S. Ramanauskaitė, A. Čenys, N. Goranin, J. Janulevicius
{"title":"通过组合不同类型的DDoS模型,对两层DDoS进行建模","authors":"S. Ramanauskaitė, A. Čenys, N. Goranin, J. Janulevicius","doi":"10.1109/ESTREAM.2017.7950319","DOIUrl":null,"url":null,"abstract":"Modeling of Distributed Denial of Service (DDoS) attacks is a multidimensional problem as different resources are used at the same time. Existing DDoS attacks models analyze usage of only one resource as most attack relay on exhausting one specific resource. However intersection of legal user flaw and attacks or multiple attacks' flows requires a composite view to the problem. In this paper we present a model for modeling a two-tier DDoS attack. We assume three different kinds of resources are exhausted at the same moment and they influence each other, therefore cannot be modeled as separate ones. Results of executed research reveal the usage of two-tier model rather than one-tier model pays off in precise for smaller scale attacks, while big scale attacks are more concentrated on one resource exhaustion and the intersection is not as important.","PeriodicalId":174077,"journal":{"name":"2017 Open Conference of Electrical, Electronic and Information Sciences (eStream)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Modeling of two-tier DDoS by combining different type of DDoS models\",\"authors\":\"S. Ramanauskaitė, A. Čenys, N. Goranin, J. Janulevicius\",\"doi\":\"10.1109/ESTREAM.2017.7950319\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modeling of Distributed Denial of Service (DDoS) attacks is a multidimensional problem as different resources are used at the same time. Existing DDoS attacks models analyze usage of only one resource as most attack relay on exhausting one specific resource. However intersection of legal user flaw and attacks or multiple attacks' flows requires a composite view to the problem. In this paper we present a model for modeling a two-tier DDoS attack. We assume three different kinds of resources are exhausted at the same moment and they influence each other, therefore cannot be modeled as separate ones. Results of executed research reveal the usage of two-tier model rather than one-tier model pays off in precise for smaller scale attacks, while big scale attacks are more concentrated on one resource exhaustion and the intersection is not as important.\",\"PeriodicalId\":174077,\"journal\":{\"name\":\"2017 Open Conference of Electrical, Electronic and Information Sciences (eStream)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Open Conference of Electrical, Electronic and Information Sciences (eStream)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ESTREAM.2017.7950319\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Open Conference of Electrical, Electronic and Information Sciences (eStream)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ESTREAM.2017.7950319","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modeling of two-tier DDoS by combining different type of DDoS models
Modeling of Distributed Denial of Service (DDoS) attacks is a multidimensional problem as different resources are used at the same time. Existing DDoS attacks models analyze usage of only one resource as most attack relay on exhausting one specific resource. However intersection of legal user flaw and attacks or multiple attacks' flows requires a composite view to the problem. In this paper we present a model for modeling a two-tier DDoS attack. We assume three different kinds of resources are exhausted at the same moment and they influence each other, therefore cannot be modeled as separate ones. Results of executed research reveal the usage of two-tier model rather than one-tier model pays off in precise for smaller scale attacks, while big scale attacks are more concentrated on one resource exhaustion and the intersection is not as important.