Detecting and Identifying the Targets of Covert DDoS Attacks

Akram Algaolahi, Walid Aljoby, Mustafa Ghaleb, Khaled A. Harras

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Network systems are essential to our daily lives but remain vulnerable to Distributed Denial-of-Service (DDoS) attacks, particularly stealthy low-rate variants that evade conventional detection methods. This paper presents an SDN-based deep learning framework designed to detect adaptive low-rate DDoS attacks targeting both end hosts and network links. Our approach not only mitigates these threats but also differentiates between host-Targeted and link-Targeted attacks, effectively countering dynamic adversaries. We construct dataset of benign and low-rate DDoS traffic and evaluate our solution in an SDN environment using the Mininet emulator and RYU controller, demonstrating its efficacy in identifying and countering sophisticated low-rate attacks.

Original languageEnglish
Title of host publication2024 IEEE 21st International Conference on Smart Communities
Subtitle of host publicationImproving Quality of Life using AI, Robotics and IoT, HONET 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages143-148
Number of pages6
ISBN (Electronic)9798350378078
DOIs
StatePublished - 2024
Event21st IEEE International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT, HONET 2024 - Doha, Qatar
Duration: 3 Dec 20245 Dec 2024

Publication series

Name2024 IEEE 21st International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT, HONET 2024

Conference

Conference21st IEEE International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT, HONET 2024
Country/TerritoryQatar
CityDoha
Period3/12/245/12/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

ASJC Scopus subject areas

  • Health(social science)
  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Control and Optimization
  • Health Informatics

Fingerprint

Dive into the research topics of 'Detecting and Identifying the Targets of Covert DDoS Attacks'. Together they form a unique fingerprint.

Cite this