350 rub
Journal Nonlinear World №1 for 2024 г.
Article in number:
Computer simulation of DDOS attacks on continuous monitoring systems
Type of article: scientific article
DOI: https://doi.org/10.18127/j20700970-202401-05
UDC: 004.75
Authors:

A.I. Gayvoronskiy1, A.A. Kochkarov2, E.Y. Shchetinin3, S.V. Prokopchina4

1 Moscow Institute of Physics and Technology (Moscow, Russia)

2-4 Financial University under the Government of the Russian Federation (Moscow, Russia)

1 gayvoronskiy.ai@phystech.edu; 2 akochkarov@fa.ru; 3 eyshchetinin@fa.ru; 4 svprokopchina@fa.ru

Abstract:

The task of building models and analyzing the protection of continuous monitoring systems from cyber-attacks is currently becoming particularly relevant due to the rapid development and implementation of monitoring systems in various industries. Despite the constant development of the field, the task of identifying potential information threats to such systems remains at the same level with the development of means and methods of conducting cyber-attacks.

The purpose of this work is to develop a DDOS attack model for a spatially distributed continuous monitoring system with a hierarchical structure of connections between sensors. To define various criteria for the functionality of a spatially distributed continuous monitoring system when exchanging messages between the elements (sensors) of the system.

Results. During the study, the authors performed a number of experiments using computer modeling. Computer simulations of DDoS attacks on a spatially distributed continuous monitoring system were carried out in cases of system operation with and without load. The criteria of the system's operability over time are defined, and an approach to determining the system's serviceability based on Amdahl's law and evaluating the acceleration of the system is proposed. It is shown by the example of computer experiments that the model has practical significance, and the results of applying the model can be used to reduce the risks associated with DDoS attacks.

Pages: 40-46
For citation

Gayvoronskiy A.I., Kochkarov A.A., Shchetinin E.Y., Prokopchina S.V. Computer simulation of DDOS attacks on continuous monitoring systems. Nonlinear World. 2024. V. 22. № 1. P. 40-46. DOI: https://doi.org/10.18127/ j20700970-202401-05 (In Russian)

References
  1. Dovgal' V.A., Dovgal' D.V. Problemy i zadachi bezopasnosti intellektual'nyh setej, osnovannyh na internete veshhej. Vestnik Adygejskogo gosudarstvennogo universiteta. Ser. Estestvenno-matematicheskie i tehnicheskie nauki. 2017. Vyp. 4 (211). S. 140–147 (In Russian).
  2. Mel'nik Je.V., Klimenko A.B. Primenenie koncepcii «tumannyh» vychislenij pri proektirovanii vysokonadezh-nyh informacionno-upravljajushhih sistem. Izvestija Tul'skogo gosudarstvennogo universiteta. Tehnicheskie nauki. 2020. № 2. S. 273–283 (In Russian).
  3. Morozov A.V., Shahov V.G. Analiz atak na besprovodnye komp'juternye interfejsy. Omskij nauchnyj vestnik. 2012. № 3 (113). S. 323–327 (In Russian).
  4. Dovgal' V.A., Dovgal' D.V. Obnaruzhenie i predotvrashhenie ataki «zloumyshlennik v seredine» v tumannom sloe roja dronov. Vestnik AGU. 2020. Vyp. 2(261). S. 53-59 (In Russian).
  5. Peng H., Du B., Liu M., Liu M., Ji S., Wang S., Zhang X., He L. Dynamic graph convolutional network for long-term traffic flow prediction with reinforcement learning. Inf. Sci. 2021. № 578. Р. 401–416.
  6. Grishechkina T.A. Analiz atak na setevye protokoly v mobil'nyh sensornyh setjah adhoc. Izvestija JuFU. Tehnicheskie nauki. 2012. № 12(137) (In Russian).
  7. Chiang M., Zhang T. Fog and IoT: An Overview of Research Opportunities. IEEE Internet of Things Journal. Dec. 2016. V. 3. № 6. P. 854–864.
  8. Kochkarov A.A., Osipovich S.D., Kochkarov R.A. Raspoznavanija DDOS-atak na kriptovaljutnuju sistemu Bitkojn. Trudy tret'ej mezhdunar. nauch.-tehnich. konf. CDE'19 (g. Kazan', 22–24 maja 2019 g.). Kazan': OOO «Izdatel'skij Dom «Afina». 2019. S. 220-223 (In Russian).
  9. Hritankov A.S. Matematicheskaja model' harakteristik proizvoditel'nosti raspredeljonnyh vychislitel'nyh sis-tem. Trudy MFTI. 2010. T. 2. № 1(5). S. 110-115 (In Russian).
  10. Khan Inam, Abdollahi Arsin, Khan Muhammad, Uddin M. Irfan, Ullah Insaf. Securing Against DoS/DDoS Attacks in Internet of Flying Things using Experience-based Deep Learning Algorithm. 2021. 10.21203/rs.3.rs-271920/v1.
  11. Salamh Fahad, Karabiyik Umit, Rogers Marcus, AL-Hazemi Fawaz. Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs). 2019. Р. 704-710. 10.1109/IWCMC.2019.8766538.
Date of receipt: 16.01.2024
Approved after review: 13.02.2024
Accepted for publication: 02.03.2024