Abstract
This paper describes the methods for creating an event-based simulation used to predict DDoS attacks against countries following international events. The model uses various parameters for an event and generates time series DDoS attack data for the two countries over one week. The simulation uses a weighted, tit-for-tat approach in determining retaliation. The model was evaluated using attack data of actual events provided by Arbor Networks consisting of a two-week interval plus a day, centered around the start of the events. The model was sufficient in predicting the change in frequency of DDoS attacks following hostile diplomatic events, but it was unsuccessful at simulating attacks following friendly, military, and economic events. Overall, the resulting simulation was a successful baseline for future work in the field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chaturvedi, A.R., Gupta, M., Mehta, S.R., Yue, W.T.: Agent-based simulation approach to information warfare in the seas environment. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 10-pp. IEEE (2000)
Clarke, R.A., Knake, R.K.: Cyber War. HarperCollins, New York (2011)
Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., Laplante, P.: Dimensions of cyber-attacks: cultural, social, economic, and political. IEEE Technol. Soc. Mag. 30(1), 28–38 (2011)
World Bank Group. (n.d.). gdp (current US$) (2016). http://data.worldbank.org/indicator/NY.GDP.MKTP.CD
Kotenko, I., Alexeev, A., Man’kov, E.: Formal framework for modeling and simulation of DDOS attacks based on teamwork of hackers-agents. In: IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), pp. 507–510. IEEE (2003)
Kotenko, I., Ulanov, A.: Simulation of internet DDoS attacks and defense. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 327–342. Springer, Heidelberg (2006). doi:10.1007/11836810_24
Kumar, S., Benigni, M., Carley, K.M.: The impact of US cyber policies on cyber-attacks trend. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp. 181–186. IEEE (2016)
Starr, S.H.: Toward a preliminary theory of cyberpower. Cyberpower and national security, pp. 43–88 (2009)
Tereshchenko, N.: US foreign policy challenges: cyber terrorism and critical infrastructure, e. International Relations 12 (2013)
International Telecommunication Union: Individuals using the internet 2005 to 2014, key ICT indicators for developed and developing countries and the world (totals and percentage rates) (2015). http://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2014/ITU_Key_2005-2014_ICT_data.xls
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Tse, A., Carley, K.M. (2017). Event-Based Model Simulating the Change in DDoS Attack Trends After P/DIME Events. In: Lee, D., Lin, YR., Osgood, N., Thomson, R. (eds) Social, Cultural, and Behavioral Modeling. SBP-BRiMS 2017. Lecture Notes in Computer Science(), vol 10354. Springer, Cham. https://doi.org/10.1007/978-3-319-60240-0_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-60240-0_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60239-4
Online ISBN: 978-3-319-60240-0
eBook Packages: Computer ScienceComputer Science (R0)