STOCHASTIC MODEL OF TCP SYN ATTACKS / STOCHASTINIS TCP SYN ATAKŲ MODELIS release_ln4bqibxxzg3lamp6hj3d27zl4

by Simona Ramanauskaitė, Antanas Čenys

Published in Mokslas: Lietuvos Ateitis by Vilnius Gediminas Technical University.

2011   p20-24

Abstract

A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.
In application/xml+jats format

Archived Files and Locations

application/pdf  292.4 kB
file_hpgx7udxnjcbtm6i3t36yhebm4
www.old.mla.vgtu.lt (web)
web.archive.org (webarchive)
Read Archived PDF
Preserved and Accessible
Type  article-journal
Stage   published
Date   2011-08-22
Container Metadata
Open Access Publication
In DOAJ
In ISSN ROAD
In Keepers Registry
ISSN-L:  2029-2252
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 93fdfe29-cb7f-4883-bf18-999976f2f1e6
API URL: JSON