Manuscript accepted on :
Published online on: 03-02-2016
Research Distributed Attacks in Computer Networks
Gulmira Asaugalikyzy Shangytbayeva1, Bahytzhan Srazhatdinovich Akhmetov1, Roza Nuralievna Beysembekova1, Mikolaj Petrovich Karpinski2, Erbol Amangazyevich Ospanov3
1Kazakh National Technical University after K.I. Satpayev, Republic of Kazakhstan, 050013, Almaty, 22a, Satpayev Street. 2Academy of technologies and the humanities in Bielsko-Biala, Poland, 43-309, Bielsko-Biala, 2, Willowa Street. 3Semey State University named after Shakarim, Republic of Kazakhstan, 071410, Semey, 20a, Glinka Street.
ABSTRACT: This paper deals with the questions of computer network, attacks, threats, network attacks, “Denial of Service”, DoS – attacks, DDoS – attacks, DRDoS – attacks, mathematical model. The article presents an approach to detection of the distributed network attacks to refusal in service, the offered method increases efficiency of use of the calculated resource of a computer network at the big distributed network attacks to “Denial of Service”. The paper proposes a mathematical model of compromised node and the number of all possible routes that can have an admission to access points, have done a comparative characteristics of attacks DoS / DDoS / DRDoS in computer network.
KEYWORDS: Attacks; Threats; Network attacks; Computer network; DoS -attacks; DDoS-attacks; DRDoS-attacks; Mathematical model
Download this article as:Copy the following to cite this article: Shangytbayeva G. A, Akhmetov B. S, Beysembekova R. N, Karpinski M. P, Ospanov E. A.Research Distributed Attacks in Computer Networks. Biosci Biotech Res Asia 2015;12(1) |
Copy the following to cite this URL: Shangytbayeva G. A, Akhmetov B. S, Beysembekova R. N, Karpinski M. P, Ospanov E. A.Research Distributed Attacks in Computer Networks. Biosci Biotech Res Asia 2015;12(1).Available from: https://www.biotech-asia.org/?p=6129> |
This work is licensed under a Creative Commons Attribution 4.0 International License.