Dynamic Threshold Adjustment for Adaptive Traffic Filtering
Keywords:
Dynamic Threshold Adjustment, Adaptive Traffic Filtering, Distributed Denial of Service (DDoS), Traffic Profiling, Anomaly Detection, Reinforcement Learning, Context-Aware Filtering, Network Security, Scalable DDoS Mitigation, Machine LearningAbstract
Distributed Denial of Service (DDoS) attacks pose significant challenges to network security, particularly in distinguishing between malicious traffic surges and legitimate high-traffic events such as flash crowds. Traditional static threshold-based detection systems often result in high false positive rates and service disruptions due to their inability to adapt to dynamic network conditions. This paper presents a novel Dynamic Threshold Adjustment Method for Adaptive Traffic Filtering, designed as a core component of the Integrated Adaptive Learning and Collaborative Filtering System (IAL-CFS). The proposed approach dynamically adjusts detection thresholds in real-time using a combination of traffic profiling, statistical analysis, and machine learning techniques. Key components include an adaptive threshold mechanism, context-aware filtering, and a reinforcement learning feedback loop that continuously refines system performance. The system reduces false positives, enhances detection accuracy, and ensures scalability by incorporating real-time context, such as geographic, temporal, and application-specific traffic characteristics. Through simulated and real-world traffic testing, the method demonstrates robustness against evolving attack strategies while maintaining computational efficiency. This research establishes a scalable and intelligent framework for modern DDoS mitigation, offering a significant advancement in adaptive network security solutions.
Downloads
References
Shinde, R., & Bhattacharya, J. (2020). An analysis of DDoS attack trends in modern networks. Journal of Network and Computer Applications, 148, 102438.
Somani, G., Conti, M., & Lal, C. (2017). DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Computer Communications, 107, 30-48.
Mirkovic, J., & Reiher, P. (2005). A taxonomy of DDoS attack and DDoS defence mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39-53.
Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defence mechanisms: Classification and state-of-the-art. Computer Networks, 44(5), 643-666.
Xie, Y., & Yu, S. (2009). A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviours. IEEE/ACM Transactions on Networking, 17(1), 54-65.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.