller in defense mechanism needs further investigation in
order to effectively mitigate DDoS attacks.
30
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
31
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
adversarial attacks on ResNet image recognition deep learning model. Though the results from
deep learning models are relatively much better than those from corresponding machine learning
models, the remarkably large amount of data required to train a model and the black box nature
of neural networks increase both, the computation cost and complexity of the model, rendering
it difficult to be implemented by less skilled service providers.
8. CONCLUSION
The raging threat posed by a continual occurrence of DDoS attacks resulting in immense amount
of damage and depreciation has burgeoned the need for some reliable and resolute defenses. The
development of a unified approach towards tackling such a notorious enemy is of utmost importance.
With this goal in mind, this paper aims toward providing helpful insights about DDoS attacks and
their consequences in various areas of the Internet, ranging from traditional networks to blockchain-
based decentralized environment. In this paper, we have talked about numerous detection schemes
proposed by researchers in various domains till date. While these defense approaches yield respectable
outcomes, plenty is yet to be explored in order to meet the open challenges faced by these domains.
We hope that the work presented here provides a ground-level understanding of the issue that is
desired to develop elegant DDoS defense systems.
FUNDING INFORMATION
The publisher has waived the Open Access Publication fee for this article.
32
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
REFERENCES
33
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Bannister, A. (2020, July 14). Remote working during coronavirus pandemic leads to rise in cyber-attacks, say
security professionals. The Daily Swig | Cybersecurity News and Views. https://portswigger.net/daily-swig/
remote-working-during-coronavirus-pandemic-leads-to-rise-in-cyber-attacks-say-security-professionals
Behal, S., & Kumar, K. (2017). Characterization and Comparison of DDoS Attack Tools and Traffic Generators:
A Review. International Journal of Network Security, 19(3), 383–393.
Bessani, A. N. (2011, June). From byzantine fault tolerance to intrusion tolerance (a position paper). In 2011
IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W) (pp. 15-
18). IEEE.
Bhardwaj, A., Subrahmanyam, G. V. B., Avasthi, V., Sastry, H., & Goundar, S. (2016, October). DDoS
attacks, new DDoS taxonomy and mitigation solutions—a survey. In 2016 International Conference on Signal
Processing, Communication, Power and Embedded System (SCOPES) (pp. 793-798). IEEE. doi:10.1109/
SCOPES.2016.7955549
Bhushan, K., & Gupta, B. B. (2018, February). Detecting DDoS attack using software defined network (SDN)
in cloud computing environment. In 2018 5th international conference on signal processing and integrated
networks (SPIN) (pp. 872-877). IEEE.
Bhushan, K., & Gupta, B. B. (2019). Distributed denial of service (DDoS) attack mitigation in software defined
network (SDN)-based cloud computing environment. Journal of Ambient Intelligence and Humanized Computing,
10(5), 1985–1997. doi:10.1007/s12652-018-0800-9
Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2015). An empirical evaluation of information metrics
for low-rate and high-rate DDoS attack detection. Pattern Recognition Letters, 51, 1–7. doi:10.1016/j.
patrec.2014.07.019
Bing, C. (2016, October 27). You can now buy a Mirai-powered botnet on the dark web. CyberScoop. https://
www.cyberscoop.com/mirai-botnet-for-sale-ddos-dark-web/
Chae, C. J., Lee, S. H., Lee, J. S., & Lee, J. K. (2007, October). A study of defense ddos attacks using ip traceback.
In The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007) (pp. 402-408). IEEE.
doi:10.1109/IPC.2007.89
Chen, L. C., Longstaff, T. A., & Carley, K. M. (2004). Characterization of defense mechanisms against distributed
denial of service attacks. Computers & Security, 23(8), 665–678. doi:10.1016/j.cose.2004.06.008
Chen, W., Xiao, S., Liu, L., Jiang, X., & Tang, Z. (2020). A DDoS attacks traceback scheme for SDN-based
smart city. Computers & Electrical Engineering, 81, 106503. doi:10.1016/j.compeleceng.2019.106503
Chen, Y., Abraham, A., & Yang, B. (2007). Hybrid flexible neural‐tree‐based intrusion detection systems.
International Journal of Intelligent Systems, 22(4), 337–352. doi:10.1002/int.20203
Cheng, J., Xu, R., Tang, X., Sheng, V. S., & Cai, C. (2018). An abnormal network flow feature sequence prediction
approach for DDoS attacks detection in big data environment. Comput. Mater. Continua, 55(1), 95–119.
Chhabra, M., Gupta, B., & Almomani, A. (2013). A novel solution to handle DDOS attack in MANET. Journal
of Information Security, 4(3), 165–179. doi:10.4236/jis.2013.43019
Chui, M., Löffler, M., & Roberts, R. (2019, February 13). The Internet of Things. McKinsey & Company. https://
www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/the-internet-of-things
Criscuolo, P. J. (2000). Distributed denial of service: Trin00, tribe flood network, tribe flood network 2000, and
stacheldraht ciac-2319. California Univ Livermore Radiation Lab. doi:10.2172/792253
Cvitić, I., Peraković, D., Gupta, B., & Choo, K. K. R. (2021). Boosting-based DDoS Detection in Internet of
Things Systems. IEEE Internet of Things Journal.
