Reference Hub3
Machine Learning-Based Distributed Denial of Services (DDoS) Attack Detection in Intelligent Information Systems

Machine Learning-Based Distributed Denial of Services (DDoS) Attack Detection in Intelligent Information Systems

Wadee Alhalabi, Akshat Gaurav, Varsha Arya, Ikhlas Fuad Zamzami, Rania Anwar Aboalela
Copyright: © 2023 |Volume: 19 |Issue: 1 |Pages: 17
ISSN: 1552-6283|EISSN: 1552-6291|EISBN13: 9781668479094|DOI: 10.4018/IJSWIS.327280
Cite Article Cite Article

MLA

Alhalabi, Wadee, et al. "Machine Learning-Based Distributed Denial of Services (DDoS) Attack Detection in Intelligent Information Systems." IJSWIS vol.19, no.1 2023: pp.1-17. http://doi.org/10.4018/IJSWIS.327280

APA

Alhalabi, W., Gaurav, A., Arya, V., Zamzami, I. F., & Aboalela, R. A. (2023). Machine Learning-Based Distributed Denial of Services (DDoS) Attack Detection in Intelligent Information Systems. International Journal on Semantic Web and Information Systems (IJSWIS), 19(1), 1-17. http://doi.org/10.4018/IJSWIS.327280

Chicago

Alhalabi, Wadee, et al. "Machine Learning-Based Distributed Denial of Services (DDoS) Attack Detection in Intelligent Information Systems," International Journal on Semantic Web and Information Systems (IJSWIS) 19, no.1: 1-17. http://doi.org/10.4018/IJSWIS.327280

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The danger of distributed denial of service (DDoS) attacks has grown in tandem with the proliferation of intelligent information systems. Because of the sheer volume of connected devices, constantly shifting network circumstances, and the need for instantaneous reaction, conventional DDoS detection methods are inadequate for the IoT. In this context, this study aims to survey the current state of the art in the topic by reading relevant articles found in the Scopus database, with a brief overview of the IoT and DDoS as this study examines neural networks and their applicability to DDoS detection. Finally, a decision tree-based model is developed for the detection of DDoS attacks. The analysis sheds light on the present trends and issues in this field and suggests avenues for further study.