|
Ref | Main idea | Type | Strength | Future work | Results |
|
Bhosale et al. [40] | Examined characteristics, security mechanisms of DDoS attacks, and their impact on web services | Prevention | Application-layer DDoS attacks and their impact on modern online services are presented very effectively | Due to the rapid increase in application-layer attacks, further research is needed | The characteristics of application-layer attacks and their effects were explored and investigated effectively |
|
Bojović et al. [41] | Reduce the packet recognition time to understand the attack pattern | Detection | Presented a hybrid strategy for detecting DDOS attacks, also evaluated and compared them with two other methodologies | By adding a preprocessing module in the proposed technique, it would enable its application in overloaded links connecting huge networks | The technique attains the detection rate of an existing detection system, but it can detect numerous types of attacks better |
|
Asad et al. [42] | Using deep learning techniques to discriminate between normal and malicious traffic flow | Detection | Used accuracy as a performance matrix to evaluate the proposed model on actual Internet traffic | The same strategy can be used to combat other types of DDoS attacks such as those based on UDP and ICMP in the future | Proposed technique correctly detected malicious behavior from packets when a completely new malicious pattern was used |
|
Patani and Patel [43] | Detecting attacks on application and transport layer | Detection | This method uses CAPTCHA in a variety of ways to authenticate the source of genuine and malicious traffic | The suggested effort would simulate the results using data sets and technologies, as an addition to this paper in the future | This technique can detect strangely or faked IP addresses |
|