Abstract
In practice the most part of connections of subjects of a wide area network uses the virtual connections as this method is the dynamic protection of network connection and won't use static key information. Therefore, the interaction without establishing a virtual channel is one of the possible reasons for the success of remote attacks such as DoS / DDoS. An abstract considers the mathematical model of system of protection of computer networks against attacks such as DoS/DDoS, allowing in practice to detect attacks such as DoS / DDoS. Grounded way to prevent attacks through the use of network reconfiguration procedures, it is difficult for practical implementation attacks such as DoS / DDoS. The algorithm to create new virtual data channels to ensure a minimum amount of traffic regardless of reconfiguring computer network. The article presents an approach to detection of the distributed network attacks to refusal in service, the offered method increases efficiency of use of the calculated resource of a computer network at the big distributed network attacks to “Denial of Service”.
Highlights
Computer network providing every opportunity for exchanging data between the client and server, but widely distributed attack denial of service clients, the determination of distributed attacks in the network is acute
Denial of Service (DoS) / DDoS attacks are characterized by a straightforward implementation complexity and resistance, which poses new problems of researchers, who are still not yet resolved
It is known that the routing protocol in data transfer is rule set and arrangements on an exchange of information network between routers to determine the data path transfer which satisfies to the given parameters of quality of service and provides the balancing load of all computer network in general the research problem of network traffic acquires special relevance (Wang J., & Chien, A, 2003)
Summary
Computer network providing every opportunity for exchanging data between the client and server, but widely distributed attack denial of service clients, the determination of distributed attacks in the network is acute. The most common types of such attacks are DoS / DDoS attacks, which deny certain users of computer network services. It is known that the routing protocol in data transfer is rule set and arrangements on an exchange of information network between routers to determine the data path transfer which satisfies to the given parameters of quality of service and provides the balancing load of all computer network in general the research problem of network traffic acquires special relevance (Wang J., & Chien, A, 2003)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have