Skip to main content
Top

2019 | OriginalPaper | Chapter

Research on DOS Attack Effect Evaluation Technology

Authors : Bingbing Wang, Jie Chen

Published in: Recent Developments in Intelligent Computing, Communication and Devices

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

DoS attack is easy to implement, difficult to prevent, and is one of the most common ways of security threats nowadays. Its effect assessment is an important research content in safety evaluation. In this paper, an index system based on resource consumption type, service quality type, and attack attribute is established. Using the fuzzy synthesis evaluation model, the fuzzy vector and the single value result can be calculated, an evaluation method of quantitative attack effect is proposed. Finally, the feasibility and rationality of the method are proved by an example.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Dequan Li. Denial of service attack. [M] Beijing: Publishing House of Electronics Industry, 2007:85–88. Dequan Li. Denial of service attack. [M] Beijing: Publishing House of Electronics Industry, 2007:85–88.
2.
go back to reference Peng Su, X Chen, et al. Research on user-centric DoS attack impact assessment. [J]. Computer Engineering and Design, 2008, 29(15):3834–3836. Peng Su, X Chen, et al. Research on user-centric DoS attack impact assessment. [J]. Computer Engineering and Design, 2008, 29(15):3834–3836.
3.
go back to reference Juan Chen, Tao Ma. DoS Attack Effect Assessment Method in Mobile Ad Hoc Network. [J]. Electronics Optics & Control, 2012, 19(3):86–89. Juan Chen, Tao Ma. DoS Attack Effect Assessment Method in Mobile Ad Hoc Network. [J]. Electronics Optics & Control, 2012, 19(3):86–89.
4.
go back to reference Peng Ai, Yan Jia. A DDoS Attack Effect Evaluation Method. [J]. Journal of National University of Defense Technology, 2015:64–67. Peng Ai, Yan Jia. A DDoS Attack Effect Evaluation Method. [J]. Journal of National University of Defense Technology, 2015:64–67.
5.
go back to reference Satty T L. How to Make a Decision: The Analytic Hierarchy Process [J]. European Joumal of Operational Research, 1990, 1(48):9–26. Satty T L. How to Make a Decision: The Analytic Hierarchy Process [J]. European Joumal of Operational Research, 1990, 1(48):9–26.
6.
go back to reference Chang D Y. Applications of the extent analysis method on fuzzy AHP [J]. European journal of operational research, 1996, 95(3): 649–655. Chang D Y. Applications of the extent analysis method on fuzzy AHP [J]. European journal of operational research, 1996, 95(3): 649–655.
7.
go back to reference Fu Y, Wu X P, et al. An approach for information systems security risk assessment on fuzzy set and entropy-weight [J]. Act Electronica Sinica, 2010, 38(7):1489–1494. Fu Y, Wu X P, et al. An approach for information systems security risk assessment on fuzzy set and entropy-weight [J]. Act Electronica Sinica, 2010, 38(7):1489–1494.
8.
go back to reference Wang Y J, Jiang L, et al. Research of Online Evaluation Model and Algorithm for Network Attack Effect [J]. Computer Science, 2007:72–74. Wang Y J, Jiang L, et al. Research of Online Evaluation Model and Algorithm for Network Attack Effect [J]. Computer Science, 2007:72–74.
Metadata
Title
Research on DOS Attack Effect Evaluation Technology
Authors
Bingbing Wang
Jie Chen
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8944-2_109

Premium Partner