Abstract

The application of the Monte Carlo method to solving the problem of identifying and assessing the protection against DDoS attacks of weak nodes is considered. The field of research is of practical and theoretical interest, since the methods developed by the classical theory of reliability are focused on simple, stationary flows. Under the conditions of DDoS attacks, the flow of attacking requests is not stationary, so the known analytical models give an unacceptable error. For the reliability of the results, the freedom to choose the distribution function, the moments of arrival of the attacking requests, their duration and the response of the attacked node is required. The method is applicable for modelling a computer network when organizing an information security audit.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.