Dahiya, A., & Gupta, B. B. (2019). A PBNM and economic incentive-based defensive mechanism against DDoS
attacks. Enterprise Information Systems, 1–21. doi:10.1080/17517575.2019.1700553
Dahiya, A., & Gupta, B. B. (2021a). A QoS ensuring two-layered multi-attribute auction mechanism to mitigate
DDoS attack. Mobile Networks and Applications, 26(3), 1043–1058. doi:10.1007/s11036-020-01665-6
34
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Dahiya, A., & Gupta, B. B. (2021b). A reputation score policy and Bayesian game theory based incentivized
mechanism for DDoS attacks mitigation and cyber defense. Future Generation Computer Systems, 117, 193–204.
doi:10.1016/j.future.2020.11.027
Dantas Silva, F. S., Silva, E., Neto, E. P., Lemos, M., Venancio Neto, A. J., & Esposito, F. (2020). A taxonomy
of DDoS attack mitigation approaches featured by SDN technologies in IoT scenarios. Sensors (Basel), 20(11),
3078. doi:10.3390/s20113078 PMID:32485943
Dharma, N. G., Muthohar, M. F., Prayuda, J. A., Priagung, K., & Choi, D. (2015, August). Time-based DDoS
detection and mitigation for SDN controller. In 2015 17th Asia-Pacific Network Operations and Management
Symposium (APNOMS) (pp. 550-553). IEEE. doi:10.1109/APNOMS.2015.7275389
Dong, S., & Sarem, M. (2019). DDoS attack detection method based on improved KNN with the degree of
DDoS attack in software-defined networks. IEEE Access: Practical Innovations, Open Solutions, 8, 5039–5048.
doi:10.1109/ACCESS.2019.2963077
Dong, S., Abbas, K., & Jain, R. (2019). A survey on distributed denial of service (DDoS) attacks in SDN
and cloud computing environments. IEEE Access: Practical Innovations, Open Solutions, 7, 80813–80828.
doi:10.1109/ACCESS.2019.2922196
Doriguzzi-Corin, R., Millar, S., Scott-Hayward, S., Martinez-del-Rincon, J., & Siracusa, D. (2020). LUCID: A
practical, lightweight deep learning solution for DDoS attack detection. IEEE eTransactions on Network and
Service Management, 17(2), 876–889. doi:10.1109/TNSM.2020.2971776
Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defense mechanisms: Classification and state-of-
the-art. Computer Networks, 44(5), 643–666. doi:10.1016/j.comnet.2003.10.003
Džaferović, E., Sokol, A., Abd Almisreb, A., & Norzeli, S. M. (2019). DoS and DDoS vulnerability of IoT: A
review. Sustainable Engineering and Innovation, 1(1), 43–48. doi:10.37868/sei.v1i1.36
Eesa, A. S., Orman, Z., & Brifcani, A. M. A. (2015). A novel feature-selection approach based on the cuttlefish
optimization algorithm for intrusion detection systems. Expert Systems with Applications, 42(5), 2670–2679.
doi:10.1016/j.eswa.2014.11.009
Eliyan, L. F., & Di Pietro, R. (2021). DoS and DDoS attacks in Software Defined Networks: A survey of
existing solutions and research challenges. Future Generation Computer Systems, 122, 149–171. doi:10.1016/j.
future.2021.03.011
Eslahi, M., Salleh, R., & Anuar, N. B. (2012, November). Bots and botnets: An overview of characteristics,
detection and challenges. In 2012 IEEE International Conference on Control System, Computing and Engineering
(pp. 349-354). IEEE. doi:10.1109/ICCSCE.2012.6487169
Evans, D. (2011, April). The Internet of Things: How the Next Evolution of the Internet Is Changing Everything?
https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
Farahmandian, S., Zamani, M., Akbarabadi, A., Moghimi, Y., Mirhosseini Zadeh, S. M., & Farahmandian, S.
(2013). A survey on methods to defend against DDoS attack in cloud computing. System, 6(22), 26.
Feng, W., Zhang, Q., Hu, G., & Huang, J. X. (2014). Mining network data for intrusion detection through
combining SVMs with ant colony networks. Future Generation Computer Systems, 37, 127–140. doi:10.1016/j.
future.2013.06.027
Fernández-Caramés, T. M., & Fraga-Lamas, P. (2018). A Review on the Use of Blockchain for the Internet of Things.
IEEE Access: Practical Innovations, Open Solutions, 6, 32979–33001. doi:10.1109/ACCESS.2018.2842685
Firch, J. (2021, August 6). 2021 Cyber Security Statistics: The Ultimate List of Stats, Data & Trends. https://
purplesec.us/resources/cyber-security-statistics
Fouladi, R. F., Kayatas, C. E., & Anarim, E. (2016, June). Frequency based DDoS attack detection approach
using naive Bayes classification. In 2016 39th International Conference on Telecommunications and Signal
Processing (TSP) (pp. 104-107). IEEE. doi:10.1109/TSP.2016.7760838
Garcia, M., Bessani, A., Gashi, I., Neves, N., & Obelheiro, R. (2011, June). OS diversity for intrusion tolerance:
Myth or reality? In 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)
(pp. 383-394). IEEE.
35
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Giacomoni, J. (2013). Extending SDN architectures with F5’s L4-7 application and gateway services. F5
Networks, Inc.
Gu, G., Perdisci, R., Zhang, J., & Lee, W. (2008a). Botminer: Clustering analysis of network traffic for protocol-
and structure-independent botnet detection. Academic Press.
Gu, G., Zhang, J., & Lee, W. (2008b). BotSniffer: Detecting botnet command and control channels in network
traffic. Academic Press.
