Skip to main content
Top

2013 | OriginalPaper | Chapter

16. Formal Model of Time for Analyzing Denial-of-Service Attacks

Authors : Shin-ya Nishizaki, Ritsuya Ikeda

Published in: Informatics and Management Science IV

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A denial-of-service attack (DoS attack) is an attempt to make a system resource unavailable to its intended users. Several types of DoS attacks are known. A SYN flood attack is a typical DoS attack, exploiting the vulnerability of TCP’s three-way handshake with respect to imbalances between the computational costs of clients and server. In addition to cost imbalance, the amount of cost over a given short term is also an indispensable factor in DoS attacks, including SYN flood attacks. In this paper, we propose a process calculus for formalizing computational costs and cost amounts over the short term. This procedure is called the “timed spice-calculus”, and was developed by improving the prototypic theory of preliminary studies, known as the spice-calculus. Time is modeled as a hierarchical ordered structure with respect to types of processing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Meadows C (1999) A formal framework and evaluation method for network denial of service. In: Proceeding of the 12th IEEE Computer Security Foundations Workshop, vol 245, pp 4–13 Meadows C (1999) A formal framework and evaluation method for network denial of service. In: Proceeding of the 12th IEEE Computer Security Foundations Workshop, vol 245, pp 4–13
2.
go back to reference Tomioka D, Nishizaki S, Ikeda R (2004) A cost estimation calculus for analyzing the resistance to denial-of-service attack. Software security theories and systems. Lect Notes Comput Sci 3233:25–44CrossRef Tomioka D, Nishizaki S, Ikeda R (2004) A cost estimation calculus for analyzing the resistance to denial-of-service attack. Software security theories and systems. Lect Notes Comput Sci 3233:25–44CrossRef
4.
go back to reference Abadi M, Gordon AD (1997) A calculus for cryptographic protocols the spicalculus. In: 4th ACM conference on computer and communication security, vol 1. ACM Press, pp 36–47 Abadi M, Gordon AD (1997) A calculus for cryptographic protocols the spicalculus. In: 4th ACM conference on computer and communication security, vol 1. ACM Press, pp 36–47
5.
go back to reference Cervesato I (2004) Fine-grained msr specifications for quantitative security analysis. In: Proceedings of the fourth workshop on issues in the theory of security WITS, vol 04, pp 112–117 Cervesato I (2004) Fine-grained msr specifications for quantitative security analysis. In: Proceedings of the fourth workshop on issues in the theory of security WITS, vol 04, pp 112–117
6.
go back to reference Ikeda R, Narita K, Nishizaki S (2009) Cooperative approach to quality and quantitative cost analyses of distributed systems. In: Proceedings of the 13th IASTED international conference on software engineering and application—SEA, vol 1, pp 126–132 Ikeda R, Narita K, Nishizaki S (2009) Cooperative approach to quality and quantitative cost analyses of distributed systems. In: Proceedings of the 13th IASTED international conference on software engineering and application—SEA, vol 1, pp 126–132
7.
go back to reference R Ikeda, T Oohata, and S ya Nishizaki (2009) Formalization of broadcast communication in process calculus and its model checking. In: Proceedings of the 4th international conference on software and data technologies, vol 1, pp 348–352 R Ikeda, T Oohata, and S ya Nishizaki (2009) Formalization of broadcast communication in process calculus and its model checking. In: Proceedings of the 4th international conference on software and data technologies, vol 1, pp 348–352
Metadata
Title
Formal Model of Time for Analyzing Denial-of-Service Attacks
Authors
Shin-ya Nishizaki
Ritsuya Ikeda
Copyright Year
2013
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-4793-0_16

Premium Partners