Dynamic Model on DDoS Attack in Computer Network

被引:2
|
作者
Kumar, Upendra [1 ]
Pandey, Samir Kumar [2 ]
机构
[1] Birla Inst Technol, Patna Campus, Patna, Bihar, India
[2] Xavier Inst Polytech & Techniol, Ranchi, Bihar, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16) | 2016年
关键词
computer network; cyber-attack; dynamic model; epidemic model; botnet; DDoS attack; MATHEMATICAL-THEORY; TRANSMISSION;
D O I
10.1145/2980258.2980289
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The "information warfare" can hit and completely break down critical IT infrastructure of an organization or a country. Cybercrime has many types, but, in this paper we have focused on DDoS attack into a computer network to spread bots throughout the network. DDoS attack can be used to sabotage a service or as a cover for bots delivery. In this paper an epidemic SIS - SEIRS model is proposed to represent the propagation of bots in computer network through DDoS attack. A mathematical model is also formulated to represent the dynamism of the members of different compartments of the model. The model provides an epidemic framework consisting of two sub frameworks to represent the internal class of nodes and external class of nodes. Numerical methods are employed to solve and simulate the system of equations developed. Results of numerical simulations are obtained using MATLAB.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Dynamic game model of botnet DDoS attack and defense
    Wang, Yichuan
    Ma, Jianfeng
    Zhang, Liumei
    Ji, Wenjiang
    Lu, Di
    Hei, Xinhong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3127 - 3140
  • [2] Dynamic model of worms with vertical transmission in computer network
    Mishra, Bimal Kumar
    Pandey, Samir Kumar
    APPLIED MATHEMATICS AND COMPUTATION, 2011, 217 (21) : 8438 - 8446
  • [3] Mathematical Model on Attack of Worm and Virus in Computer Network
    Mishra, Binay Kumar
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (06): : 245 - 254
  • [4] Forensic Model for DDoS Attack
    Luo, Yun
    Fu, Xiao
    Luo, Bin
    Du, Xiaojiang
    Guizani, Mohsen
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [5] RVM Assessment Model for Computer Network Attack
    Yang, Yang
    Yu, Wang
    ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2010, : 104 - 107
  • [6] Dynamic model of worm propagation in computer network
    Mishra, Bimal Kumar
    Pandey, Samir Kumar
    APPLIED MATHEMATICAL MODELLING, 2014, 38 (7-8) : 2173 - 2179
  • [7] A Feature Similarity Machine Learning Model for DDoS Attack Detection in Modern Network Environments for Industry 4.0
    Sambangi, Swathi
    Gondi, Lakshmeeswari
    Aljawarneh, Shadi
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 100
  • [8] Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic
    David, Jisa
    Thomas, Ciza
    COMPUTERS & SECURITY, 2019, 82 : 284 - 295
  • [9] Secure Routing Against DDoS Attack in Wireless Sensor Network
    Nagar, Surendra
    Rajput, Shyam Singh
    Gupta, Avadesh Kumar
    Trivedi, Munesh Chandra
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2017,
  • [10] Adaptive DDoS Attack Detection: Entropy-Based Model With Dynamic Threshold and Suspicious IP Reevaluation
    Pebrianto, Juri
    Suryani, Vera
    IEEE ACCESS, 2025, 13 : 55858 - 55876