It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

Stochastic Model of TCP SYN Attacks | Ramanauskaitė | Science – Future of Lithuania / Mokslas – Lietuvos Ateitis
Science – Future of Lithuania / Mokslas – Lietuvos Ateitis, Vol 3, No 1 (2011)

Stochastic Model of TCP SYN Attacks

Simona Ramanauskaitė
Antanas Čenys

Abstract


A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS) attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.

Article in Lithuanian


Article in: Lithuanian

Article published: 2011-08-22

Keyword(s): TCP SYN; SYN Flooding; DoS; DDoS; Modelling

DOI: 10.3846/mla.2011.004

Full Text: PDF pdf