Research Distributed Attacks in Computer Networks


Gulmira Asaugalikyzy Shangytbayeva1, Bahytzhan Srazhatdinovich Akhmetov1, Roza Nuralievna Beysembekova1, Mikolaj Petrovich Karpinski2,  Erbol Amangazyevich Ospanov3
1Kazakh National Technical University after K.I. Satpayev, Republic of Kazakhstan, 050013, Almaty, 22a, Satpayev Street. 2Academy of technologies and the humanities in Bielsko-Biala, Poland, 43-309, Bielsko-Biala, 2, Willowa Street. 3Semey State University named after Shakarim, Republic of Kazakhstan, 071410, Semey, 20a, Glinka Street.

Download this article as:  PDF

ABSTRACT:

This paper deals with the questions of computer network, attacks, threats, network attacks, “Denial of Service”, DoS – attacks, DDoS – attacks, DRDoS – attacks, mathematical model. The article presents an approach to detection of the distributed network attacks to refusal in service, the offered method increases efficiency of use of the calculated resource of a computer network at the big distributed network attacks to “Denial of Service”. The paper proposes a mathematical model of compromised node and the number of all possible routes that can have an admission to access points, have done a comparative characteristics of attacks DoS / DDoS / DRDoS in computer network.

KEYWORDS:

Attacks; Threats; Network attacks; Computer network; DoS -attacks; DDoS-attacks; DRDoS-attacks; Mathematical model

Visited 323 times, 1 visit(s) today

Share

FOLLOW US ON:

facebook Twitter Mendeley LinkedIn


SEARCH WEBSITE


MEMBER OF

Logo-image


JOURNAL ARCHIVED IN

Logo-image


Visited 323 times, 1 visit(s) today