Gupta, A., Verma, T., Bali, S., & Kaul, S. (2013, January). Detecting MS initiated signaling DDoS attacks in
3G/4G wireless networks. In 2013 Fifth International Conference on Communication Systems and Networks
(COMSNETS) (pp. 1-60). IEEE. doi:10.1109/COMSNETS.2013.6465568
Hameed, S., & Ali, U. (2016, April). Efficacy of live DDoS detection with Hadoop. In NOMS 2016-2016 IEEE/
IFIP Network Operations and Management Symposium (pp. 488-494). IEEE. doi:10.1109/NOMS.2016.7502848
Hanna, A. (2021, July 29). The Invisible U.S.-Iran Cyber War. The Iran Primer. https://iranprimer.usip.org/
blog/2019/oct/25/invisible-us-iran-cyber-war
Hansen, J. V., Lowry, P. B., Meservy, R. D., & McDonald, D. M. (2007). Genetic programming for prevention of
cyberterrorism through dynamic and evolving intrusion detection. Decision Support Systems, 43(4), 1362–1374.
doi:10.1016/j.dss.2006.04.004
Haworth, J. (2020, August 26). New Zealand stock exchange hit by series of DDoS attacks. The Daily Swig |
Cybersecurity News and Views. https://portswigger.net/daily-swig/new-zealand-stock-exchange-hit-by-series-
of-DDoS-attacks
Haworth, J. (2021a, February 16). UK cryptocurrency exchange EXMO knocked offline by ‘massive’ DDoS
attack. The Daily Swig | Cybersecurity News and Views. https://portswigger.net/daily-swig/uk-cryptocurrency-
exchange-exmo-knocked-offline-by-massive-ddos-attack
Haworth, J. (2021b, April 21). Telecoms industry facing increased DDoS attacks, report warns. The Daily Swig
| Cybersecurity News and Views. https://portswigger.net/daily-swig/telecoms-industry-facing-increased-DDoS-
attacks-report-warns
He, L., Yan, Z., & Atiquzzaman, M. (2018). LTE/LTE-A network security data collection and analysis for security
measurement: A survey. IEEE Access: Practical Innovations, Open Solutions, 6, 4220–4242. doi:10.1109/
ACCESS.2018.2792534
He, Q., Wang, C., Cui, G., Li, B., Zhou, R., Zhou, Q., Xiang, Y., Jin, H., & Yang, Y. (2021). A game-theoretical
approach for mitigatingedge ddos attack. IEEE Transactions on Dependable and Secure Computing, 1.
doi:10.1109/TDSC.2021.3055559
Hinton, G. E. (2009). Deep belief networks. Scholarpedia, 4(5), 5947. doi:10.4249/scholarpedia.5947
Hong, K., Kim, Y., Choi, H., & Park, J. (2017). SDN-assisted slow HTTP DDoS attack defense method. IEEE
Communications Letters, 22(4), 688–691. doi:10.1109/LCOMM.2017.2766636
Hoque, N., Bhattacharyya, D. K., & Kalita, J. K. (2015). Botnet in DDoS attacks: Trends and challenges. IEEE
Communications Surveys and Tutorials, 17(4), 2242–2270. doi:10.1109/COMST.2015.2457491
Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network attacks:
Taxonomy, tools and systems. Journal of Network and Computer Applications, 40, 307–324. doi:10.1016/j.
jnca.2013.08.001
Hoque, N., Kashyap, H., & Bhattacharyya, D. K. (2017). Real-time DDoS attack detection using FPGA. Computer
Communications, 110, 48–58. doi:10.1016/j.comcom.2017.05.015
Hsu, F. H., Ou, C. W., Hwang, Y. L., Chang, Y. C., & Lin, P. C. (2017). Detecting web-based botnets using bot
communication traffic features. Security and Communication Networks, 2017, 2017. doi:10.1155/2017/5960307
Hu, W., Hu, W., & Maybank, S. (2008). Adaboost-based algorithm for network intrusion detection. IEEE
Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 38(2), 577–583. doi:10.1109/
TSMCB.2007.914695 PMID:18348941
36
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Humayed, A., Lin, J., Li, F., & Luo, B. (2017). Cyber-physical systems security—A survey. IEEE Internet of
Things Journal, 4(6), 1802–1831. doi:10.1109/JIOT.2017.2703172
Huntley, S. (2020, October 16). How we’re tackling evolving online threats. Google. https://blog.google/threat-
analysis-group/how-were-tackling-evolving-online-threats/
Hussain, B., Du, Q., Sun, B., & Han, Z. (2020). Deep learning-based DDoS-attack detection for cyber–
physical system over 5G network. IEEE Transactions on Industrial Informatics, 17(2), 860–870. doi:10.1109/
TII.2020.2974520
IC3. (2020). Internet crime report 2020. Internet Crime Complaint Center. https://www.ic3.gov/Media/PDF/
AnnualReport/2020_IC3Report.pdf
IDG. (2020, July 20). 2020 Cloud computing study. International Data Group. https://www.idg.com/tools-for-
marketers/2020-cloud-computing-study/
ITIC. (2019, May 16). Hourly Downtime Costs Rise: 86% of Firms Say One Hour of Downtime Costs $300,000+;
34% of Companies Say One Hour of Downtime Tops $1Million. Information Technology Intelligence Consulting.
https://itic-corp.com/blog/2019/05/hourly-downtime-costs-rise-86-of-firms-say-one-hour-of-downtime-costs-
300000-34-of-companies-say-one-hour-of-downtime-tops-1million/
Jia, B., Huang, X., Liu, R., & Ma, Y. (2017). A DDoS attack detection method based on hybrid heterogeneous
multiclassifier ensemble learning. Journal of Electrical and Computer Engineering, 2017, 2017.
doi:10.1155/2017/4975343
Joshi, B., Vijayan, A. S., & Joshi, B. K. (2012, January). Securing cloud computing environment against DDoS
attacks. In 2012 International Conference on Computer Communication and Informatics (pp. 1-5). IEEE.
doi:10.1109/ICCCI.2012.6158817
Juniper. (2020, March 31). IoT connections to reach 83 billion by 2024, driven by maturing industrial use cases.
