2018
DOI: 10.1155/2018/5353060
|View full text |Cite
|
Sign up to set email alerts
|

Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model

Abstract: The advanced persistent distributed denial-of-service (APDDoS) attack is a fairly significant threat to cybersecurity. Formulating a mathematical model for accurate prediction of APDDoS attack is important. However, the dynamical model of APDDoS attack has barely been reported. This paper first proposes a novel dynamical model of APDDoS attack to understand the mechanisms of APDDoS attack. Then, the attacked threshold of this model is calculated. The global stability of attack-free and attacked equilibrium are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…The APDDoS model considered in this study follows [13] and considers a computer network in which each node represents a computer. The computers can be categorized into four classes: W nodes of weak-defensive computers, A nodes of attacked computers, S nodes of strong-defensive computers (S nodes), and C nodes of compromised computers.…”
Section: Model Of Advanced Persistent Distributed Denial-of-servimentioning
confidence: 99%
See 2 more Smart Citations
“…The APDDoS model considered in this study follows [13] and considers a computer network in which each node represents a computer. The computers can be categorized into four classes: W nodes of weak-defensive computers, A nodes of attacked computers, S nodes of strong-defensive computers (S nodes), and C nodes of compromised computers.…”
Section: Model Of Advanced Persistent Distributed Denial-of-servimentioning
confidence: 99%
“…The attacked threshold is a vital parameter that determines whether the system will be attacked by APDDoS attacks. In this study, we use the FV method presented in [13] to calculate the attacked threshold of the proposed APDDoS model.…”
Section: B Attacked Threshold and Stabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Mishra et al [11] considered the characteristics of DDoS attacks on the Internet of ings (IoT) and proposed a DDoS attack model on IoT, given the conditions for a successful attack. Furthermore, some effective defense strategies, such as installing defense software and upgrading firewalls, have been widely used to mitigate DDoS attacks [12,13]. Several DDoS attack dynamic models with defending strategies have been proposed recently to study the impact of defending strategies on DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically it is a deterministic and global model where susceptible, infectious, quarantined and recovered devices are considered and, in addition, a cyber resilience recovery model was proposed. In [17] a global and deterministic model was introduced and its stability analysis was studied; in this case the compartments involved in the dynamics were weak-defensive nodes, attacked nodes, strong-defensive nodes and compromised nodes. Finally, in [18] a theoretical model to simulate an advanced persistent distributed denial-of-service attack was presented.…”
Section: Introductionmentioning
confidence: 99%