Introduction to queueing theory (2nd ed)
Introduction to queueing theory (2nd ed)
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
Computer Networks: The International Journal of Computer and Telecommunications Networking
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A queueing analysis for the denial of service (DoS) attacks in computer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Defending against flooding-based distributed denial-of-service attacks: a tutorial
IEEE Communications Magazine
Queue management as a DoS counter-measure?
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |
In this paper, we considera queueing model of computer network under DoS attacks.The arrival of SYN packets contains two types: the regular request packets and the attack packets that request for connections. We assume that the connection requests arrive according to a Poisson processes and the service times are general but different for the two types of requests. A maximum number of connections can be served at the same time. Each half-open connection is held for at most a deterministic or random period of time (timeout). We obtain the steady-state probability distribution of the stochastic process describing the evolution of such a system. Next, we show how to compute some security metrics such as the loss-probability or the buffer occupancy percentage of half-open connections for attack packets.