Recommendations

Detection

First, conduct a risk assessment to analyze all company services vulnerable to Denial of Service (DoS) attacks. Next, identify the characteristics of a DoS attack associated with those particular services (Mahjabin et. al., 2017, p. 6). Then, create an active logging procedure and filters to capture traffic on those particular services (Conklin & White, 2018, pp. 117, 132, 170, 471). Lastly, utilize software or utilities to parse logs for indicators of the attack based on identified characteristics. 

Mitigation

Each mitigation technique had costly disadvantages that almost outweigh the benefits. The Fog Computing filtering proposed by Deepali and Bhushan (2017) had a major flaw. There was no way to remove DoS attacks that bypass the filtering Fog layer. The network patrolling mitigation algorithm from Nsaif et. al. (2020), presented a massive amount of metadata required to function. We found that each technique compliments the other’s disadvantages. Therefore we recommend combining both mitigation techniques.

Prevention

In order to prevent Denial of Service attacks, one can look into using the leach algorithm. This algorithm allows nodes to gather information, monitor traffic, and inform each other if any of them are compromised. The user should also update their network with every update they would make to their operating system. To add on, one can also limit the amount of traffic entering the network, this allows networks to monitor who is entering. Lastly, make sure to use Quality of service in order to limit the amount of traffic that can be sent during an attack.