<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Method of Construction of Fuzzy Tree of Solutions for Network Protection Against DoS-Attacks</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Oleksandr</forename><surname>Tymchenko</surname></persName>
							<email>olexandr.tymchenko@uwm.edu.pl</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Warmia and Mazury Olsztyn</orgName>
								<address>
									<addrLine>ul. Michała Oczapowskiego 2</addrLine>
									<postCode>10-719</postCode>
									<settlement>Olsztyn</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Bohdana</forename><surname>Havrysh</surname></persName>
							<email>dana.havrysh@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>Stepana Bandery Str</addrLine>
									<postCode>12, 79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrian</forename><surname>Kobevko</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>Stepana Bandery Str</addrLine>
									<postCode>12, 79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Orest</forename><surname>Khamula</surname></persName>
							<email>khamula@gmail.com</email>
							<affiliation key="aff2">
								<orgName type="institution">Ukrainian Academy of Printing</orgName>
								<address>
									<addrLine>Lviv, Pidholosko st</addrLine>
									<postCode>19, 79020</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Method of Construction of Fuzzy Tree of Solutions for Network Protection Against DoS-Attacks</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">5DF7BB02E7ED1F20BE726AC3897CF7A3</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T16:27+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Algorithms, DoS-attacks, fuzzy tree of solutions, network protection, mechanism 0000-0001-6315-9375 (O.Tymchenko)</term>
					<term>0000-0003-3213-9747 (B.Havrysh)</term>
					<term>XXXX-XXXX-XXXX-XXXX (A.Kobevko)</term>
					<term>0000-0001-7596-0813 (O.Khamula)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>An Intrusion Detection System is a tool that can detect intrusions into a host, network, and application. DoS attack is one of the most common network attacks. During this time, the host sends a huge number of packages per machine and thus slows down the network and the host. There are a number of algorithms for detecting DoS attacks, and most of these solutions generate a high number of false alarms. The paper considers a new method of constructing a fuzzy solution tree for monitoring network flow in case of Smurf, Mail-Bomb and Ping-of-Death attacks. Intrusion Detection System (IDS) is a tool that can detect instances of intrusion into a host, network, and application. DDoS attack is one of the most common network attacks. During it, hosts send a huge number of packages per machine and thus slow down the network and host. There are several algorithms for detecting such attacks, and most of these solutions are based on mechanisms to generate a high number of false alarms. Most anti-attack solutions are monitoring and analyzing packages within the network instead of network traffic. The paper proposes a fuzzy decision tree that can detect four types of DDoS attacks by analyzing the network flow. The proposed architecture is the basis for the development and implementation of a protection system.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Computing systems are used to solve a large number of problems in management and production. However, the performance and speed of a single physical server is in some cases insufficient, so cloud servers, or environments that combine the resources of many physical servers, are becoming popular. Such a powerful virtual system has a number of significant advantages when performing more tasks, but its complexity leads to greater vulnerability. Denial of Service (DoS) or Distributed Denial of Service (DDoS) are the main threats to access to virtual cloud servers, which can significantly reduce the performance of cloud services by damaging virtual servers. The rapid increase in the number of DoS attacks on hosts, networks or applications encourages researchers to create an effective way to stop them. The obvious solution is to create a system that detects intrusions with the least error and quickly enough. The frequency of detection of erroneous results does not satisfy users, especially for detection systems based on the analysis of anomalies.</p><p>The purpose of the article. Identify and classify the main threats from DDoS attacks and protection mechanisms against them. Build a fuzzy tree of solutions to monitor network flow in the event of Smurf, Mail-Bomb and Ping-of-Death attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Main part</head><p>The sharp increase in the number of users and ISPs leads to a decrease in network security, so service providers are always looking for solutions to monitor and verify packages coming from the client side to avoid any attacks.</p><p>The security mechanisms used in the network must prevent any attack. As it cannot completely prevent attacks, a new level of security is needed to detect and stop the attack as soon as possible <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>In 2009, the US National Institute of Standards and Technology (NIST) defined cloud computing as a "model for providing convenient on-demand network access to a shared environment of configured computing resources that can be quickly provided and released with minimal management or service provider interoperability." Payment for usage, virtualization, access to demand, flexibility and reduced costs for equipment and maintenance -factors that contribute to the popularization of cloud computing. An Infrastructure as a Service (IaaS) is a service model that allows users to deploy and run arbitrary software, which may include operating systems and applications. Virtualization plays a major role in cloud computing through the efficient and systematic use of existing equipment. Virtualization is used at various stages, including network, processor, memory, storage, and so on. This reduces cost and allows you to create an affordable and flexible system.</p><p>DDoS attack is the main threat to availability. An attacker could significantly degrade or completely destroy a user's network connection. To perform an attack, an attacker first creates many agents or hosts, and then uses these agents to launch an attack, loading the target network. The main purpose of a DDoS attack is to prevent the victim from using their resources. In most cases, the targets are web servers, processor, storage, and other network resources. In a cloud environment, DDoS can also significantly reduce the performance of cloud services by damaging virtual servers.</p><p>The Intrusion Detection System (IDS) dynamically monitors actions performed in a given environment, such as hosts and networks. It decides whether these actions are symptoms of an attack or whether they constitute lawful use of the environment. The two most common detection methods that can be used in IDS are signature-based detection and anomaly-based detection.</p><p>The signature-based detection technique in IDS looks for the characteristics of known attacks, and tries to find similarities between the previous behavior of the system or network with the characteristics of the known attack in the signature database. However, this technique cannot detect new attacks.</p><p>The anomaly detection technique takes the normal state of network traffic or host behavior as anomaly criteria. This approach can detect unknown attacks. This approach creates an error rate due to difficulties in determining the normal state of network traffic <ref type="bibr" target="#b1">[2]</ref>.</p><p>To detect intrusion, a number of researchers use artificial intelligence, data exchange and fuzzy clustering methods. Recently, fuzzy intrusion detection systems have proven noise resistance, selflearning ability, and the ability to build ground rules without the need for a priori knowledge.</p><p>Although there are various approaches to detecting DoS attacks. The practice of detection requires higher accuracy and efficiency. Therefore, there is an urgent task to improve the mechanism of detection of DoS-attacks by different algorithms.</p><p>Although there are various approaches to detecting DoS attacks, the practice of detection requires higher accuracy and efficiency. Therefore, there is an urgent task to improve the mechanism of detection of DoS-attacks by different algorithms.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">DDoS attacks</head><p>DDoS attacks are initiated by a network of remotely controlled, well-structured and widely dispersed hosts -"zombies". They are also called secondary victims. In 2019, the victims of DDoS attacks were: Chinese websites, Wikipedia, Telegram, FBI, etc. Most of these attacks were distributed, ie they occurred simultaneously from a large number of IP addresses. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">DDoS attack structure</head><p>Internet bots are widely used to carry out DDoS attacks, ie client-server technology is used to launch a large number of "zombie" hosts. In general, a DDoS attack consists of a manager, handler, agents, and victim (Figure <ref type="figure" target="#fig_0">1</ref>). Zombies (agents or bots) are used by the leader to form internet bots. The strength of the attack depends on their number. The manager communicates with agents through handlers. Handlers, for example, can be programs installed on the affected devices (network servers) with which attackers communicate to send commands. An attacker sends a command and manages his agents through handlers. Bots -devices that are run by handlers, actually attack the victim's system <ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref>.</p><p>Attackers use various scanning methods to find a vulnerable machine. The simplest strategy is to randomly scan for IP addresses because the virus does not know where the vulnerable host is. The method is only effective for IPv4 because the IPv6 address space is too large. When scanning the list, the attacker has a list of infected IP addresses.</p><p>When it makes another machine a host, part of the initial list of requests will be sent to it. Route-based scanning reduces search addresses using Border Gateway Protocol (BGP) prefixes. They reduce the amount of information in which the search takes place. With this technique, scanning is performed by different hosts in different parts of the address space, and thus saves resources. Other strategies are sometimes used, such as permutation scanning, local preference scanning, and topological scanning. Once a vulnerable host is detected, they find its vulnerability and gain control over it.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Classification</head><p>The variety of DDoS attacks is growing. The most common are attacks based on bandwidth and resources. These types consume all the bandwidth and resources of the network being operated. The results of the analysis of types of attacks are presented in figure <ref type="figure" target="#fig_1">2</ref>. Depending on the vulnerability used, attacks can be divided into different types.