Preview

Vestnik natsional'nogo issledovatel'skogo yadernogo universiteta "MIFI"

Advanced search

Simulation of a DDoS Attack in the Trunk Channel

https://doi.org/10.56304/S2304487X21040052

Abstract

   Earlier, we showed that when aggregating network traffic measurements, starting from a certain aggregation window, a stable distribution is formed, which is approximated with a high accuracy by a lognormal law. In addition, we observed a violation of this law during a hacker attack on a small local area network. The procedure for organizing a DDoS attack using measurements of Internet traffic, recorded in the trunk channel is discussed in this work. It has been found that when simulating a DDoS attack, no violation of the log-normal law is observed. Therefore, to verify the deviation from the lognormal law in a hacker attack on a net-work, it is necessary to organize a controlled DDoS attack on a specific network resource.

About the Authors

V. V. Ivanov
Joint Institute for Nuclear Research
Russian Federation

141980

Moscow oblast

Dubna



V. V. Ivanov
Joint Institute for Nuclear Research; National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)
Russian Federation

141980

115409

Moscow oblast

Dubna

Moscow



A. V. Kryanev
National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)
Russian Federation

115409

Moscow



A. S. Prikazchikova
National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)
Russian Federation

115409

Moscow



I. I. Tatarinov
Joint Institute for Nuclear Research; Kaspersky Lab
Russian Federation

141980

Moscow oblast

Dubna

Moscow



References

1. Zrelov P. V., Ivanov Valery V., Ivanov Victor V., Kryukov Yu. A., Tatarinov I. I.. Study of Internet-Traffic Features in the Trunk Channel, Physics of Particles and Nuclei Letters, 2019, vol. 16, no. 3. P. 289–299.

2. Antoniou I., Ivanov V. V., Ivanov Valery V., and Zrelov P. V. On the Log-Normal Distribution of Network Traffic, Physica D. Nonlinear Phenomena., 2002, vol. 167, pp. 72–85.

3. Antoniou I., Ivanov V. V., Ivanov Valery V., and Zrelov P. V. Statistical Model of Network Traffic, Fizika elementarnih chastits i atomnogo yadra. (FEChAYa), 2004, vol. 35, no. 4. P. 984–1019.

4. Ivanov V. V., Ivanov V. V., Kryanev A. V., Tatarinov I. I., Appraksimatsita izmerenii internet-trafika v magistralnom kanale cummoi lognormal”nih raspredelenii, Vestnik “MEPhI”, 2019, vol. 8, no. 4. P. 380–394.

5. Ivanov V. V. Statisticheskaya model' informacionnogo trafika. Avtoref. Diss. kand. Phiz.-math. nauk .[Statistical model of information traffic. Avtoref. Dr. phys. and math. sci. diss.], Dubna, 2009.

6. Ivanov V. V., Ivanov Valery V., Kryukov Yu. A. and Zrelov P. V. Detection of Abrupt Changes in Network Trafic Dynamics. Annual report 2004–2005 years. Laboratory of Information Technologies. Ed. by Adam Gh., Ivanov V. V. and Strizh T. A., JINR, 2005–179, Dubna, 2005. P. 66–72.

7. MAWI Working Group Traffic Archive. URL: http://mawi.wide.ad.jp/mawi/ (accessed 18. 01. 2020)

8. Dittrich D., Mirkovic J., Reiher P., Dietrich S.. Internet Denial of Service: Attack and Defense Mechanisms. Moscow, Pearson Education Publ., 2004, p. 400, ISBN 0132704544, 9780132704540.


Review

For citations:


Ivanov V.V., Ivanov V.V., Kryanev A.V., Prikazchikova A.S., Tatarinov I.I. Simulation of a DDoS Attack in the Trunk Channel. Vestnik natsional'nogo issledovatel'skogo yadernogo universiteta "MIFI". 2021;10(4):349-356. (In Russ.) https://doi.org/10.56304/S2304487X21040052

Views: 177


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2304-487X (Print)