Evaluating the Impact of Denial-of-Service (DoS) Attacks on Enterprise Networks Using Optimized Network Engineering Tools (OPNET 14.5) and Machine Learning
DOI:
https://doi.org/10.26438/ijsrnsc.v13i2.271Keywords:
Denial-of-Service (DoS), Enterprise Security, Network Performance, Machine Learning, OPNETAbstract
The research conducts a network performance analysis of enterprise systems under Denial-of-Service (DoS) attacks through machine learning modeling with OPNET 14.5. Service interruptions along with financial losses result from Denial-of-Service attacks which seriously reduce network performance. The implementation of multiple defense measures has not resolved the persistent problem with real-time detection and response for enterprises. Through OPNET 14.5 simulation the research evaluates multiple DoS attack situations alongside their effects on performance metrics by measuring latency and achieving throughput and packet loss statistics. Two machine learning models with decision trees and support vector machines serve to detect normal and attack-related traffic patterns. The simulation demonstrates that networks experience severe degradation when under DoS attacks which leads to longer delays and packet drops. The machine learning detection systems show excellent attack pattern recognition abilities which indicates their practical use in preventing attacks. The authors suggest security frameworks should implement machine learning detection systems as part of their enterprise security infrastructure for better DoS protection. The research provides final proof about integrating network simulation along with machine learning technologies to stop DoS attacks which will enable further cybersecurity defense system development.
References
B. B. Gupta, R. C. Joshi, and M. Misra, “ANN-Based Scheme to Detect Flooding Attacks in Vehicular Ad hoc Networks,” Journal of Info. Sec. and App., vol. 54, p. 102556, 2020.
J. Mirkovic and P. Reiher, “A taxonomy of DDoS Attack and DDoS Defense Mechanisms,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 2, pp. 39–53, 2004.
A. Gupta and L. S. Sharma, ‘Mitigation of DoS and port scan attacks using snort’, Int. J. Comput. Sci. Eng., vol. 7, no. 4, pp. 248–258, 2019
H. Iqbal and S. Naaz, ‘Wireshark as a tool for detection of various LAN attacks’, Int. J. Comput. Sci. Eng., vol. 7, no. 5, pp. 833–837, 2019.
S. Behal and K. Kumar, “Trends in the Detection of Distributed Denial-of-Service Attacks,” Computer Communications, vol. 116, pp. 24–37, 2017.
Y. Wang, J. Liu, and H. Zhang, “A Study on DoS Attack Cost and Mitigation Strategies,” International Journal of Cybersecurity, vol. 10, no. 1, pp. 45–60, 2022.
S. T. Zargar, J. Joshi, and D. Tipper, “A Survey of Defense Mechanisms against Distributed Denial-of-Service Attacks,” IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046–2069, 2013.
M. H. U. Sharif and M. A. Mohammed, “A literature review of financial losses statistics for cyber security and future trend”, World J. Adv. Res. Rev., vol. 15, no. 1, pp. 138–156, 2022.
K. Darshan, V. Rohan, R. Rohan, and D. H. Kamath, ‘Hybrid Intrusion Detection System Using K-Means Algorithm’, International Journal of Computer Sciences and Engineering, vol. 4, no. 3, pp. 82–85, 2016.
P. Rajput and P. Kulkarni, ‘A Survey on Wireless Malevolent Access Point Detection Methods for WLAN’, International Journal of Computer Sciences and Engineering, vol. 4, no. 4, pp. 48–50, 2016.
P. Kumar, D. Puthal, and M. Prasad, “Intrusion Detection in Software-Defined Networking using Machine Learning,” Future Generation Computer Systems, vol. 115, pp. 94–104, 2021.
A. Singh, R. Verma, and S. Kumar, “Emerging Trends in Cybersecurity for Enterprise Networks,” Journal of Network and Computer Applications, vol. 125, pp. 138–155, 2019.
R. Vinayakumar, K. P. Soman, and P. Poornachandran, “Deep Learning Framework for Cybersecurity Applications,” Neural Computing and App., vol. 31, no. 3, pp. 689–708, 2019.
M. H. Bhuyan, H. J. Kashyap, D. K. Bhattacharyya, and J. K. Kalita, “Detecting DDoS attacks: Methods, Tools, and Future directions,” The Computer Journal, vol. 57, no. 4, pp. 537–556, 2014.
Z. Tan, D. He, and S. Chan, “AI-driven Defense against Denial-of-Service Attacks in Cloud Computing,” IEEE Tran.on Cloud Computing, vol. 8, no. 2, pp. 330–344, 2020.
M. Ahmed, Y. Xiang, and W. Zhou, “Deep Learning for Detecting Volumetric DDoS Attacks in Enterprise Networks,” IEEE Transactions on Industrial Informatics, vol. 17, no. 4, pp. 2520–2531, 2021.
Y. Zheng, C. Wang, and L. Chen, “Simulation-based Performance Analysis of Cybersecurity Threats using OPNET,” Journal of Cybersecurity Research, vol. 7, no. 1, pp. 59–71, 2018.
W. Iftikhar, Z. Mahmood, and D. M. Vistro, “The Impact of DDoS and Ping of Death on Network Performance,” International Journal of Scientific & Technology Research, vol. 8, no. 12, p. 276, 2019.
L. Huraj and M. Šimon, “Realtime Attack Environment for DDoS Experimentation,” in IEEE 15th International Scientific Conference on Informatics, 2019.
M. Lernefalk, “Evaluating the Effects of Denial-of-Service Attacks from IoT Devices,” Mittuniversitetet, 2021.
A. Saliou, B. Zhang, and C. Kumar, “Overcoming static firewall limitations through the development of an out-of-line firewall evaluation framework,” Journal of Network Security and Applications, vol. 15, no. 3, pp. 210–225, 2022, doi: 10.1016/j.jnsa.2022.05.012.
A. Y. Nalukui and C. S. Lubobya, “Effects of DoS Attack in Wi-Fi Broadband Network,” International Journal of Networks and Comm., vol. 12, no. 2, pp. 47–54, 2022.
K. Sireesha, S. V. Krushna, and C. M. Krishna, “Design and Security Simulation of Wi-Fi Networks,” Juni Khyat, vol. 12, no. 5, pp. 200–209, 2022.
A. Agrawal, V. Jain, and R. Astya, “Enhancing Network Security Against DDoS Attacks: An Analysis of OPNET Modelers,” in IEEE SMART Conference, 2023, doi: 10.1109/SMART59791.2023.10428206.
R. Bukhowah, A. Aljughaiman, and M. M. H. Rahman, “Detection of DoS Attacks for IoT in Information-Centric Networks Using Machine Learning: Opportunities, Challenges, and Future Research Directions,” Electronics, vol. 13, no. 1031, 2024, doi: 10.3390/electronics13061031.
I. Iqbal, I. Shafqat, M. Rauf, and S. Krishna, “Securing Network Against Denial of Service (DoS) Attack Using Graphical Network Simulator-3,” 2024.
S. Willium, “Computer Sciences,” International Journal of Scientific Research in Computer Science and Engineering, vol. 31, no. 4, pp. 123–141, 2012.

Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2025 Ojo Jayeola Adaramola, Olaniyi Habib Aliu

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.