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.1.">Bandwidth damage:</head><p>This type of attack consumes the bandwidth of the victim or the target system, loading unwanted traffic to prevent legitimate traffic from entering the victim's network <ref type="bibr" target="#b2">[3]</ref>. Tools such as Trinoo are commonly used to carry out these attacks. Bandwidth attacks are further classified as: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Flood attack:</head><p>The attacker sends a huge amount of traffic to the victim with the help of zombies, and thus overloads the network. The victim's system slows down quickly, preventing legitimate traffic from accessing the network. This is due to the UDP (User Datagram Protocol) and ICMP (Internet Control Protocol) packages <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. The UDP-flood attack consists of the following steps:</p><p>1. An attacker sends a large number of UDP packages to random or specified ports on the victim's system via zombies. 2. Upon receiving packages, the victim system looks for destination ports to identify programs waiting on the port. 3. It does not find the required programs and generates an ICMP package with the message "destination not available". 4. Return packages from the victim are sent to a fake address.</p><p>As a result of the attack, the available bandwidth of the system is exhausted and cannot be used by the victim. This affects internet connections and systems located near the victim. Varieties of this attack are: fragmentation, DNS flood attack, VoIP flood attack, media data flood, etc.</p><p>The ICMP flood attack consists of the following steps:</p><p>1. An attacker sends a large number of ping requests to the victim system using zombies.</p><p>2. The victim sends answers to the received inquiries.</p><p>3. The network is now jammed with traffic sent by the victim. Responses to requests can be sent to the fake IP address specified in the ICMP package.</p><p>As a result, the bandwidth of network connections is quickly depleted and cannot be used by the user. Also types of ICMP attack are: fragmentation, DNS flood and Ping-flood <ref type="bibr" target="#b9">[9]</ref><ref type="bibr" target="#b10">[10]</ref><ref type="bibr" target="#b11">[11]</ref>.</p><p>Gain attack An attacker sends a large number of packages to a broadcast IP address. The router transmits these responses to requests to the victim's IP address, which results in a complete system lock. This type of attack uses the broadcast addresses of most devices that have access to the Internet, such as routers. This type of DDoS attack can be launched directly by an attacker, or with the help of zombies. The most famous attacks of this type were Smurf and Fraggle.</p><p>The Smurf attack consisted of the following steps:</p><p>1. An attacker sends packages to a network device with a broadcast address. The answer will be sent either to a fictitious address or to the victim's address. 2. ICMP_ECHO_RESPONSE packages are sent by the network amplifier to all broadcast IP address systems. This package assumes that the receiver will respond to ICMP_ECHO_REPLY. 3. The message ICMP_ECHO_REPLY from all systems in the range reaches the victim.</p><p>The Fraggle attack is similar to Smurf, but during which UDP is sent to ports that support character generation. It consists of the following steps:</p><p>1. An attacker sends UDP packages to a port that supports character generation. The return address in these packages can be the address of the victim's seventh port, which will generate characters and thus create an infinite loop. 2. The attack targets the ports of all systems to which the broadcast address refers. 3. All these systems in the range are repeated back to the port of the victim symbol generator. 4. This process is repeated because UDP packages are used.</p><p>Such an attack is more dangerous than Smurf. Its variety is a reflex attack that uses "reflectors" (intermediary hosts or devices) to perform a task. The peculiarity of the reflector is that it constantly responds to the packages it sends and receives <ref type="bibr" target="#b10">[10]</ref>. Therefore, attackers use this method for attacks to which responses are required. The return address for the victim's response will be forged.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.2.">Resource depletion attacks</head><p>The resource depletion attack aims to deplete the resources of the victim system to make it impossible to serve users. There are the following types of resource depletion attacks:</p><p>Protocol attacks on use: the purpose of these attacks is the consumption of excess resources of the victim, using the peculiarity of the protocol established in the system. The most common attacks of this type are TCP SYN attacks, PUSH + ACK, authentication server attack and CGI requests <ref type="bibr" target="#b11">[11,</ref><ref type="bibr" target="#b13">13]</ref>.</p><p>Improperly generated packages are processed with malicious information. The attacker sends these packages to the victim to hack her system. This can be done in two ways:</p><p>IP Address Attack: The package consists of the same source and destination IP address, creating chaos in the victim's operating system. Thus, the attack slows down and breaks the system <ref type="bibr" target="#b12">[12]</ref>.</p><p>IP Package Settings Attack: Each of the IP packages consists of additional fields to transmit additional information. The attack uses these fields to form a package. They are populated by setting all the quality bits to one. Therefore, the victim spends extra time processing this package. This attack is more vulnerable when attacked by more than one "zombie".</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.">Protection mechanisms</head><p>There are various measures to prevent DDoS attacks. The initiator of DDOS-attacks is an attacker who tries to gain unauthorized access to the system / network of victims. Protective mechanisms are shown in figure <ref type="figure">3</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>DDoS attack Intrusion detection Intrusion prevention</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Detection of anomalies</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Detection of abuse</head><p>Reaction to the attacker detection</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 3: Mechanisms of protection against DDoS-attacks</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Methods of prevention</head><p>The best strategy against any attack is to prevent it from occurring. One of the following techniques is the use of filters:</p><p>• Inbound filtering -this process stops incoming packages with an invalid source address. Routers are used for this purpose. This technique stops DDoS attacks caused by fake IP addresses.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>Output filtering -this technique uses an output filter. This technique allows packages that have a valid IP address in the specified network range to leave the network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>Route-based package allocation -the filter uses route information to capture or filter fake packages. It is also used to track an IP address. But this requires global information about the network topology.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>Enhanced connection security is a distributed feature architecture that assumes that an incoming package is valid if it is from legitimate servers. Other packages are blocked. The client must log in to the network by re-accessing SOAP.</p><p>You can also prevent attacks by disabling unused services, applying security patches, changing your IP address, disabling IP broadcasts, and balancing downloads and traps. Attack prevention methods do not guarantee complete protection against DDoS attacks, but increase security <ref type="bibr" target="#b14">[14,</ref><ref type="bibr" target="#b15">15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Detection methods</head><p>The intrusion detection system helps the victim to avoid the spread of DDoS attacks and prevents the system from shutting down. Among the following methods:</p><p>1. Detection of anomalies: This method detects attacks by recognizing abnormalities in the system. This is done by comparing the current values with the previously detected normal operating characteristics of the system. This method determines erroneous values in system behavior. The most common methods of detecting anomalies are:</p><p>• NOMAD -a network monitoring system that detects network anomalies by analyzing IP package header information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>•</head><p>Package's selection and filtering technique packages with congestion. A statistical analysis was performed on a subset of dropped packages, and as soon as an anomaly is detected, a signal is sent to the router to filter out malicious packages.</p><p>• D-WARD -detects a DDoS attack in the first victim. This prevents the attack from spreading to other network users. D-WARD is installed on the router to detect incoming and outgoing network traffic.</p><p>• MULTOPS-MULTOPS -is a data structure designed to detect DDoS attacks. It detects attacking or attacked systems, operating in an attack-oriented mode and its victim, respectively. This is a multi-level structure that determines the speed of packages at different levels of aggregation. But this requires a router configuration and additional memory management schemes.</p><p>2. Detection of overuse: This method detects DDoS attacks by supporting a database of addresses or exploit templates. When such a pattern is detected, the system reports DDoS attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Response to detection</head><p>If a DDoS attack is detected, it should be blocked and the identity of the attacker identified. This can be done, for example, using the Access Control List (ACL) or automatically <ref type="bibr" target="#b16">[16]</ref><ref type="bibr" target="#b17">[17]</ref><ref type="bibr" target="#b18">[18]</ref>. Some methods used to track and identify the attacker are given in table. 1. Note that there are many methods to stop DDoS attacks, but not all attacks can be detected and prevented, in reality you can only reduce the impact of the attack. The mechanism involves forwarding packages with a low probability to each router, as well as sending an ICMP feedback message to the destination. If the bulk of ICMP messages used to identify an attacker face issues such as additional traffic, verifying these packages and identifying overhead information from the route map is difficult IP-tracking This method tracks the attacker's path to find the origin of the attack. In this technique, the attacker's path is traced back to find its source. But this becomes a difficult task if the reporting of sources in the TCP / IP protocol is disabled Reverse link testing sequence This mechanism checks each of the incoming links to determine if it is an attack. To do this, a large flow of traffic is created and the presence of violations in the network is monitored. To use this mechanism, you need a system that can generate a large flow of traffic, as well as information about the location and connection of network computers Probabilistic marking of packages This technique overcomes the disadvantages of feedback testing because it does not require prior knowledge of network topology, traffic size, etc. This advantage also imposes additional costs on the system, but there are many methods to avoid additional costs</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5.">Problem solving methodology</head><p>The process of solving this problem is divided into stages of design and analysis. After defining the goals, previous research and methods used by different researchers are studied. A system based on these studies is then developed to improve protection. The second stage, called analysis, determines the effect of design and its impact on system improvement.