Abstract

In practice the most part of connections of subjects of a wide area network uses the virtual connections as this method is the dynamic protection of network connection and won't use static key information. Therefore, the interaction without establishing a virtual channel is one of the possible reasons for the success of remote attacks such as DoS / DDoS. An abstract considers the mathematical model of system of protection of computer networks against attacks such as DoS/DDoS, allowing in practice to detect attacks such as DoS / DDoS. Grounded way to prevent attacks through the use of network reconfiguration procedures, it is difficult for practical implementation attacks such as DoS / DDoS. The algorithm to create new virtual data channels to ensure a minimum amount of traffic regardless of reconfiguring computer network. The article presents an approach to detection of the distributed network attacks to refusal in service, the offered method increases efficiency of use of the calculated resource of a computer network at the big distributed network attacks to “Denial of Service”.

Highlights

  • Computer network providing every opportunity for exchanging data between the client and server, but widely distributed attack denial of service clients, the determination of distributed attacks in the network is acute

  • Denial of Service (DoS) / DDoS attacks are characterized by a straightforward implementation complexity and resistance, which poses new problems of researchers, who are still not yet resolved

  • It is known that the routing protocol in data transfer is rule set and arrangements on an exchange of information network between routers to determine the data path transfer which satisfies to the given parameters of quality of service and provides the balancing load of all computer network in general the research problem of network traffic acquires special relevance (Wang J., & Chien, A, 2003)

Read more

Summary

Introduction

Computer network providing every opportunity for exchanging data between the client and server, but widely distributed attack denial of service clients, the determination of distributed attacks in the network is acute. The most common types of such attacks are DoS / DDoS attacks, which deny certain users of computer network services. It is known that the routing protocol in data transfer is rule set and arrangements on an exchange of information network between routers to determine the data path transfer which satisfies to the given parameters of quality of service and provides the balancing load of all computer network in general the research problem of network traffic acquires special relevance (Wang J., & Chien, A, 2003)

Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call