scholarly journals Method for assessing the operating quality of a switching node in a technological transmission network data in the context of DDoS attacks by an intruder

2021 ◽  
Vol 2131 (2) ◽  
pp. 022095
Author(s):  
A A Privalov ◽  
V L Lukicheva ◽  
D N Tsvetkov ◽  
S S Titov

Abstract The purpose of this study is to develop a mechanism to account for the effects of a distributed denial of service attack on a switching node, as well as to assess the quality of its functioning under destructive effects. Relevance stems from the possibility of disruption of regional economic complex management due to the impact on the elements of the technological network of data transmission attacker type “distributed denial of service”. Based on the mathematical apparatus of GERT-networks the authors propose an approach to assess the quality of switching nodes. The essence lies in the representation of the data flow service node switching network data transmission under attack by an intruder in the form of a stochastic network, setting the type of partial distributions, the definition of the equivalent function, followed by determining the distribution function delay time packets. The model proposed by the authors allows to evaluate the quality of switching nodes operation under the conditions of “distributed denial of service” intruder attacks, both when transmitting stationary Poisson and self-similar traffic, represented by the Weibull and Pareto flow models. The results obtained are in good agreement with the data given in previously published works. The model allows to analyze and develop directions to improve the quality of functioning of switching nodes of technological network of data transmission under conditions of destructive information impact of the intruder.

Author(s):  
D. V. Shelkovoy ◽  
A. A. Chernikov

The testing results of required channel resource mathematical estimating models for the for serving the proposed multimedia load in packet-switched communication networks are presented in the article. The assessment of the attainable level of quality of service at the level of data packet transportation was carried out by means of simulation modeling of the functioning of a switching node of a communication network. The developed modeling algorithm differs from the existing ones by taking into account the introduced delay for processing each data stream packet arriving at the switching node, depending on the size of the reserved buffer and the channel resource for its maintenance. A joint examination of the probability of packet loss and the introduced delay in the processing of data packets in the border router allows a comprehensive assessment of the quality of service «end to end», which in turn allows you to get more accurate values of the effective data transmitted rate by aggregating flows at the entrance to the transport network.


2021 ◽  
Author(s):  
Alan Barzilay ◽  
Caio L. Martinelli ◽  
Michele Nogueira ◽  
Daniel M. Batista ◽  
Roberto Hirata

2020 ◽  
Vol 1 (2) ◽  
pp. 1-5
Author(s):  
Bibek Naha ◽  
Siddhartha Banerjee ◽  
Sayanti Mondal

Cloud Computing is one of the most nurtured as well as debated topic in today’s world. Billions of data of various fields ranging from personal users to large business enterprises reside in Cloud. Therefore, availability of this huge amount of data and services is of immense importance. The DOS (Denial of Service) attack is a well-known threat to the availability of data in a smaller premise. Whenever, it’s a Cloud environment this simple DOS attack takes the form of DDOS (Distributed Denial of Service) attack. This paper provides a generic insight into the various kinds of DOS as well as DDOS attacks. Moreover, a handful of countermeasures have also been depicted here. In a nutshell, it aims at raising an awareness by outlining a clear picture of the Cloud availability issues.Our paper gives a comparative study of different techniques of detecting DOS.


2019 ◽  
Vol 8 (1) ◽  
pp. 486-495 ◽  
Author(s):  
Bimal Kumar Mishra ◽  
Ajit Kumar Keshri ◽  
Dheeresh Kumar Mallick ◽  
Binay Kumar Mishra

Abstract Internet of Things (IoT) opens up the possibility of agglomerations of different types of devices, Internet and human elements to provide extreme interconnectivity among them towards achieving a completely connected world of things. The mainstream adaptation of IoT technology and its widespread use has also opened up a whole new platform for cyber perpetrators mostly used for distributed denial of service (DDoS) attacks. In this paper, under the influence of internal and external nodes, a two - fold epidemic model is developed where attack on IoT devices is first achieved and then IoT based distributed attack of malicious objects on targeted resources in a network has been established. This model is mainly based on Mirai botnet made of IoT devices which came into the limelight with three major DDoS attacks in 2016. The model is analyzed at equilibrium points to find the conditions for their local and global stability. Impact of external nodes on the over-all model is critically analyzed. Numerical simulations are performed to validate the vitality of the model developed.


Sign in / Sign up

Export Citation Format

Share Document