</p><p>In the developed algorithm fuzzy logic processes the data received from a network stream to find the intrusion. The data for the study is the information accumulated after the detection of attacks. Basic and general information about IDS is collected, and then a conclusion is made about DDoS attacks and their behavior. These studies show two important problems in IDS -low speed and slow detection of DDoS attacks.</p><p>The proposed solution is to monitor the flow of the network using a fuzzy system to increase the speed and quality of detection of DDoS-attack.</p><p>Modeling At this stage, related work is investigated and the mechanism of such systems is analyzed in detail to determine which mechanism should be used to detect DDoS attacks. Most DDoS attacks have their own signature, so the detection rate on this basis is higher.</p><p>The system is configured to achieve the goals that were set at the stage of identifying the problem, as well as to take into account the information collected. Note that the designed component must have the correct output from each module and the entire system (attack report).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Analysis</head><p>The system monitors network traffic and considers all packages in the stream. A fuzzy algorithm finds a suspicious package and stores these threads in an array. Finally, the fuzzy decision tree checks the headers of the suspicious thread and in the event of an attack, the system generates an error.</p><p>It is advisable to check the speed and efficiency of the developed system on a sample of traffic provided by the Agency for Progressive Defense Research Projects (DARPA) from the Lincoln Laboratory of the Massachusetts Institute of Technology (MIT). The result will be the development of a fuzzy algorithm to detect attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>System development</head><p>Consider in more details, what processes affect the performance and accuracy of the system. First, we describe the system architecture, then -fuzzy algorithm and network flows, the application of fuzzy algorithm and network flow on IDS, the speed of attack detection is analyzed.</p><p>Protection system architecture In fig. In Fig. <ref type="figure" target="#fig_2">4</ref> shows the structure of the developed system. IDS collects all packages from the traffic sample and places them inside the streams to store in memory. A fuzzy selection algorithm collects any suspicious packages and assigns them to a suspicious stream. Each time a suspicious thread ends, a fuzzy algorithm will check it for an attack. Data for pre-processing TCP and ICMP packages from the network are used where network flows are formed by the network handler. Stream identification for TCP packages is based on the number of packages from a single source, destination, source port, and destination port. The process starts with the SYN package and ends when the FIN package arrives. On the other hand, for the ICMP protocol, two types of packages can be defined. The first package contains a request from one machine to another, and the second package is a response to the request. The network flow handler checks the network flows for any anomalies.</p><p>The most common IDS problems are error detection error and attack skip error, detection speed, performance, and overall performance. By using a network stream for the input signal and using a fuzzy intrusion detection solution tree, the result can have fewer false-positive errors and a better detection rate.</p><p>Each attack is described below.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Land attack</head><p>If TCP is the protocol of the incoming package, and the source IP and the target IP are the same, the source port is equal to the destination port, there is a Land attack.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Mail Bomb attack</head><p>An attack occurs by establishing a single TCP connection between two computers. In this stream, the SMTP port is used to send e-mail, but the number of packages in one stream can be 10,000 packages and the size of each package is 1,000 bytes. Thus, the stream size will be approximately 10 MB.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Smurf attack</head><p>The attack takes place via an ICMP stream. The number of packages in one thread is small, but the size of each package is approximately 1000 bytes. However, the flow will be large because several computers send a large package to one computer. The package contains a response message, but the message request is not sent by the victim.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.Ping packages attack</head><p>A large number of large IP packages are sent from one computer to another. Each package has about 1,000 bytes and the size of the attack stream is about 64,000 bytes. It uses the ICMP protocol, which causes the victim's machine to reboot, freeze, and crash.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: DDoS attack structure</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Classification of DDoS attacks</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Block diagram of the system</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Methods for tracking DDoS attacksMethod Description ICMP tracking</figDesc><table /></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Fuzzy sets usually consist of 0 and 1, so there can be only two possible answers. But in fuzzy logic, when combining several fuzzy sets, there may be several answers. Therefore, the fuzzy handler looks for suspicious packages to change the flow state from normal to suspicious for faster detection:</p><p>Rules </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Conclusions</head><p>A fuzzy solution tree is proposed, which can detect four types of DDoS attacks by analyzing the network flow. The proposed architecture is the basis for the development and implementation of a protection system. The experiments were performed using the DARPA data set.