Juniper Research. https://www.juniperresearch.com/press/iot-connections-to-reach-83-bn-by-2024
Kamboj, P., Trivedi, M. C., Yadav, V. K., & Singh, V. K. (2017, October). Detection techniques of DDoS
attacks: A survey. In 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer
and Electronics (UPCON) (pp. 675-679). IEEE. doi:10.1109/UPCON.2017.8251130
Karame, G. (2016, October). On the security and scalability of bitcoin’s blockchain. In Proceedings of the 2016 ACM
SIGSAC conference on computer and communications security (pp. 1861-1862). doi:10.1145/2976749.2976756
Kaspersky. (2021, May 26). IT threats during the 2016 Olympic Games in Brazil. https://www.kaspersky.com/
about/press-releases/2016_it-threats-during-the-2016-olympic-games-in-brazil
Khan, L., Awad, M., & Thuraisingham, B. (2007). A new intrusion detection system using support vector
machines and hierarchical clustering. The VLDB Journal, 16(4), 507–521. doi:10.1007/s00778-006-0002-5
Khattak, S., Ramay, N. R., Khan, K. R., Syed, A. A., & Khayam, S. A. (2013). A taxonomy of botnet
behavior, detection, and defense. IEEE Communications Surveys and Tutorials, 16(2), 898–924. doi:10.1109/
SURV.2013.091213.00134
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer,
50(7), 80–84. doi:10.1109/MC.2017.201
Koo, T. M., Chang, H. C., & Wei, G. Q. (2011, June). Construction P2P firewall HTTP-Botnet defense
mechanism. In 2011 IEEE International Conference on Computer Science and Automation Engineering (Vol.
1, pp. 33-39). IEEE.
Kumar, R., Arun, P., & Selvakumar, S. (2009, March). Distributed denial-of-service (ddos) threat in collaborative
environment-a survey on ddos attack tools and traceback mechanisms. In 2009 IEEE International Advance
Computing Conference (pp. 1275-1280). IEEE.
Lan, L., & Jun, L. (2013, December). Some special issues of network security monitoring on big data
environments. In 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing
(pp. 10-15). IEEE. doi:10.1109/DASC.2013.30
37
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Lee, J., Uddin, M., Tourrilhes, J., Sen, S., Banerjee, S., Arndt, M., . . . Nadeem, T. (2014, June). mesdn: Mobile
extension of sdn. In Proceedings of the fifth international workshop on Mobile cloud computing & services
(pp. 7-14). Academic Press.
Lee, K., James, J. I., Ejeta, T. G., & Kim, H. J. (2016). Electronic voting service using block-chain. Journal of
Digital Forensics. Security and Law, 11(2), 8.
Leyden, J. (2020, June 18). DDoS attacks continue to surge during coronavirus pandemic. The Daily Swig
| Cybersecurity News and Views. https://portswigger.net/daily-swig/ddos-attacks-continue-to-surge-during-
coronavirus-pandemic
Li, C., Jiang, W., & Zou, X. (2009, December). Botnet: Survey and case study. In 2009 Fourth International
Conference on Innovative Computing, Information and Control (ICICIC) (pp. 1184-1187). IEEE. doi:10.1109/
ICICIC.2009.127
Li, C., Wu, Y., Yuan, X., Sun, Z., Wang, W., Li, X., & Gong, L. (2018). Detection and defense of DDoS attack–
based on deep learning in OpenFlow‐based SDN. International Journal of Communication Systems, 31(5),
e3497. doi:10.1002/dac.3497
Li, Y., & Guo, L. (2007). An active learning based TCM-KNN algorithm for supervised network intrusion
detection. Computers & Security, 26(7-8), 459–467. doi:10.1016/j.cose.2007.10.002
Lin, W. C., Ke, S. W., & Tsai, C. F. (2015). CANN: An intrusion detection system based on combining cluster
centers and nearest neighbors. Knowledge-Based Systems, 78, 13–21. doi:10.1016/j.knosys.2015.01.009
Liu, G., Yi, Z., & Yang, S. (2007). A hierarchical intrusion detection model based on the PCA neural networks.
Neurocomputing, 70(7-9), 1561–1568. doi:10.1016/j.neucom.2006.10.146
Mahmood, T., & Afzal, U. (2013, December). Security analytics: Big data analytics for cybersecurity: A review
of trends, techniques and tools. In 2013 2nd national conference on Information assurance (ncia) (pp. 129-134).
IEEE.
