Simulation of a DDoS Attack in the Trunk Channel
https://doi.org/10.56304/S2304487X21040052
Abstract
Earlier, we showed that when aggregating network traffic measurements, starting from a certain aggregation window, a stable distribution is formed, which is approximated with a high accuracy by a lognormal law. In addition, we observed a violation of this law during a hacker attack on a small local area network. The procedure for organizing a DDoS attack using measurements of Internet traffic, recorded in the trunk channel is discussed in this work. It has been found that when simulating a DDoS attack, no violation of the log-normal law is observed. Therefore, to verify the deviation from the lognormal law in a hacker attack on a net-work, it is necessary to organize a controlled DDoS attack on a specific network resource.
About the Authors
V. V. IvanovRussian Federation
141980
Moscow oblast
Dubna
V. V. Ivanov
Russian Federation
141980
115409
Moscow oblast
Dubna
Moscow
A. V. Kryanev
Russian Federation
115409
Moscow
A. S. Prikazchikova
Russian Federation
115409
Moscow
I. I. Tatarinov
Russian Federation
141980
Moscow oblast
Dubna
Moscow
References
1. Zrelov P. V., Ivanov Valery V., Ivanov Victor V., Kryukov Yu. A., Tatarinov I. I.. Study of Internet-Traffic Features in the Trunk Channel, Physics of Particles and Nuclei Letters, 2019, vol. 16, no. 3. P. 289–299.
2. Antoniou I., Ivanov V. V., Ivanov Valery V., and Zrelov P. V. On the Log-Normal Distribution of Network Traffic, Physica D. Nonlinear Phenomena., 2002, vol. 167, pp. 72–85.
3. Antoniou I., Ivanov V. V., Ivanov Valery V., and Zrelov P. V. Statistical Model of Network Traffic, Fizika elementarnih chastits i atomnogo yadra. (FEChAYa), 2004, vol. 35, no. 4. P. 984–1019.
4. Ivanov V. V., Ivanov V. V., Kryanev A. V., Tatarinov I. I., Appraksimatsita izmerenii internet-trafika v magistralnom kanale cummoi lognormal”nih raspredelenii, Vestnik “MEPhI”, 2019, vol. 8, no. 4. P. 380–394.
5. Ivanov V. V. Statisticheskaya model' informacionnogo trafika. Avtoref. Diss. kand. Phiz.-math. nauk .[Statistical model of information traffic. Avtoref. Dr. phys. and math. sci. diss.], Dubna, 2009.
6. Ivanov V. V., Ivanov Valery V., Kryukov Yu. A. and Zrelov P. V. Detection of Abrupt Changes in Network Trafic Dynamics. Annual report 2004–2005 years. Laboratory of Information Technologies. Ed. by Adam Gh., Ivanov V. V. and Strizh T. A., JINR, 2005–179, Dubna, 2005. P. 66–72.
7. MAWI Working Group Traffic Archive. URL: http://mawi.wide.ad.jp/mawi/ (accessed 18. 01. 2020)
8. Dittrich D., Mirkovic J., Reiher P., Dietrich S.. Internet Denial of Service: Attack and Defense Mechanisms. Moscow, Pearson Education Publ., 2004, p. 400, ISBN 0132704544, 9780132704540.
Review
For citations:
Ivanov V.V., Ivanov V.V., Kryanev A.V., Prikazchikova A.S., Tatarinov I.I. Simulation of a DDoS Attack in the Trunk Channel. Vestnik natsional'nogo issledovatel'skogo yadernogo universiteta "MIFI". 2021;10(4):349-356. (In Russ.) https://doi.org/10.56304/S2304487X21040052