</p><p>Previous IDS decisions were based on a detection method that used package data and resulted in erroneous errors. This study used IDS to solve the problem using a fuzzy decision tree as a preprocessor and inbound network flow analysis.</p><p>In the proposed system, all packages are processed, and then network flows are built. During this time, the fuzzy handler stores all suspicious packages in memory. When a thread header is generated, the suspicious thread will be checked again by a fuzzy handler and attacks will be detected.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Fuzzy decision tree and fuzzy gradual decision tree: Application to job satisfaction</title>
		<author>
			<persName><forename type="first">C</forename><surname>Marsala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Rifqi</surname></persName>
		</author>
		<idno type="DOI">10.1109/FUZZ-IEEE.2017.8015740</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">On the Application of Preaggregation Functions to Fuzzy Pattern Tree</title>
		<author>
			<persName><forename type="first">P</forename><surname>Su</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Liu</surname></persName>
		</author>
		<idno type="DOI">10.1109/FUZZ-IEEE.2019.8858922</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)</title>
				<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">On the Application of Preaggregation Functions to Fuzzy Pattern Tree</title>
		<author>
			<persName><forename type="first">P</forename><surname>Su</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Mao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Liu</surname></persName>
		</author>
		<idno type="DOI">10.1109/FUZZ-IEEE.2019.8858922</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)</title>
				<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Weighted Fuzzy Decision Tree for Multi-Label Classification</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sardari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ahmadi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Taheri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">Z</forename><surname>Jahromi</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICCKE50421.2020.9303626</idno>
	</analytic>
	<monogr>
		<title level="m">10th International Conference on Computer and Knowledge Engineering (ICCKE)</title>
				<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="169" to="174" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Piecewiselinear Approach for Medical Insurance Costs Prediction using SGTM Neural-Like Structure</title>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Izonin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kryvinska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Chopyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lotoshynska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Danylyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CEUR-WS.org</title>
		<imprint>
			<biblScope unit="volume">2255</biblScope>
			<biblScope unit="page" from="170" to="179" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">An improved decision tree algorithm based on mutual information</title>
		<author>
			<persName><forename type="first">L</forename><surname>Fang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Jiang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Cui</surname></persName>
		</author>
		<idno type="DOI">10.1109/FSKD.2017.8393008</idno>
	</analytic>
	<monogr>
		<title level="m">13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="1615" to="1620" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">SD-CRF: A DoS Attack Detection Method for SDN</title>
		<author>
			<persName><forename type="first">G</forename><surname>Zheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yan</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICCT50939.2020.9295801</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 20th International Conference on Communication Technology (ICCT)</title>
				<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="1116" to="1120" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Mitigation and Detection Strategy of DoS Attack on Wireless Sensor Network Using Blocking Approach and Intrusion Detection System</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Kurniawan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yazid</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<idno type="DOI">10.1109/ICECCE49384.2020.9179255</idno>
		<title level="m">International Conference on Electrical, Communication, and Computer Engineering</title>
				<meeting><address><addrLine>ICECCE</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="5" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Package Injection and Dos Attack Controller Software(PDACS) Module to Handle Attacks in Software Defined Network</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Anagha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Lepakshi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Goutham</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Thavish</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">G</forename><surname>Kumar</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICCMC48092.2020.ICCMC-000179</idno>
	</analytic>
	<monogr>
