International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)

Volume 8 , Issue 2 , PP: 46-52, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks

Mahmoud M. Ismail 1 * , Ahmed A. Metwaly 2

  • 1 Information Systems Department, Faculty of computers and Informatics, Zagazig University, Zagazig, Sharqiyah, 44519, Egypt - (mmsabe@zu.edu.eg)
  • 2 Information Systems Department, Faculty of computers and Informatics, Zagazig University, Zagazig, Sharqiyah, 44519, Egypt - (a.metwaly23@fci.zu.edu.eg)
  • Doi: https://doi.org/10.54216/IJWAC.080205

    Received: September 07, 2023 Revised: December 26, 2023 Accepted: April 05, 2024
    Abstract

    The increasing threat landscape of Distributed Denial-of-Service (DDoS) attacks makes network security a major concern. These attacks are a serious challenge to the stability and integrity of digital infrastructures. This research paper is an in-depth study on how to enhance network security through the detection and mitigation of DDoS attacks. The study reviews existing literature on DDoS attack mitigation strategies, emphasizing the evolving nature of these threats and the imperative for robust defense mechanisms. The research uses statistical analysis and logistic regression to provide a detailed methodology for distinguishing DDoS attacks from normal network activities. The results show that logistic regression is an effective classification model, providing insights into improved detection measures. Finally, the study concludes by recommending a multi-faceted approach that combines theoretical insights with empirical validation, highlighting the need for stronger network security measures against DDoS attacks and enhancing digital resilience.

    Keywords :

    Ransomware, Threats , Industrial Internet of Things , Detection , Cybersecurity , Security Measures , Intrusion Detection , IoT Networks , Cyber Threats

    References

    [1]    Aljuhani, Ahamed. 2021. “Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments.” IEEE Access 9: 42236–64.

    [2]    Mahjabin, Tasnuva, Yang Xiao, Guang Sun, and Wangdong Jiang. 2017. “A Survey of Distributed Denial-of-Service Attack, Prevention, and Mitigation Techniques.” International Journal of Distributed Sensor Networks 13 (12): 1550147717741463.

    [3]    Mishra, Anupama, Brij B Gupta, and Ramesh Chandra Joshi. 2011. “A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques.” In 2011 European Intelligence and Security Informatics Conference, 286–89.

    [4]    Borgiani, Vladimir, Patrick Moratori, Juliano F Kazienko, Emilio R R Tubino, and Silvio E Quincozes. 2020. “Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks within Industrial Internet of Things.” IEEE Internet of Things Journal 8 (6): 4569–78.

    [5]    Wani, Sharyar, Mohammed Imthiyas, Hamad Almohamedh, Khalid M Alhamed, Sultan Almotairi, and Yonis Gulzar. 2021. “Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight.” Symmetry 13 (2): 227.

    [6]    Bhushan, Kriti, and Brij B Gupta. 2019. “Distributed Denial of Service (DDoS) Attack Mitigation in Software Defined Network (SDN)-Based Cloud Computing Environment.” Journal of Ambient Intelligence and Humanized Computing 10: 1985–97.

    [7]    Geng, Xianjun, and Andrew B Whinston. 2000. “Defeating Distributed Denial of Service Attacks.” It Professional 2 (4): 36–42.

    [8]    Gupta, Brij B, Ramesh Chandra Joshi, and Manoj Misra. 2009. “Defending against Distributed Denial of Service Attacks: Issues and Challenges.” Information Security Journal: A Global Perspective 18 (5): 224–47.

    [9]    Lau, Felix, Stuart H Rubin, Michael H Smith, and Ljiljana Trajkovic. 2000. “Distributed Denial of Service Attacks.” In Smc 2000 Conference Proceedings. 2000 Ieee International Conference on Systems, Man and Cybernetics.’cybernetics Evolving to Systems, Humans, Organizations, and Their Complex Interactions’(Cat. No. 0, 3:2275–80.

    [10] Zebari, Rizgar R, Subhi R M Zeebaree, Amira Bibo Sallow, Hanan M Shukur, Omar M Ahmad, and Karwan Jacksi. 2020. “Distributed Denial of Service Attack Mitigation Using High Availability Proxy and Network Load Balancing.” In 2020 International Conference on Advanced Science and Engineering (ICOASE), 174–79.

    [11] Guleria, Charu, and Harsh Kumar Verma. 2018. “Improved Detection and Mitigation of DDoS Attack in Vehicular Ad Hoc Network.” In 2018 4th International Conference on Computing Communication and Automation (ICCCA), 1–4.

    [12] Alosaimi, Wael, Mazin Alshamrani, and Khalid Al-Begain. 2015. “Simulation-Based Study of Distributed Denial of Service Attacks Prevention in the Cloud.” In 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, 60–65.

    [13] Kumar, Gulshan. 2016. “Denial of Service Attacks--an Updated Perspective.” Systems Science \& Control Engineering 4 (1): 285–94.

    [14] Robinson, R R Rejimol, and Ciza Thomas. 2012. “Evaluation of Mitigation Methods for Distributed Denial of Service Attacks.” In 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA), 713–18.

    [15] Mölsä, Jarmo. 2005. “Mitigating Denial of Service Attacks: A Tutorial.” Journal of Computer Security 13 (6): 807–37.

    [16] Fung, Carol J, and Bill McCormick. 2015. “VGuard: A Distributed Denial of Service Attack Mitigation Method Using Network Function Virtualization.” In 2015 11th International Conference on Network and Service Management (CNSM), 64–70.

    [17] Mallikarjunan, K Narasimha, K Muthupriya, and S Mercy Shalinie. 2016. “A Survey of Distributed Denial of Service Attack.” In 2016 10th International Conference on Intelligent Systems and Control (ISCO), 1–6.

    [18] Kaur Chahal, Jasmeen, Abhinav Bhandari, and Sunny Behal. 2019. “Distributed Denial of Service Attacks: A Threat or Challenge.” New Review of Information Networking 24 (1): 31–103.

    [19] A. Metwaly, A. and Elhenawy, I. (2023) “Sustainable Intrusion Detection in Vehicular Controller Area Networks using Machine Intelligence Paradigm”, Sustainable Machine Intelligence Journal, 4. doi: 10.61185/SMIJ.2023.44104.

    Cite This Article As :
    M., Mahmoud. , A., Ahmed. Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks. International Journal of Wireless and Ad Hoc Communication, vol. , no. , 2024, pp. 46-52. DOI: https://doi.org/10.54216/IJWAC.080205
    M., M. A., A. (2024). Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks. International Journal of Wireless and Ad Hoc Communication, (), 46-52. DOI: https://doi.org/10.54216/IJWAC.080205
    M., Mahmoud. A., Ahmed. Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks. International Journal of Wireless and Ad Hoc Communication , no. (2024): 46-52. DOI: https://doi.org/10.54216/IJWAC.080205
    M., M. , A., A. (2024) . Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks. International Journal of Wireless and Ad Hoc Communication , () , 46-52 . DOI: https://doi.org/10.54216/IJWAC.080205
    M. M. , A. A. [2024]. Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks. International Journal of Wireless and Ad Hoc Communication. (): 46-52. DOI: https://doi.org/10.54216/IJWAC.080205
    M., M. A., A. "Enhancing Wireless Ad-Hoc Network Security by Mitigating Distributed Denial-of-Service (DDoS) Attacks," International Journal of Wireless and Ad Hoc Communication, vol. , no. , pp. 46-52, 2024. DOI: https://doi.org/10.54216/IJWAC.080205