
Research Article
The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack
@INPROCEEDINGS{10.1007/978-3-030-98005-4_5, author={Vukosi Rikhotso and Mthulisi Velempini}, title={The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack}, proceedings={Ad Hoc Networks and Tools for IT. 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6--7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings}, proceedings_a={ADHOCNETS \& TRIDENTCOM}, year={2022}, month={3}, keywords={Detection Distributed Denial of Service Performance evaluation}, doi={10.1007/978-3-030-98005-4_5} }
- Vukosi Rikhotso
Mthulisi Velempini
Year: 2022
The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack
ADHOCNETS & TRIDENTCOM
Springer
DOI: 10.1007/978-3-030-98005-4_5
Abstract
The study evaluates two Distributed Denial of Service (DDoS) attacks detection schemes, the Cloud based and the Netplumber. The schemes are evaluated in terms of CPU and memory utilization. The main objective is to identify the better algorithm with a view of enhancing the schemes. The related work on detection algorithms was reviewed. The schemes are evaluated in a Software defined and Cognitive Radio (SD-CRN) Network environment. An early detection and lightweight detection schemes is desirable.
The desirable algorithm detects the attack within the least number of packets. It also consumes less memory and the least amount of CPU time on average. The study uses a statistical approach with the covariance matrix to evaluate the effect of the attack on the SD-CRN controller. SD-CRN introduces a programmable, dynamic, adaptable, manageable and cost-effective network architecture.
DDoS attacks deplete the network bandwidth or exhausts the victim’s resources. Researchers have proposed a number of defence mechanisms (such as attack prevention, trackback, reaction, detection, and characterization) in an endeavour to address the effects of the DDoS attacks. Unfortunately, the incidents of the attacks are on the rise. However, the results of this evaluation show that the Netplumber is the promising algorithm.