		<title level="m">Fourth International Conference on Computing Methodologies and Communication (ICCMC)</title>
				<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="966" to="970" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A digital watermarking scheme based on autoassociative neural networks of the geometric transformations model</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Tsymbal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tkachenko</surname></persName>
		</author>
		<idno type="DOI">ttps://doi.org/10.1109/DSMP.2016.7583547</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE First International Conference on Data Stream Mining Processing (DSMP)</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="231" to="234" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Identification of Biometric Images by Machine Learning</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Voznyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Hrytsyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Klyujnyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Havrysh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lotoshynska</surname></persName>
		</author>
		<idno type="DOI">10.1109/ELIT53502.2021.9501064</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 12th International Conference on Electronics and Information Technologies (ELIT)</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="95" to="98" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Risks of Loss of Personal Data in the Process of Sending and Printing Documents</title>
		<author>
			<persName><forename type="first">O</forename><surname>Tymchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Havrysh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Khamula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Havrysh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<publisher>CITRisk</publisher>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="volume">2805</biblScope>
			<biblScope unit="page" from="373" to="384" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">On the Usage of the Probability Integral Transform to Reduce the Complexity of Multi-Way Fuzzy Decision Trees in Big Data Classification Problems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Elkano</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Uriz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Bustince</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Galar</surname></persName>
		</author>
		<idno type="DOI">10.1109/BigDataCongress.2018.00011</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Congress on Big Data (BigData Congress)</title>
				<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="25" to="32" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Generation of structure function based on ambiguous and incompletely specified data using the fuzzy decision trees</title>
		<author>
			<persName><forename type="first">J</forename><surname>Rabcan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Rusnak</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICETA.2017.8102521</idno>
	</analytic>
	<monogr>
		<title level="m">15th International Conference on Emerging eLearning Technologies and Applications (ICETA)</title>
				<imprint>
			<date type="published" when="2017">2017. 2017</date>
			<biblScope unit="page" from="1" to="7" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Observer-Based Fixed-Time Secure Tracking Consensus for Networked High-Order Multiagent Systems Against DoS Attacks</title>
		<author>
			<persName><forename type="first">H</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ye</surname></persName>
		</author>
		<idno type="DOI">10.1109/TCYB.2020.3005354</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Cybernetics</title>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Efficient Calculation Methods of Subtraction Signals Convolution</title>
		<author>
			<persName><forename type="first">O</forename><surname>Tymchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">O</forename><surname>Tymchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Havrysh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Khamula</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Sosnovska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vasiuta</surname></persName>
		</author>
		<idno type="DOI">10.1109/CADSM.2019.8779250</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 15th International Conference on the Experience of Designing and Application of CAD Systems (CADSM)</title>
				<imprint>
			<date type="published" when="2019">2019. 2019</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Mobile executions of Slow DoS Attacks</title>
		<author>
			<persName><forename type="first">E</forename><surname>Cambiaso</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Papaleo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Chiola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Aiello</surname></persName>
		</author>
		<idno type="DOI">10.1093/jigpal/jzv043</idno>
	</analytic>
	<monogr>
		<title level="j">Logic Journal of the IGPL</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="54" to="67" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">DoS attack detection model of smart grid based on machine learning method</title>
		<author>
			<persName><forename type="first">W</forename><surname>Zhe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chunlin</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICPICS50287.2020.9202401</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS)</title>
				<imprint>
			<date type="published" when="2020">2020. 2020</date>
			<biblScope unit="page" from="735" to="738" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
