<?xml version="1.0" encoding="UTF-8"?>



<records>

  <record>
    <language>eng</language>
          <publisher>Oriental Scientific Publishing Company</publisher>
        <journalTitle>Biosciences Biotechnology Research Asia</journalTitle>
          <issn>0973-1245</issn>
            <publicationDate>2015-04-28</publicationDate>
    
        <volume>12</volume>
        <issue>1</issue>

 
    <startPage>737</startPage>
    <endPage>744</endPage>

	    <publisherRecordId>6129</publisherRecordId>
    <documentType>article</documentType>
    <title language="eng">Research Distributed Attacks in Computer Networks</title>

    <authors>
	 


      <author>
       <name>Gulmira Asaugalikyzy Shangytbayeva</name>

 
		
	<affiliationId>1</affiliationId>
      </author>
    

	 


      <author>
       <name>Bahytzhan Srazhatdinovich Akhmetov</name>


		
	<affiliationId>1</affiliationId>

      </author>
    

	 


      <author>
       <name>Roza Nuralievna Beysembekova</name>

		
	<affiliationId>1</affiliationId>
      </author>
    

	 


      <author>
       <name>Mikolaj Petrovich Karpinski</name>

		
	<affiliationId>2</affiliationId>
      </author>
    


	 


      <author>
       <name>Erbol Amangazyevich Ospanov</name>

		
	<affiliationId>3</affiliationId>
      </author>
    


	
    </authors>
    
	    <affiliationsList>
	    
		
		<affiliationName affiliationId="1">Kazakh National Technical University after K.I. Satpayev, Republic of Kazakhstan, 050013, Almaty, 22a, Satpayev Street. </affiliationName>
    

		
		<affiliationName affiliationId="2">Academy of technologies and the humanities in Bielsko-Biala, Poland, 43-309, Bielsko-Biala, 2, Willowa Street. </affiliationName>
    
		
		<affiliationName affiliationId="3">Semey State University named after Shakarim, Republic of Kazakhstan, 071410, Semey, 20a, Glinka Street.</affiliationName>
    
		
		
		
	  </affiliationsList>






    <abstract language="eng">This paper deals with the questions of computer network, attacks, threats,
network attacks, “Denial of Service”, DoS – attacks, DDoS – attacks, DRDoS – attacks,
mathematical model. The article presents an approach to detection of the distributed
network attacks to refusal in service, the offered method increases efficiency of use of the
calculated resource of a computer network at the big distributed network attacks to
“Denial of Service”. The paper proposes a mathematical model of compromised node and
the number of all possible routes that can have an admission to access points, have done
a comparative characteristics of attacks DoS / DDoS / DRDoS in computer network.</abstract>

    <fullTextUrl format="html">https://www.biotech-asia.org/vol12no1/research-distributed-attacks-in-computer-networks/</fullTextUrl>



      <keywords language="eng">
        <keyword>Attacks; Threats; Network attacks; Computer network; DoS -attacks; DDoS-attacks; DRDoS-attacks; Mathematical model</keyword>
      </keywords>

  </record>
</records>