Mamolar, A. S., Pervez, Z., Wang, Q., & Alcaraz-Calero, J. M. (2019, June). Towards the detection of mobile
ddos attacks in 5g multi-tenant networks. In 2019 European Conference on Networks and Communications
(EuCNC) (pp. 273-277). IEEE. doi:10.1109/EuCNC.2019.8801975
Mani, N., Moh, M., & Moh, T. S. (2021). Defending deep learning models against adversarial attacks. International
Journal of Software Science and Computational Intelligence, 13(1), 72–89. doi:10.4018/IJSSCI.2021010105
Marr, B. (2021, July 13). What Is The Internet of Things (IoT) And How Will It Change Our World? Bernard
Marr. https://bernardmarr.com/what-is-the-internet-of-things-iot-and-how-will-it-change-our-world/
Masdari, M., & Jalali, M. (2016). A survey and taxonomy of DoS attacks in cloud computing. Security and
Communication Networks, 9(16), 3724–3751. doi:10.1002/sec.1539
Mavoungou, S., Kaddoum, G., Taha, M., & Matar, G. (2016). Survey on threats and attacks on mobile networks.
IEEE Access: Practical Innovations, Open Solutions, 4, 4543–4572. doi:10.1109/ACCESS.2016.2601009
Michalas, A., Komninos, N., & Prasad, N. R. (2011, February). Multiplayer game for ddos attacks resilience
in ad hoc networks. In 2011 2nd International Conference on Wireless Communication, Vehicular Technology,
Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE) (pp. 1-5). IEEE.
doi:10.1109/WIRELESSVITAE.2011.5940931
Mirkin, M., Ji, Y., Pang, J., Klages-Mundt, A., Eyal, I., & Juels, A. (2020, October). BDoS: Blockchain denial-
of-service. In Proceedings of the 2020 ACM SIGSAC conference on Computer and Communications Security
(pp. 601-619). doi:10.1145/3372297.3417247
Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. Computer
Communication Review, 34(2), 39–53. doi:10.1145/997150.997156
Mirkovic, J., Arikan, E., Wei, S., Thomas, R., Fahmy, S., & Reiher, P. (2006, October). Benchmarks for DDoS
defense evaluation. In MILCOM 2006-2006 IEEE Military Communications conference (pp. 1–10). IEEE.
Mishra, A., Gupta, N., & Gupta, B. B. (2021). Defense mechanisms against DDoS attack based on entropy in
SDN-cloud using POX controller. Telecommunication Systems, 77(1), 47–62. doi:10.1007/s11235-020-00747-w
38
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Mizukoshi, M., & Munetomo, M. (2015, May). Distributed denial of services attack protection system with genetic
algorithms on Hadoop cluster computing framework. In 2015 IEEE Congress on Evolutionary Computation
(CEC) (pp. 1575-1580). IEEE. doi:10.1109/CEC.2015.7257075
Mladenov, B. (2019, May). Studying the DDoS attack effect over SDN controller southbound channel. In
2019 X National Conference with International Participation (ELECTRONICA) (pp. 1-4). IEEE. doi:10.1109/
ELECTRONICA.2019.8825601
Mölsä, J. (2005). Mitigating denial of service attacks: A tutorial. Journal of Computer Security, 13(6), 807–837.
doi:10.3233/JCS-2005-13601
Munshi, A., Alqarni, N. A., & Almalki, N. A. (2020, March). Ddos attack on IoT devices. In 2020 3rd International
Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-5). IEEE. doi:10.1109/
ICCAIS48893.2020.9096818
Murynets, I., & Jover, R. P. (2013, June). Anomaly detection in cellular machine-to-machine communications.
In 2013 IEEE International Conference on Communications (ICC) (pp. 2138-2143). IEEE. doi:10.1109/
ICC.2013.6654843
Nagpal, B., Sharma, P., Chauhan, N., & Panesar, A. (2015, March). DDoS tools: Classification, analysis
and comparison. In 2015 2nd International Conference on Computing for Sustainable Global Development
(INDIACom) (pp. 342-346). IEEE.
Naoumov, N., & Ross, K. (2006, May). Exploiting p2p systems for ddos attacks. In Proceedings of the 1st
international conference on Scalable information systems (pp. 47-es). Academic Press.
Nexusguard. (2020). Annual DDoS threat report 2020. https://blog.nexusguard.com/threat-report/annual-threat-
report-2020
Noizat, P. (2015). Blockchain electronic vote. In Handbook of digital currency (pp. 453–461). Academic Press.
doi:10.1016/B978-0-12-802117-0.00022-9
Osborne, C. (2020, June 20). DDoS surge driven by attacks on education, government, and coronavirus
information sites. The Daily Swig | Cybersecurity News and Views. https://portswigger.net/daily-swig/ddos-
surge-driven-by-attacks-on-education-government-and-coronavirus-information-sites
Parashar, M., Poonia, A., & Satish, K. (2019, July). A survey of attacks and their mitigations in software defined
networks. In 2019 10th International Conference on Computing, Communication and Networking Technologies
(ICCCNT) (pp. 1-8). IEEE. doi:10.1109/ICCCNT45670.2019.8944621
Patel, C. M., & Borisagar, A. P. V. H. (2012). Survey on taxonomy of ddos attacks with impact and mitigation
techniques. International Journal of Engineering Research & Technology (Ahmedabad), 1(9).
PCMag. (2010, October 29). “Anonymous” DDoS Takes Down RIAA Site. https://www.pcmag.com/archive/
anonymous-ddos-attack-takes-down-riaa-site-256328
Peng, T., Leckie, C., & Ramamohanarao, K. (2007). Survey of network-based defense mechanisms countering
the DoS and DDoS problems. ACM Computing Surveys, 39(1), 3. doi:10.1145/1216370.1216373
Perboli, G., Musso, S., & Rosano, M. (2018). Blockchain in logistics and supply chain: A lean approach
for designing real-world use cases. IEEE Access: Practical Innovations, Open Solutions, 6, 62018–62028.
doi:10.1109/ACCESS.2018.2875782
Pérez-Díaz, J. A., Valdovinos, I. A., Choo, K. K. R., & Zhu, D. (2020). A flexible SDN-based architecture for
identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access: Practical Innovations,
Open Solutions, 8, 155859–155872. doi:10.1109/ACCESS.2020.3019330
Poisel, R., Rybnicek, M., & Tjoa, S. (2013, March). Game-based simulation of Distributed Denial of Service
(DDoS) attack and defense mechanisms of Critical Infrastructures. In 2013 IEEE 27th International Conference
on Advanced Information Networking and Applications (AINA) (pp. 114-120). IEEE.
