STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS
release_ln4bqibxxzg3lamp6hj3d27zl4
by
Simona Ramanauskaitė, Antanas Čenys
Abstract
A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filtering efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.
In application/xml+jats
format
Archived Files and Locations
application/pdf 292.4 kB
file_hpgx7udxnjcbtm6i3t36yhebm4
|
www.old.mla.vgtu.lt (web) web.archive.org (webarchive) |
article-journal
Stage
published
Date 2011-08-22
Open Access Publication
In DOAJ
In ISSN ROAD
In Keepers Registry
ISSN-L:
2029-2252
access all versions, variants, and formats of this works (eg, pre-prints)
Crossref Metadata (via API)
Worldcat
SHERPA/RoMEO (journal policies)
wikidata.org
CORE.ac.uk
Semantic Scholar
Google Scholar