A queueing analysis for the denial of service (DoS) attacks in computer networks

Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

60 Citations (Scopus)

Abstract

In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in the current literature. In this paper, we propose one queueing model for the evaluation of the denial of service (DoS) attacks in computer networks. The network under DoS attacks is characterized by a two-dimensional embedded Markov chain model. With this model, we can develop a memory-efficient algorithm for finding the stationary probability distribution which can be used to find other interesting performance metrics such as the connection loss probability and buffer occupancy percentages of half-open connections for regular traffic and attack traffic. Different from previous works in the literature, this paper gives a more general analytical approach to the study of security measures of a computer network under DoS attacks. We hope that our approach opens a new avenue to the quantitative evaluation of more complicated security schemes in computer networks. © 2007 Elsevier B.V. All rights reserved.
Original languageEnglish
Pages (from-to)3564-3573
JournalComputer Networks
Volume51
Issue number12
DOIs
Publication statusPublished - 22 Aug 2007
Externally publishedYes

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Research Keywords

  • Connection loss probability
  • DoS attack
  • Network security
  • Queueing

Fingerprint

Dive into the research topics of 'A queueing analysis for the denial of service (DoS) attacks in computer networks'. Together they form a unique fingerprint.

Cite this