skip to main content
10.1145/2980258.2980289acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciaConference Proceedingsconference-collections
research-article

Dynamic Model on DDoS Attack in Computer Network

Authors Info & Claims
Published:25 August 2016Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICIA 2016 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

ABSTRACT

The "information warfare" can hit and completely break down critical IT infrastructure of an organization or a country. Cybercrime has many types, but, in this paper we have focused on DDoS attack into a computer network to spread bots throughout the network. DDoS attack can be used to sabotage a service or as a cover for bots delivery. In this paper an epidemic SIS -- SEIRS model is proposed to represent the propagation of bots in computer network through DDoS attack. A mathematical model is also formulated to represent the dynamism of the members of different compartments of the model. The model provides an epidemic framework consisting of two sub frameworks to represent the internal class of nodes and external class of nodes. Numerical methods are employed to solve and simulate the system of equations developed. Results of numerical simulations are obtained using MATLAB.

References

  1. B.K. Mishra, S.K. Pandey, Dynamic Model of worms with vertical transmission in computer network, Appl. Math. Comput. 217 (21) (2011) 8438--8446.Google ScholarGoogle Scholar
  2. B.K. Mishra, S.K. Pandey, Fuzzy epidemic model for the transmission of worms in computer network, Nonlinear Anal.: Real world Appl. 11 (2010) 4335--4341.Google ScholarGoogle Scholar
  3. B.K. Mishra, S.K. Pandey, Effect of antivirus software on infectious nodes in computer network: a mathematical model, Phys. Lett. A 376 (2012) 2389--2393.Google ScholarGoogle ScholarCross RefCross Ref
  4. B. Samanta, S. K. Pandey; Attacking Behaviour of Computer Worms on Computer Network: A Dynamic Model; IJRASET; Vol. 2 Issue XII, Dec 2014.Google ScholarGoogle Scholar
  5. Erol Gelenbe, Varol Kaptan, YuWang, Biological metaphors for agent behaviour, in: Computer and Information Sciences ISCIS 2004, 19th International Symposium, in: Lecturer Notes in Computer Science, vol. 3280, Springer-Verlag, 2004, pp. 667--675.Google ScholarGoogle ScholarCross RefCross Ref
  6. J.R.C. Piqueira, B.F. Navarro, L.H.A. Monteiro, Epidemiological models applied to virus in computer network, J. Comput. Sci. 1 (1), 2005, 31--34.Google ScholarGoogle ScholarCross RefCross Ref
  7. Y. Wang, C. X. Wang, Modelling the effect of timing parameters on virus propagation, in: 2003 ACM Workshop on Rapid Malcode, ACM, 2003, pp. 61--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Forest, S. Hofmeyr, A. Somayaji, T. Longstaff, Self-nonself discrimination in a computer, in: Proceeding of IEEE Symposium on Computer Security and Privacy, 1994, pp. 202--212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bimal K. Mishra, Navnit Jha, SEIQRS model for the transmission of malicious objects in computer network, Appl. Math. Model. 34 (2010) 710--715.Google ScholarGoogle ScholarCross RefCross Ref
  10. S. Yasin, K. Haseeb, R. Qureshi; "Cryptography Based Computer Security: A Review"; IJCSI; VOL. 9, Issue 2, No 1, March 2012.Google ScholarGoogle Scholar
  11. W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 115, 1927, 700--721.Google ScholarGoogle ScholarCross RefCross Ref
  12. W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 138, 1932, 55--83.Google ScholarGoogle ScholarCross RefCross Ref
  13. W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 141, 1933, 94--122.Google ScholarGoogle ScholarCross RefCross Ref
  14. N. Godbole, S. Belapure, "Cyber Security-Understanding Cyber Crimes, Computer Forensics and Legal Perspectives", 2015 Ed., Wiley India Pvt. Ltd., pp. 14.Google ScholarGoogle Scholar
  15. http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html#8Google ScholarGoogle Scholar
  16. http://www.cisco.com/c/en/us/products/collateral/security/traffic-anomaly-detector-xt-5600a/prod_white_paper0900aecd8011e927.htmlGoogle ScholarGoogle Scholar
  17. D. N. Shah, "Mark Stamp's Information Security Principles and Practices", 2014 Ed., Wiley India Pvt. Ltd, pp. 341--342.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICIA-16: Proceedings of the International Conference on Informatics and Analytics
    August 2016
    868 pages
    ISBN:9781450347563
    DOI:10.1145/2980258

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 25 August 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader