Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/23267
DC FieldValueLanguage
dc.contributor.authorMishkovski, Igoren_US
dc.contributor.authorFiliposka, Sonjaen_US
dc.contributor.authorTrajanov, Dimitaren_US
dc.contributor.authorKocarev, Ljupchoen_US
dc.date.accessioned2022-10-03T08:30:48Z-
dc.date.available2022-10-03T08:30:48Z-
dc.date.issued2010-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/23267-
dc.description.abstract— In this paper we assess the vulnerability of different generic complex networks by measuring the throughput for networks with different load in presence of Distributed Denial-of-Service (DDoS) attacks. DDoS attacks are simulated by choosing a number of bot nodes using several measures, such as: random, degree centrality, eigenvector centrality, betweenness centrality and k-medoids clustering algorithm. In order to obtain some information about the vulnerability of the three different complex networks (random, small-world and scale-free) we analyze the useful throughput of these networks in the presence of DDoS attack by the bot nodes.en_US
dc.subjectComplex networks, DDoS attacks, Network Utility Maximization, Vulnerabilityen_US
dc.titleMeasuring Vulnerability of Complex Networks by Simulating DDoS Attacksen_US
dc.typeProceedingsen_US
dc.relation.conference18th Telecommunications forum TELFOR 2010en_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
crisitem.author.deptFaculty of Computer Science and Engineering-
crisitem.author.deptFaculty of Computer Science and Engineering-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Conference papers
Files in This Item:
File Description SizeFormat 
Measuring_Vulnerability_of_Complex_Netwo20160202-30232-1vqcurr-with-cover-page-v2.pdf332.94 kBAdobe PDFView/Open
Show simple item record

Page view(s)

123
checked on Apr 24, 2024

Download(s)

8
checked on Apr 24, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.