DEVELOPMENT OF THE CONCEPT OF PREDICTING THE START TIME OF A DDOS ATTACK BASED ON THE STUDY OF THE DYNAMICS OF THE BEHAVIOR OF EVOLUTIONARY EQUATIONS

DOI: 10.31673/2412-4338.2024.012644

Authors

  • В. А. Савченко, (Savchenko V. A.) State University of Information and Communication Technologies, Kyiv
  • Б. С. Степанченко, (Stepanchenko B. S.) State University of Information and Communication Technologies, Kyiv

Abstract

The modern information space is formed by networks of complex technical systems of interconnected devices and devices that exchange information and resources. They are the fundamental basis for many modern technologies, including the Internet, data networks, social networks, etc. An undeniable prerequisite for ensuring the stability of modern information systems against unauthorized access in general and DDoS attacks in particular is the implementation of the concept of proactive protection. This means that cybersecurity measures must be implemented before a data breach or attack occurs. The paper analyzes the current state and approaches to detecting cyber threats for information systems of corporate networks, provides a classification of cyber threats and describes the anatomy of DDoS attacks. The work examines the anatomy of DDoS-attacks and methods of countering DDoS-attacks, which allow effective protection of the information network, as well as against attacks by intruders. A mathematical apparatus for identifying cyberthreats and determining strategies for minimizing the risks of unauthorized access by attackers to network information resources has been developed, which is based on the methods of the qualitative theory of systems of differential equations with impulse action. Using the methods of the phase plane, the peculiarities of the behavior of complex systems are studied, the mathematical models of which are represented by systems of differential equations with impulse. Constructive conditions of stability and asymptotic stability of the SIR-model, which is a mathematical model of network vulnerability due to aggressive actions of attackers, have been obtained. The conditions for minimizing the vulnerabilities of network elements through the implementation of various strategies for reducing the number of infected devices have been established: the strategy of "permanent vaccination", the strategy of "pulse vaccination" and the periodic case of implementing the concept of updating and updating software to counter DDoS attacks. It was established that the threat resistance of the network is inversely proportionally determined by the ratio of the vulnerability rate of devices in the network to the lost and restored devices, and an estimate of the software update period for protection against cyber threats was obtained.

Keywords: cyber-attack, DDoS attack, botnet, SIR model, stability, cyber-attack strategy.

