Dynamic Model on DDoS Attack in Computer Network

被引:2
作者
Kumar, Upendra [1 ]
Pandey, Samir Kumar [2 ]
机构
[1] Birla Inst Technol, Patna Campus, Patna, Bihar, India
[2] Xavier Inst Polytech & Techniol, Ranchi, Bihar, India
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16) | 2016年
关键词
computer network; cyber-attack; dynamic model; epidemic model; botnet; DDoS attack; MATHEMATICAL-THEORY; TRANSMISSION;
D O I
10.1145/2980258.2980289
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The "information warfare" can hit and completely break down critical IT infrastructure of an organization or a country. Cybercrime has many types, but, in this paper we have focused on DDoS attack into a computer network to spread bots throughout the network. DDoS attack can be used to sabotage a service or as a cover for bots delivery. In this paper an epidemic SIS - SEIRS model is proposed to represent the propagation of bots in computer network through DDoS attack. A mathematical model is also formulated to represent the dynamism of the members of different compartments of the model. The model provides an epidemic framework consisting of two sub frameworks to represent the internal class of nodes and external class of nodes. Numerical methods are employed to solve and simulate the system of equations developed. Results of numerical simulations are obtained using MATLAB.
引用
收藏
页数:5
相关论文
共 50 条
[31]   The Research on DDoS Attack Based on Botnet [J].
Jia, Ling .
ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 :325-330
[32]   DDoS attack identification based on SDN [J].
Dobrin, Dobrev ;
Dimiter, Avresky .
2021 IEEE 20TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2021,
[33]   Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application [J].
Ankit Agarwal ;
Manju Khari ;
Rajiv Singh .
Wireless Personal Communications, 2022, 127 :419-439
[34]   Detection of DDOS Attack using Deep Learning Model in Cloud Storage Application [J].
Agarwal, Ankit ;
Khari, Manju ;
Singh, Rajiv .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 127 (01) :419-439
[35]   DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks [J].
Dong, Shi ;
Sarem, Mudar .
IEEE ACCESS, 2020, 8 :5039-5048
[36]   Discussion on the Technology of Computer Network Hacker Attack and Defense [J].
Zhu, Xinliang .
PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 :213-217
[37]   Modeling and control of computer virus attack on a targeted network [J].
Upadhyay, Ranjit Kumar ;
Singh, Prerna .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 538
[38]   Quantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Network [J].
Falaye, Adeyinka A. ;
Oluyemi, Etuk Stella ;
Ale, Seun ;
Abdullahi, Muhammad Bashir ;
Uchenna, Ugwuoke Cosmas ;
Awogbemi, Femi .
PROCEEDINGS OF THE 2017 INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS), 2017, :1095-1102
[39]   A Confidence Interval Based Filtering Against DDoS Attack in Cloud Environment: A Confidence Interval Against DDoS Attack in the Cloud [J].
Haddadi, Mohamed ;
Beghdad, Rachid .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (04) :42-56
[40]   DDoS Attack Detection in SDN: Optimized Deep Convolutional Neural Network with Optimal Feature Set [J].
Singh, Sukhvinder ;
Jayakumar, S. K., V .
WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (03) :2781-2797