
Method for assessing the operating quality of a switching node in a technological transmission network data in the context of DDoS attacks by an intruder
Author(s) -
Andrey Privalov,
Vera Lukicheva,
D N Tsvetkov,
Serhiy Titov
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/2131/2/022095
Subject(s) - denial of service attack , computer science , node (physics) , quality of service , network packet , context (archaeology) , transmission (telecommunications) , computer network , quality (philosophy) , representation (politics) , service (business) , distributed computing , engineering , the internet , telecommunications , politics , law , political science , paleontology , structural engineering , epistemology , world wide web , economics , biology , philosophy , economy
The purpose of this study is to develop a mechanism to account for the effects of a distributed denial of service attack on a switching node, as well as to assess the quality of its functioning under destructive effects. Relevance stems from the possibility of disruption of regional economic complex management due to the impact on the elements of the technological network of data transmission attacker type “distributed denial of service”. Based on the mathematical apparatus of GERT-networks the authors propose an approach to assess the quality of switching nodes. The essence lies in the representation of the data flow service node switching network data transmission under attack by an intruder in the form of a stochastic network, setting the type of partial distributions, the definition of the equivalent function, followed by determining the distribution function delay time packets. The model proposed by the authors allows to evaluate the quality of switching nodes operation under the conditions of “distributed denial of service” intruder attacks, both when transmitting stationary Poisson and self-similar traffic, represented by the Weibull and Pareto flow models. The results obtained are in good agreement with the data given in previously published works. The model allows to analyze and develop directions to improve the quality of functioning of switching nodes of technological network of data transmission under conditions of destructive information impact of the intruder.