Praseed, A., & Thilagam, P. S. (2018). DDoS attacks at the application layer: Challenges and research perspectives
for safeguarding web applications. IEEE Communications Surveys and Tutorials, 21(1), 661–685. doi:10.1109/
COMST.2018.2870658
39
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Qi, M. (2009, August). P2P network-targeted DDoS attacks. In 2009 Second International Conference on the
Applications of Digital Information and Web Technologies (pp. 843-845). IEEE.
Qi, M., & Yang, Y. (2009, August). P2P DDoS: challenges and countermeasures. In 2009 Sixth International
Conference on Fuzzy Systems and Knowledge Discovery (Vol. 7, pp. 265-268). IEEE.
Qwasmi, N., Ahmed, F., & Liscano, R. (2011, September). simulation of ddos attacks on p2p networks. In 2011
IEEE International Conference on High Performance Computing and Communications (pp. 610-614). IEEE.
Raj, P. (Ed.). (2014). Handbook of research on cloud infrastructures for big data analytics. IGI Global.
doi:10.4018/978-1-4666-5864-6
Riorey. (2012). Taxonomy of DDoS attacks. RioRey: The DDoS Specialist. https://www.riorey.com/types-of-
ddos-attacks/
Rochlis, J. A., & Eichin, M. W. (1989). With microscope and tweezers: The worm from MIT’s perspective.
Communications of the ACM, 32(6), 689–698. doi:10.1145/63526.63528
Ron, T. I., & Attias, S. (2017). Case analysis for the effect of blockchain technology in the gaming regulatory
environment. Gaming Law Review, 21(6), 459–460. doi:10.1089/glr2.2017.21613
Roopak, M., Tian, G. Y., & Chambers, J. (2019, January). Deep learning models for cyber security in IoT
networks. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC) (pp.
452-457). IEEE. doi:10.1109/CCWC.2019.8666588
Saad, M., Njilla, L., Kamhoua, C., Kim, J., Nyang, D., & Mohaisen, A. (2019, May). Mempool optimization
for defending against ddos attacks in pow-based blockchain systems. In 2019 IEEE International Conference on
Blockchain and Cryptocurrency (ICBC) (pp. 285-292). IEEE. doi:10.1109/BLOC.2019.8751476
Saad, M., Spaulding, J., Njilla, L., Kamhoua, C., Shetty, S., Nyang, D., & Mohaisen, D. (2020). Exploring the
attack surface of blockchain: A comprehensive survey. IEEE Communications Surveys and Tutorials, 22(3),
1977–2008. doi:10.1109/COMST.2020.2975999
Saad, M., Thai, M. T., & Mohaisen, A. (2018, May). POSTER: deterring ddos attacks on blockchain-based
cryptocurrencies through mempool optimization. In Proceedings of the 2018 on Asia Conference on Computer
and Communications Security (pp. 809-811). doi:10.1145/3196494.3201584
Sambandam, N., Hussein, M., Siddiqi, N., & Lung, C. H. (2018, December). Network security for iot using
sdn: Timely ddos detection. In 2018 IEEE Conference on Dependable and Secure Computing (DSC) (pp. 1-2).
IEEE. doi:10.1109/DESEC.2018.8625119
Sangkatsanee, P., Wattanapongsakorn, N., & Charnsripinyo, C. (2011). Practical real-time intrusion detection
using machine learning approaches. Computer Communications, 34(18), 2227–2235. doi:10.1016/j.
comcom.2011.07.001
Sarasamma, S. T., Zhu, Q. A., & Huff, J. (2005). Hierarchical Kohonenen net for anomaly detection in network
security. IEEE Transactions on Systems, Man, and Cybernetics. Part B, Cybernetics, 35(2), 302–312. doi:10.1109/
TSMCB.2005.843274 PMID:15828658
Schonfeld, E. (2010, November 28). WikiLeaks Reports It Is Under a Denial of Service Attack. TechCrunch.
https://techcrunch.com/2010/11/28/wikileaks-ddos-attack/
Selvi, V., & Shebin, R. (2016, March). Game theory based mitigation of Interest flooding in Named Data
Network. In 2016 International Conference on Wireless Communications, Signal Processing and Networking
(WiSPNET) (pp. 685-689). IEEE. doi:10.1109/WiSPNET.2016.7566220
Sharafaldin, I., Lashkari, A. H., Hakak, S., & Ghorbani, A. A. (2019, October). Developing realistic distributed
denial of service (DDoS) attack dataset and taxonomy. In 2019 International Carnahan Conference on Security
Technology (ICCST) (pp. 1-8). IEEE. doi:10.1109/CCST.2019.8888419
Shawahna, A., Abu-Amara, M., Mahmoud, A. S., & Osais, Y. (2018). EDoS-ADS: An enhanced mitigation
technique against economic denial of sustainability (EDoS) attacks. IEEE Transactions on Cloud Computing,
8(3), 790–804. doi:10.1109/TCC.2018.2805907
40
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Shi, P., & Lian, Y. (2008, April). Game-theoretical effectiveness evaluation of DDoS defense. In Seventh
International Conference on Networking (icn 2008) (pp. 427-433). IEEE. doi:10.1109/ICN.2008.121
Shidaganti, G. I., Inamdar, A. S., Rai, S. V., & Rajeev, A. M. (2020). Scef: A model for prevention of ddos
attacks from the cloud. International Journal of Cloud Applications and Computing, 10(3), 67–80. doi:10.4018/
IJCAC.2020070104
Shon, T., & Moon, J. (2007). A hybrid machine learning approach to network anomaly detection. Information
Sciences, 177(18), 3799–3821. doi:10.1016/j.ins.2007.03.025
Singel, R. (2008, January 23). War Breaks Out Between Hackers and Scientology – There Can Be Only One.
