2017
DOI: 10.1080/23742917.2017.1384213
|View full text |Cite
|
Sign up to set email alerts
|

Mathematical modelling of DDoS attack and detection using correlation

Abstract: Distributed denial of service attack (DDoS) is one of the top-rated cyber threats currently. It runs down the victim server resources such as bandwidth and buffer size by obstructing the server to provide resources to legitimate clients. In this article, we propose a mathematical model of DDoS attack; we discuss its relation to the features such as inter-arrival time or rate of arrival of the attacking clients accessing the server. We further analyse the attack model in context to exhausting bandwidth and buff… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…A complete description of the DDOS attack model is presented in [40], which shows that the DDOS attack profile model consists of the following steps ( Figure 3):…”
Section: Methods Of Early Detection Of Cyber-attacksmentioning
confidence: 99%
“…A complete description of the DDOS attack model is presented in [40], which shows that the DDOS attack profile model consists of the following steps ( Figure 3):…”
Section: Methods Of Early Detection Of Cyber-attacksmentioning
confidence: 99%
“…Table.3 shows the Chi-Square (  2 ) values of T_1 is 10.52, T_2 is 10.54, T_3 is 103.09, T_4 is 9.17, T_5 is 9.88, T_6 is 114.55, T_7 is 12.05, T_8 is 112.26, T_9 is 9.22, and T_10 is 12.38. In that, the critical value of Chi-Square is 16.266 with 1% of significance 10 . This critical value is fixed as the threshold value for the detection of attacks.…”
Section: Fig 2 Configutaion Of Experimental Architecturementioning
confidence: 99%
“…Singh and De [16] have calculated the packets Inter-arrival time to detect the presence DDoS attack. Table.3 shows the packet rates and also inter-arrival time of the transferred packets at particular time intervals.…”
Section: Fig 2 Configutaion Of Experimental Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…CAIDA 2007 dataset is analyzed in detail in [30]. It is widely used until recently as the reliable dataset for many research work on network security, especially on DDoS modeling, detection and mitigation [6,22,[31][32][33]. The total size of the original dataset is 21 GB.…”
Section: Traffic Datasetmentioning
confidence: 99%