A Survey on the Applications of Machine Learning in Identifying Predominant Network Attacks
Keywords:
LDoS attack, DDoS attack, Anomaly detection, ML, RL, IDS, Hyperparameter optimizationAbstract
Over the past decade, there has been an unprecedented surge in the number of intelligent devices, and in recent years, the proliferation of intelligent machines has surged significantly. Computer networks play a vital role in ensuring uninterrupted connectivity among interconnected IoT devices. The substantial increase in the use of smart devices has unfortunately paved the way for substantial unethical activities within networks. This study focuses on the predominant network threat known as the “Low Rate/Slow Denial of Service (LDoS) attack” which poses a substantial risk to the internet`s integrity. Detecting the source of these attacks is exceptionally challenging because they do not generate high volumes of traffic or sudden spikes in network activity. This survey explores the application of machine learning to enhance the detection of such attacks, aiming to achieve improved performance.
References
Tang D, Gao C, Li X, Liang W, Xiao S and Yang Q, “A Detection and Mitigation Scheme of LDoS Attacks via SDN Based on the FSS-RSR Algorithm,” IEEE Transactions on Network Science and Engineering, Vol.10, Issue.4, pp.1952 -1963, 2023, DOI: 10.1109/TNSE.2023.3236970.
Zhan S, Tang D, Man J, Dai R and Wang X, “Low-Rate DoS Attacks Detection Based on MAF-ADM,” MDPI Sensors, Vol.20, Issue.1, pp.189, 2020, https://doi.org/10.3390/s20010189.
Liang Liu, Yue Yin, Zhijun Wu, Qingbo Pan and Meng Yue, “LDoS attack detection method based on traffic classification prediction,” IET information security, WILEY, Vol.16, Issue.2, pp.86-96, 2022, DOI: 10.1049/ise2.12046.
Wu Zhijun, Li Wenjing, Liu Liang and Yue Meng, “Low-Rate DoS Attacks, Detection, Defense and Challenges: A Survey,” IEEE access, Vol.8, pp.43920-43943, 2020, DOI: 10.1109/ACCESS.2020.2976609.
Wenwen Sun, Shaopeng Guan, Peng Wang, Qingyu Wu, “A hybrid deep learning model based low-rate DoS attack detection method for software defined network,” Emerging telecommunications technologies, Wiley, Vol.33, Issue.5, 2022, https://doi.org/10.1002/ett.4443.
Harun Surej Ilango, Maode Ma and Rong Su, “A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT,” Engineering applications of artificial intelligence, Elsevier, Vol.114, 2022, https://doi.org/10.1016/j.engappai.2022.105059.
Harun Surej Ilango, Maode Ma and Rong Su, “Low Rate DoS Attack Detection in IoT - SDN using Deep Learning,” IEEE international conference on iThings, Australia, 2022, DOI: 10.1109/iThings - GreenCom - CPSCom - SmartData-Cybermatics53846.2021.00031
Yazhi Liu, Ding Sun, Rundong Zhang and Wei Li, “A Method for Detecting LDoS Attacks in SDWSN Based on Compressed Hilbert–Huang Transform and Convolutional Neural Networks,” MDPI Sensors, Vol.23, Issue.10, pp.4745, 2023, https://doi.org/10.3390/s23104745.
D. Tang, S. Wang, B. Liu, W. Jin and J. Zhang, "GASF-IPP: Detection and Mitigation of LDoS Attack in SDN," IEEE Transactions on Services Computing, pp.1-12, 2023, DOI: 10.1109/TSC.2023.3266757.
Xinmeng Li, Kai Zheng, Dan Tang, Zheng Qin, Zhiqing Zheng, Shihan Zhang, “LDoS Attack Detection Based on ASNNC-OFA Algorithm,” IEEE wireless communications and networking conference, China, 2021, DOI: 10.1109/WCNC49053.2021.9417400
Dan tang, Jingwen chen, Xiyin wang, Siqi zhang,Yudong yan, “A new detection method for LDoS attacks based on data mining,” Future generation computer systems, Elsevier, Vol.16, Issue.128, pp.73-87, 2022, https://doi.org/10.1016/j.future.2021.09.039
Wei shi, Dann tang, Sijia Zhan, Zheng Qin and Xiyin wang, “An approach for detecting LDoS attack based on cloud model,” Forensics of computer science, Springer, Vol.16, Issue.166821, 2022, https://doi.org/10.1007/s11704-022-0486-1.
Naiji Zhang; Fehmi Jaafar; Yasir Malik, “Low-Rate DoS Attack Detection Using PSD Based Entropy and Machine Learning,” 6th IEEE international conference on cyber security and cloud computing, Paris, France, pp.59-62, 2019, DOI 10.1109/CSCloud/EdgeCom.2019.00020.
Dan tang, Liu tang, Rui dai, Jingwen chen, Xiong Li and Joel J.P.C.Rodrigues, “MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost,”, Future generation computer systems, Elsevier, Vol.106, pp.347-359, 2020, https://doi.org/10.1016/j.future.2019.12.034.
Jingtang Luo, Xiaolong Yang, Jin Wang, Jie Xu, Jian Sun and Keping Long, “On a Mathematical Model for Low-Rate Shrew,” IEEE Transactions on Information Forensics and Security, Vol.9, Issue.7, pp.1069-1083, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.