Wired. https://www.wired.com/2008/01/anonymous-attac/
Singh, K., Guntuku, S. C., Thakur, A., & Hota, C. (2014). Big data analytics framework for peer-to-peer botnet
detection using random forests. Information Sciences, 278, 488–497. doi:10.1016/j.ins.2014.03.066
Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Rajarajan, M. (2017a). DDoS victim service containment to
minimize the internal collateral damages in cloud computing. Computers & Electrical Engineering, 59, 165–179.
doi:10.1016/j.compeleceng.2016.12.004
Somani, G., Gaur, M. S., Sanghi, D., Conti, M., & Rajarajan, M. (2017b). Scale inside-out: Rapid mitigation of
cloud DDoS attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), 959–973. doi:10.1109/
TDSC.2017.2763160
Specht, S., & Lee, R. (2003). Taxonomies of distributed denial of service networks, attacks, tools and
countermeasures. CEL2003-03. Princeton University.
Stehman, S. V. (1997). Selecting and interpreting measures of thematic classification accuracy. Remote Sensing
of Environment, 62(1), 77–89. doi:10.1016/S0034-4257(97)00083-7
Su, S. C., Chen, Y. R., Tsai, S. C., & Lin, Y. B. (2018). Detecting p2p botnet in software defined networks.
Security and Communication Networks, 2018, 2018. doi:10.1155/2018/4723862
Sudar, K. M., Beulah, M., Deepalakshmi, P., Nagaraj, P., & Chinnasamy, P. (2021, January). Detection of
Distributed Denial of Service Attacks in SDN using Machine learning techniques. In 2021 International Conference
on Computer Communication and Informatics (ICCCI) (pp. 1-5). IEEE. doi:10.1109/ICCCI50826.2021.9402517
Sun, W., Li, Y., & Guan, S. (2019, August). An improved method of DDoS attack detection for controller of
SDN. In 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology
(CCET) (pp. 249-253). IEEE. doi:10.1109/CCET48361.2019.8989356
Sung, K. Y., & Hsiao, S. W. (2019, December). Mitigating DDoS with PoW and Game Theory. In 2019 IEEE
International Conference on Big Data (Big Data) (pp. 6223-6225). IEEE. doi:10.1109/BigData47090.2019.9006081
Taj, A., & Khalil, I. (2018, November). DDoS defence mechanisms and challenges. International Journal of
Basic & Applied Sciences, 6(11).
Tariq, U., Hong, M., & Lhee, K. S. (2006, August). A comprehensive categorization of DDoS attack and DDoS
defense techniques. In International Conference on Advanced Data Mining and Applications (pp. 1025-1036).
Springer. doi:10.1007/11811305_112
Tewari, A., & Gupta, B. B. (2020). Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices
Using RFID Tags. International Journal on Semantic Web and Information Systems, 16(3), 20–34. doi:10.4018/
IJSWIS.2020070102
Thomas, R. M., & James, D. (2017, August). DDOS detection and denial using third party application in SDN.
In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS)
(pp. 3892-3897). IEEE. doi:10.1109/ICECDS.2017.8390193
Tong, X., Wang, Z., & Yu, H. (2009). A research using hybrid RBF/Elman neural networks for intrusion detection
system secure model. Computer Physics Communications, 180(10), 1795–1801. doi:10.1016/j.cpc.2009.05.004
Tschorsch, F., & Scheuermann, B. (2016). Bitcoin and beyond: A technical survey on decentralized digital
currencies. IEEE Communications Surveys and Tutorials, 18(3), 2084–2123. doi:10.1109/COMST.2016.2535718
41
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Tu, G. H., Li, C. Y., Peng, C., & Lu, S. (2015, September). How voice call technology poses security threats
in 4g lte networks. In 2015 IEEE Conference on Communications and Network Security (CNS) (pp. 442-450).
IEEE. doi:10.1109/CNS.2015.7346856
Vishnoi, A., Mishra, P., Negi, C., & Peddoju, S. K. (2021). Android Malware Detection Techniques in Traditional
and Cloud Computing Platforms: A State-of-the-Art Survey. International Journal of Cloud Applications and
Computing, 11(4), 113–135. doi:10.4018/IJCAC.2021100107
Vishwakarma, R., & Jain, A. K. (2019, April). A honeypot with machine learning based detection framework
for defending IoT based Botnet DDoS attacks. In 2019 3rd International Conference on Trends in Electronics
and Informatics (ICOEI) (pp. 1019-1024). IEEE. doi:10.1109/ICOEI.2019.8862720
Wang, G., Hao, J., Ma, J., & Huang, L. (2010). A new approach to intrusion detection using Artificial
Neural Networks and fuzzy clustering. Expert Systems with Applications, 37(9), 6225–6232. doi:10.1016/j.
eswa.2010.02.102
Wang, H., Jin, C., & Shin, K. G. (2007). Defense against spoofed IP traffic using hop-count filtering. IEEE/
ACM Transactions on Networking, 15(1), 40–53. doi:10.1109/TNET.2006.890133
Wang, Y., & Li, G. (2019, July). Detect Triangle Attack on Blockchain by Trace Analysis. In 2019 IEEE 19th
International Conference on Software Quality, Reliability and Security Companion (QRS-C) (pp. 316-321).
