Bulhakov M.O.

SHEINational Mining University”, Ukraine

Mathematical model of DDoS-attack

 

A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS-attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices.

A DDoS-attack requires an attacker to gain control of a network of online machines in order to carry out an attack. Computers and other machines (such as IoT devices) are infected with malware, turning each one into a bot (or zombie). The attacker then has remote control over the group of bots, which is called a botnet.

Once a botnet has been established, the attacker is able to direct the machines by sending updated instructions to each bot via a method of remote control. When the IP address of a victim is targeted by the botnet, each bot will respond by sending requests to the target, potentially causing the targeted server or network to overflow capacity, resulting in a denial-of-service to normal traffic. Because each bot is a legitimate Internet device, separating the attack traffic from normal traffic can be difficult.

Let us suppose that the attacked node has an inbound channel with a bandwidth of C bit/s, and an edge router has an input buffer of B bits. The attack situation can be simulated using a model of statistical multiplexing of traffic from N attacking nodes, which can be in two states: sending packets (ON-state) and inactivity (OFF-state).

We denote the time periods (in seconds) of functioning and inactivity as  and  respectively. If the source is active (ON-state), then it generates r packets per second. The size of the sent packet in bits will be denoted by L, and the volume of received packets at time t as Q (t).

Then the buffer overload probability can be approximated by the formula:

where

To cause an overload on the transmission channel, the attacker must select attack parameters such that the value of γ is close to zero or negative. Therefore, the number of nodes for the attack must satisfy the inequality

Let us call the ratio of the duration of sending packets to the whole period of operation and inactivity as the coefficient of employment of the traffic source τ:

Then the inequality limiting the number of attacking nodes can be expressed as

In typical ICMP-flood attacks, the attacking nodes are constantly in the ON-state, sending parasitic traffic to the victim. In this case, the coefficient τ = 1 and the inequality for the number of attacking nodes is simplified to

To make it difficult to recognize the attack the attacker masks it under the usual overload in the network. To do this he needs to choose rather small values for the parameters τ and r.

So if an attacker chooses values of τ = 0,05 and r = 20 pack/s and the attack target is a server with a channel throughput of C = 10 Mbit/s, then 1,7 * 104 attack nodes are required to attack.

In addition, an attacker can execute several processes on each of the attack nodes, and those using fictitious addresses of senders, can act for the attacker as various sources of traffic. Thus, it is quite realistic to implement a distributed DoS-attack masking it under the natural overload of the channel.

The conclusions drawn can be generalized to different types of attack sources. Let the attacker have M different types of attacking nodes. Then the attacker must choose the attack parameters so that the following relation is true:

An attacker can generate traffic that does not cause suspicion and is similar to traffic from a normal user, having at his disposal a sufficient number of N controlled nodes. Basing on some collected statistics on network state dynamics (for example, packet loss level) it is possible to estimate the future states of the system under study.