Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/23267
DC FieldValueLanguage
dc.contributor.authorMishkovski, Igoren_US
dc.contributor.authorFiliposka, Sonjaen_US
dc.contributor.authorTrajanov, Dimitaren_US
dc.contributor.authorKocarev, Ljupchoen_US
dc.date.accessioned2022-10-03T08:30:48Z-
dc.date.available2022-10-03T08:30:48Z-
dc.date.issued2010-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/23267-
dc.description.abstract— In this paper we assess the vulnerability of different generic complex networks by measuring the throughput for networks with different load in presence of Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are simulated by choosing a number of bot nodes using several measures, such as: random, degree centrality, eigenvector centrality, betweenness centrality and k-medoids clustering algorithm. In order to obtain some information about the vulnerability of the three different complex networks (random, small-world and scale-free) we analyze the useful throughput of these networks in the presence of DDoS attack by the bot nodes.en_US
dc.subjectComplex networks, DDoS attacks, Network Utility Maximization, Vulnerabilityen_US
dc.titleMeasuring Vulnerability of Complex Networks by Simulating DDoS Attacksen_US
dc.typeProceedingsen_US
dc.relation.conference18th Telecommunications forum TELFOR 2010en_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
crisitem.author.deptFaculty of Computer Science and Engineering-
crisitem.author.deptFaculty of Computer Science and Engineering-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Conference papers
Files in This Item:
File Description SizeFormat 
Measuring_Vulnerability_of_Complex_Netwo20160202-30232-1vqcurr-with-cover-page-v2.pdf332.94 kBAdobe PDFView/Open
Show simple item record

Page view(s)

133
checked on Jul 25, 2024

Download(s)

12
checked on Jul 25, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.