iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-540-69848-7_41
Queueing Analysis for Networks Under DoS Attack | SpringerLink
Skip to main content

Queueing Analysis for Networks Under DoS Attack

  • Conference paper
Computational Science and Its Applications – ICCSA 2008 (ICCSA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5073))

Included in the following conference series:

Abstract

In this paper, we considera queueing model of computer network under DoS attacks. The arrival of SYN packets contains two types: the regular request packets and the attack packets that request for connections. We assume that the connection requests arrive according to a Poisson processes and the service times are general but different for the two types of requests. A maximum number of connections can be served at the same time. Each half-open connection is held for at most a deterministic or random period of time (timeout). We obtain the steady-state probability distribution of the stochastic process describing the evolution of such a system. Next, we show how to compute some security metrics such as the loss-probability or the buffer occupancy percentage of half-open connections for attack packets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Moore, D., Voelker, G., Savage, S.: Inferring Internet Denial-of-Service Activity. In: Proceedings of the 2001 USENIX Security Symposium, pp. 9–22. IEEE Press, New York (2001)

    Google Scholar 

  2. Long, M., Wu, C.-H., Hung, Y.: Denial of Service Attacks on Network-Based Control Systems: Impact and Mitigation. IEEE Transactions on Industrial Informatics 1(2), 85–96 (2005)

    Article  Google Scholar 

  3. Khan, S., Traore, I.: Queue-based Analysis of DoS Attacks. In: Proceedings IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, pp. 266–273. IEEE Press, New York (2005)

    Google Scholar 

  4. Wang, Y., Lin, C., Li, Q.-L., Fang, Y.: A Queueing Analysis for the Denial of Service (DoS) Attacks. Computer Networks 51, 3564–3573 (2007)

    Article  MATH  Google Scholar 

  5. Boteanu, D., Fernandez, J.M., McHugh, J., Mullins, J.: Queue Management as a DoS counter-measure? In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 263–280. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Gnedenko, B.V., Kovalenko, I.N.: Introduction to Queueing Theory, Nauka, Moscow (1967)

    Google Scholar 

  7. Chang, R.K.C.: Defending Against Flooding-Based Distributed Denial-of-Service Attacks: A tutorial. IEEE Communications Magazine 40(10), 42–51 (2002)

    Article  Google Scholar 

  8. Xenakis, C., Laoutaris, N., Merakos, L., Stavrakis, L.: A Generic Characterization of the Overheads Imposed by IPsec and Associated Cryptographic Algorithms. Computer Networks 5(17), 3225–3241 (2006)

    Article  Google Scholar 

  9. Mirkovic, J., Reiher, P.: A Taxonomy of DDoS Defence Mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39–53 (2004)

    Article  Google Scholar 

  10. Sevastianov, B.A.: An Ergodic Theorem for Markov Processes and its Application to Telephone Systems with Refusals. Theory of Probability and it’s applications, Tom II 1, 106–116 (1957)

    Google Scholar 

  11. Foster, L., Cao, J., Cleveland, W., Lin, D., Sun, D.: Internet traffic tends toward Poisson and independent as the load increases. In: Denison, D., Hansen, M., Holmes, C., Mallick, B., Yu, B. (eds.) Nonlinear estimation and Classification. LNCS, vol. 171, pp. 83–110. Springer, Heidelberg (2003)

    Google Scholar 

  12. Borovkov, A.A.: Ergodicity and Stability of Stochastic Processes. Wiley Series in Prob. & Stat. J. Wiley & Sons, Chichester (1998)

    MATH  Google Scholar 

  13. Sengupta, D., Deshpande, J.V.: Some Results on the Relative Ageing of Two Life Distributions. J.Appl. Prob. 31, 991–1003 (1994)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Osvaldo Gervasi Beniamino Murgante Antonio Laganà David Taniar Youngsong Mun Marina L. Gavrilova

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aissani, A. (2008). Queueing Analysis for Networks Under DoS Attack. In: Gervasi, O., Murgante, B., Laganà, A., Taniar, D., Mun, Y., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2008. ICCSA 2008. Lecture Notes in Computer Science, vol 5073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69848-7_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69848-7_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69840-1

  • Online ISBN: 978-3-540-69848-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics