2015
DOI: 10.5815/ijcnis.2015.11.03
|View full text |Cite
|
Sign up to set email alerts
|

Data Traffic Modeling During Global Cyberattacks

Abstract: The article analyses the possibilities and techniques of modeling global cyber-attacks on an internetwork of small countries. The authors study the Distributed Denial of Service (DDoS) attack against Estonian internetwork, which took place in 2007, in an open-source Nessi 2 simulator environment, as DDoS appears to be the most common type of informational attack on resources used todeay. Such a modeling can be replicated with a certain degree of accuracy because the most of powerful attacks have been relativel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Statistical methods are very effective in the field of anomalies detection these days. Metrics have been considered for the CUSUM method that is one of the most effective methods these days [30][31][32][33].…”
Section: Resultsmentioning
confidence: 99%
“…Statistical methods are very effective in the field of anomalies detection these days. Metrics have been considered for the CUSUM method that is one of the most effective methods these days [30][31][32][33].…”
Section: Resultsmentioning
confidence: 99%
“…Simulation techniques include additional precautions such as increasing the size of the virtual memory paging file to the maximum level allowed by the OS. Modeling can be useful for electronic government systems, which should support the ability to work in crisis situations [13].…”
Section: Research Resultsmentioning
confidence: 99%