IEEE. doi:10.1109/QRS-C.2019.00066
Wei, W., Dong, Y., & Lu, D. (2008, September). Optimal control of DDoS defense with multi-resource max-min
fairness. In 2008 IEEE Conference on Cybernetics and Intelligent Systems (pp. 1285-1293). IEEE. doi:10.1109/
ICCIS.2008.4670732
Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks
with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63(9), 4647–4658.
doi:10.1109/TVT.2014.2313865
Wen, Y., Lu, F., Liu, Y., & Huang, X. (2021). Attacks and countermeasures on blockchains: A survey from
layering perspective. Computer Networks, 191, 107978. doi:10.1016/j.comnet.2021.107978
Wu, S., Chen, Y., Li, M., Luo, X., Liu, Z., & Liu, L. (2020). Survive and thrive: A stochastic game for DDoS
attacks in bitcoin mining pools. IEEE/ACM Transactions on Networking, 28(2), 874–887. doi:10.1109/
TNET.2020.2973410
Wu, Z., Pan, Q., Yue, M., & Liu, L. (2019). Sequence alignment detection of TCP-targeted synchronous low-rate
DoS attacks. Computer Networks, 152, 64–77. doi:10.1016/j.comnet.2019.01.031
Xiang, C., Yong, P. C., & Meng, L. S. (2008). Design of multiple-level hybrid classifier for intrusion detection
system using Bayesian clustering and decision trees. Pattern Recognition Letters, 29(7), 918–924. doi:10.1016/j.
patrec.2008.01.008
Xiang, Y., & Zhou, W. (2005, July). A defense system against DDOS attacks by large-scale IP traceback. In
Third International Conference on Information Technology and Applications (ICITA’05) (Vol. 2, pp. 431-436).
IEEE. doi:10.1109/ICITA.2005.10
Xiao, Z., & Xiao, Y. (2012). Security and privacy in cloud computing. IEEE Communications Surveys and
Tutorials, 15(2), 843–859. doi:10.1109/SURV.2012.060912.00182
Xu, R., Cheng, J., Wang, F., Tang, X., & Xu, J. (2019). A DRDoS detection and defense method based on deep
forest in the big data environment. Symmetry, 11(1), 78. doi:10.3390/sym11010078
Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined networking with cloud
computing. IEEE Communications Magazine, 53(4), 52–59. doi:10.1109/MCOM.2015.7081075
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2015). Software-defined networking (SDN) and distributed denial of
service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE
Communications Surveys and Tutorials, 18(1), 602–622. doi:10.1109/COMST.2015.2487361
Yu, F. R., Tang, H., Mason, P. C., & Wang, F. (2010). A hierarchical identity based key management scheme
in tactical mobile ad hoc networks. IEEE eTransactions on Network and Service Management, 7(4), 258–267.
doi:10.1109/TNSM.2010.1012.0362
42
International Journal on Semantic Web and Information Systems
Volume 18 • Issue 1
Yu, J., Li, Z., Chen, H., & Chen, X. (2007, June). A detection and offense mechanism to defend against application
layer DDoS attacks. In International Conference on Networking and Services (ICNS’07) (pp. 54-54). IEEE.
doi:10.1109/ICNS.2007.5
Yuan, X., Li, C., & Li, X. (2017, May). DeepDefense: identifying DDoS attack via deep learning. In
2017 IEEE International Conference on Smart Computing (SMARTCOMP) (pp. 1-8). IEEE. doi:10.1109/
SMARTCOMP.2017.7946998
Yue, X., Qiu, X., Ji, Y., & Zhang, C. (2009, February). P2P attack taxonomy and relationship analysis. In 2009
11th International Conference on Advanced Communication Technology (Vol. 2, pp. 1207-1210). IEEE.
Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defense mechanisms against distributed denial of
service (DDoS) flooding attacks. IEEE Communications Surveys and Tutorials, 15(4), 2046–2069. doi:10.1109/
SURV.2013.031413.00127
Zargar, S. T., Takabi, H., & Joshi, J. B. (2011, October). DCDIDP: A distributed, collaborative, and data-driven
intrusion detection and prevention framework for cloud computing environments. In 7th International Conference
on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom) (pp. 332-341). IEEE.
Zhang, C., Jiang, J., & Kamel, M. (2005). Intrusion detection using hierarchical neural networks. Pattern
Recognition Letters, 26(6), 779–791. doi:10.1016/j.patrec.2004.09.045
Zhao, S., Chen, K., & Zheng, W. (2009, August). Defend against denial of service attack with VMM. In 2009
eighth international conference on grid and cooperative computing (pp. 91-96). IEEE. doi:10.1109/GCC.2009.14
Zhijun, W., Wenjing, L., Liang, L., & Meng, Y. (2020). Low-rate DoS attacks, detection, defense, and
challenges: A survey. IEEE Access: Practical Innovations, Open Solutions, 8, 43920–43943. doi:10.1109/
ACCESS.2020.2976609
43