Table 3.
Comparative analysis of proposed work with baseline techniques.
Author | Year | Applied Technique for Intrusion Detection in DDoS Attacks | IDS Applied for Detecting Attack Type | Remarks |
---|---|---|---|---|
Alamri et al. [33] | 2020 | Bandwidth control mechanism and XGBoost algorithm | DDoS attacks in Software-Defined Network | Trigger-based detection is applied using an adaptive-bandwidth-profile-based threshold where flawed flows are penalized for preventing bandwidth depletion. |
Singh et al. [34] | 2020 | Threshold and entropy-based detection mechanism | Discriminating flash-crowd events from DDoS attacks | DDoS attacks on edge routers are detected using entropy and a threshold-based system. |
Baskar et al. [35] | 2021 | Real-time traffic-monitoring algorithm using a multi-threshold system | Low-rate DDoS attacks | Low-rate DDoS attacks are detected using a multi-threshold traffic-analysis approach. |
Jisa et al. [36] | 2021 | Threshold-based algorithm using network traffic parameter | Discriminating flash-crowd events from DDoS attacks | Dynamic threshold algorithm is introduced with less processing time for DDoS attack detection. |
Proposed work | 2021 | Context-aware computing-based threshold mechanism | Memcached-based DDoS attacks | DDoS attacks using Memcached as an attack vector are mitigated efficiently by introducing architectural change in Memcached and using a context-aware threshold mechanism. |