S. Ramanauskaitė, A. Čenys, N. Goranin, J. Janulevicius
{"title":"Modeling of two-tier DDoS by combining different type of DDoS models","authors":"S. Ramanauskaitė, A. Čenys, N. Goranin, J. Janulevicius","doi":"10.1109/ESTREAM.2017.7950319","DOIUrl":null,"url":null,"abstract":"Modeling of Distributed Denial of Service (DDoS) attacks is a multidimensional problem as different resources are used at the same time. Existing DDoS attacks models analyze usage of only one resource as most attack relay on exhausting one specific resource. However intersection of legal user flaw and attacks or multiple attacks' flows requires a composite view to the problem. In this paper we present a model for modeling a two-tier DDoS attack. We assume three different kinds of resources are exhausted at the same moment and they influence each other, therefore cannot be modeled as separate ones. Results of executed research reveal the usage of two-tier model rather than one-tier model pays off in precise for smaller scale attacks, while big scale attacks are more concentrated on one resource exhaustion and the intersection is not as important.","PeriodicalId":174077,"journal":{"name":"2017 Open Conference of Electrical, Electronic and Information Sciences (eStream)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Open Conference of Electrical, Electronic and Information Sciences (eStream)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ESTREAM.2017.7950319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Modeling of Distributed Denial of Service (DDoS) attacks is a multidimensional problem as different resources are used at the same time. Existing DDoS attacks models analyze usage of only one resource as most attack relay on exhausting one specific resource. However intersection of legal user flaw and attacks or multiple attacks' flows requires a composite view to the problem. In this paper we present a model for modeling a two-tier DDoS attack. We assume three different kinds of resources are exhausted at the same moment and they influence each other, therefore cannot be modeled as separate ones. Results of executed research reveal the usage of two-tier model rather than one-tier model pays off in precise for smaller scale attacks, while big scale attacks are more concentrated on one resource exhaustion and the intersection is not as important.