References
1. Serhii Yevseiev, Volodymir Ponomarenko, Oleksandr Laptiev, Oleksandr Milov Synergy of building cybersecurity systems: monograph / S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milov and others. – Kharkiv: PC TECHNOLOGY CENTER, 2021. – 188 p. DOI: 10.15587/978-617-7319-31-2
2. Yevseiev, S., Khokhlachova, Yu., Ostapov, S., Laptiev, O., Korol, O., Milevskyi, S. et. al.; Yevseiev, S., Khokhlachova, Yu., Ostapov, S., Laptiev, O. (Eds.) (2023). Models of socio-cyber-physical systems security. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 184.
3. Barabash O.V., Musienko A.P., Sobchuk V.V. Basics of ensuring the functional stability of information systems of enterprises under the influence of destabilizing factors: monograph. Kyiv: Millennium, 2022. 272 p.
4. Barabash, O., Sobchuk, V., Musienko, A., Laptiev, O., Bohomia, V., Kopytko, S. (2023). System Analysis and Method of Ensuring Functional Sustainability of the Information System of a Critical Infrastructure Object. In: Zgurovsky, M., Pankratova, N. (eds) System Analysis and Artificial Intelligence. Studies in Computational Intelligence, vol 1107. Springer, Cham. https://doi.org/10.1007/978-3-031-37450-0_11
5. Sobchuk, V., Barabash, O., & Musienko, A. (2021). The influence of the method of adaptive self-diagnosis on the process of preventing the consequences of failures of modules of the information system of the enterprise. // Collection of scientific works of the Military Institute of Taras Shevchenko Kyiv National University, (70), 77–88. https://doi.org/10.17721/2519-481X/2021/70-08.
6. Sobchuk A.V., Sobchuk V.V., Barabash O.V., Lyashenko I.O. Functionally sustainable wireless sensor network technologies aspects analysis // Science and Education a New Dimension. Natural and Technical Sciences, 2019. – VII (23), Issue 193, Budapest, Hungary, pp. 46 – 48.
7. Sobchuk V.V., Dovzhenko N.M., Koval M.O. Mathematical model of multi-criteria optimization of service quality of sensor networks using the principle of fairness // Scientific journal "Telecommunications and Information Technologies". - K.: DUT. – No. 3 (64). - pp. 90 - 97.
8. Sobchuk V.V., Laptev O.A., Salanda I.P., Sachuk Yu.V. Mathematical model of the structure of the information network based on non-stationary hierarchical and stationary hyper-network // Collection of scientific papers of Taras Shevchenko Military Institute of Kyiv National University. - K.: VIKNU, 2019. - Issue 64. - pp. 124 – 132.
9. Laptev O.A., Sobchuk V.V., Savchenko V.A. A method of increasing the immunity of the system of detection, recognition and localization of digital signals in information systems // Collection of scientific papers of the Military Institute of Taras Shevchenko Kyiv National University. - K.: VIKNU, 2019. - Issue 66. – pp. 90 – 104.
10. Laptiev, O., Sobchuk, V., Sobchuk, A., Laptiev, S. & Laptieva, T. (2021). An improved model for estimating the economic costs of the information protection system in social networks. Electronic professional scientific publication "Cybersecurity: education, science, technology; 4(12), 19-28. https://doi.org/10.28925/2663-4023.2021.12.1928
11. Zamrii I.V., Sobchuk V.V., Barabash A.O. Identification of input elements of the information space and restoration of their parameters in the unified information space of the production enterprise with critical infrastructure. Collection of scientific works of the Military Institute of Taras Shevchenko Kyiv National University. No. 75. 2022. pp. 78– 87. https://doi.org/10.17721/2519-481X/2022/75-08
12. Galakhov E.M., Sobchuk V.V. The development of cyber attack models in the field of enterprise information security // Scientific Journal "Telecommunications and Information Technologies". - K.: DUT, 2019. - No. 4 (65). - pp. 12– 24.
13. Barabash O.V., Lukova-Chuiko N.P., Musienko A.P., Sobchuk V.V. Ensuring the functional stability of information networks based on the development of a method of countering DDoS attacks. // Modern information systems. - Kharkiv: National Technical University "Kharkiv Polytechnic Institute", 2018. - Volume 2. - No. 1. - pp. 56–63.
14. Adedeji, K.B.; Abu-Mahfouz, A.M.; Kurien, A.M. DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges. J. Sens. Actuator Netw. 2023, 12, 51. https://doi.org/10.3390/jsan12040051
15. Singh, K.J.; De, T. Mathematical modelling of DDoS attack and detection using correlation. J. Cyber Secur. Technol. 2017, 1, 175–186
16. B.F. Maier, D. Brockmann, Effective containment explains subexponential growth in recent confirmed COVID-19 cases in China, Science 368 (6492) (2020) 742–746, https://doi.org/10.1126/science.abb4557
17. Juan Fernando Balarezo ⇑, Song Wang, Karina Gomez Chavez, Akram Al-Hourani, Sithamparanathan Kandeepan A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks // Engineering Science and Technology, an International Journal 31 (2022) 101065 DOI: 10.1016/j.jestch.2021.09.011
Література+
18. Herbert W. Hethcote Three Basic Epidemiological Models // Applied Mathematical Ecology, Springer-Verlag, 1989
19. Helena Sofia Rodrigues Application of SIR epidemiological model: new trends // International journal of applied mathematics and informatics, 2016, vol.10
20. L. STONE, B. SHULGIN, Z. AGUR Theoretical Examination of the Pulse Vaccination Policy in the SIR Epidemic Model // Mathematical and Computer Modelling 31 (2000) 207-215
21. A. D’ONOFRIO Pulse Vaccination Strategy in the SIR Epidemic Model: Global Asymptotic Stable Eradication in Presence of Vaccine Failures // Mathematical and Computer Modelling 36 (2002) 473-489
22. Jianjun Jiao, Shaohong Cai, Limei Li Impulsive vaccination and dispersal on dynamics of an SIR epidemic model with restricting infected individuals boarding transports // Physica A, 2023
23. Ning Sun, Shaoyun Shi, Wenlei Li Singular renormalization group approach to sis problems // Discrete and continuous dynamical systems series B, Volume 25, Number 9, 2020
24. Jinyan Wang Dynamics and bifurcation analysis of a state-dependent impulsive SIS model // Advances in Difference Equations (2021) 2021:287
25. Petro Feketa , Vladimir Klinshov , Leonhard Lücken A survey on the modeling of hybrid behaviors: How to account for impulsive jumps properly // Commun Nonlinear Sci Numer Simulat, 103 (2021) 105955

Published

2024-04-11

Issue

Section

Articles