Abstract
The effective construction of systems and that are embedded in an automated or organisational context is a major difficulty in modern research. These systems are built so that customers, manufacturers, users, and better understand of a system and how it can be installed, used, altered, and enhanced with the help of the model. Petri nets are used to represent and investigate discrete systems such as running in parallel, web - based, concurrent, and non-deterministic systems, among others. It has a strong mathematical foundation and also the ability to model in a graphical form. With its significant development and advancements in recent years, network has pervaded every part of our lives. As a result of this process, a growing number of critical network security issues have arisen, including network intrusion issues.The aim of this article is to present an approach to develop and verify a method for modeling of network attacks either at server side or client side. Moreover the goal is to prove that the method enables one to design models resembling the same behaviour of attacks that support the detection process of selected network attacks and facilitate the application of countermeasures. The most common network threat targeting end users and servers are caused by DDoS. The DDoS detection process can be performed either by understanding the properties of attacks or analysing its behavioural models. The proposed approach to modeling of attacks is based on Petri nets. The designed framework is designed detecting DDoS attack at the server side and mitigates the network attacks. The system's major elements are detection and packet classification based on the confidence index value. The CI value helps to detect untrusted network attacks and prioritize the attacks. An algorithm for detecting untrusted network attack is designed and modelled using Petri nets.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.