{"title":"基于后续连接设备的静态窗口流量控制防御DoS攻击","authors":"Promyslov Vitaly, Promyslova Olga","doi":"10.1109/mlsd52249.2021.9600137","DOIUrl":null,"url":null,"abstract":"This article presents the model of the lossless network system with an input flow control regulator. The regulator uses a static window flow control algorithm to cut out of band data. The system consists of sequent connected devices, and the feedback to the regulator is provided from each device in the chain. This provides adaptive control algorithm implementation taking into account the buffer overflow in separate parts of the system. Limiting the input flow is a defense measure against denial of service (DoS) attacks. This algorithm is especially well for brute force kind of DoS attack. They don't use information about the internal structure of the attacked system. The model uses the Network Calculus approach for simulation of the regulator and computing the main characteristics of the system.","PeriodicalId":428017,"journal":{"name":"2021 14th International Conference Management of large-scale system development (MLSD)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"DoS Attack Prevention Using the Static Window Flow Control in Sequent Connected Devices\",\"authors\":\"Promyslov Vitaly, Promyslova Olga\",\"doi\":\"10.1109/mlsd52249.2021.9600137\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article presents the model of the lossless network system with an input flow control regulator. The regulator uses a static window flow control algorithm to cut out of band data. The system consists of sequent connected devices, and the feedback to the regulator is provided from each device in the chain. This provides adaptive control algorithm implementation taking into account the buffer overflow in separate parts of the system. Limiting the input flow is a defense measure against denial of service (DoS) attacks. This algorithm is especially well for brute force kind of DoS attack. They don't use information about the internal structure of the attacked system. The model uses the Network Calculus approach for simulation of the regulator and computing the main characteristics of the system.\",\"PeriodicalId\":428017,\"journal\":{\"name\":\"2021 14th International Conference Management of large-scale system development (MLSD)\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 14th International Conference Management of large-scale system development (MLSD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/mlsd52249.2021.9600137\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 14th International Conference Management of large-scale system development (MLSD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/mlsd52249.2021.9600137","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DoS Attack Prevention Using the Static Window Flow Control in Sequent Connected Devices
This article presents the model of the lossless network system with an input flow control regulator. The regulator uses a static window flow control algorithm to cut out of band data. The system consists of sequent connected devices, and the feedback to the regulator is provided from each device in the chain. This provides adaptive control algorithm implementation taking into account the buffer overflow in separate parts of the system. Limiting the input flow is a defense measure against denial of service (DoS) attacks. This algorithm is especially well for brute force kind of DoS attack. They don't use information about the internal structure of the attacked system. The model uses the Network Calculus approach for simulation of the regulator and computing the main characteristics of the system.