<doi_batch xmlns="http://www.crossref.org/schema/4.4.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="4.4.0"><head><doi_batch_id>af09eef6-6326-4e47-ae51-1571b931e1e4</doi_batch_id><timestamp>20240115025141039</timestamp><depositor><depositor_name>wseas:wseas</depositor_name><email_address>mdt@crossref.org</email_address></depositor><registrant>MDT Deposit</registrant></head><body><journal><journal_metadata language="en"><full_title>WSEAS TRANSACTIONS ON COMMUNICATIONS</full_title><issn media_type="electronic">2224-2864</issn><issn media_type="print">1109-2742</issn><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.37394/23204</doi><resource>http://wseas.org/wseas/cms.action?id=4021</resource></doi_data></journal_metadata><journal_issue><publication_date media_type="online"><month>3</month><day>17</day><year>2023</year></publication_date><publication_date media_type="print"><month>3</month><day>17</day><year>2023</year></publication_date><journal_volume><volume>22</volume><doi_data><doi>10.37394/23204.2023.22</doi><resource>https://wseas.com/journals/communications/2023.php</resource></doi_data></journal_volume></journal_issue><journal_article language="en"><titles><title>Mathematical Model on Distributed Denial of Service Attack in the Computer Network</title></titles><contributors><person_name sequence="first" contributor_role="author"><given_name>Yerra Shankar</given_name><surname>Rao</surname><affiliation>Department of Mathematics, NIST (Autonomous) College, Berhampur - 761008, Odisha, INDIA</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Aswin Kumar</given_name><surname>Rauta</surname><affiliation>Department of Mathematics, SKCG (Autonomous) College, Paralakhemundi-761200, Odisha, INDIA</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Satya Narayan</given_name><surname>Kund</surname><affiliation>Controller of Examinations, Berhampur University, Berhampur -760007, Odisha, INDIA</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Bhagirathi</given_name><surname>Sethi</surname><affiliation>Department of Mathematics, Khemundi Degree College, Digapahandi- 761012, Odisha, INDIA</affiliation></person_name><person_name sequence="additional" contributor_role="author"><given_name>Jangyadatta</given_name><surname>Behera</surname><affiliation>Department of Mathematics, Roland Engineering College, Berhampur- 761008, Odisha, INDIA</affiliation></person_name></contributors><jats:abstract xmlns:jats="http://www.ncbi.nlm.nih.gov/JATS1"><jats:p>In this paper, an electronic- epidemic two-folded mathematical model is formulated with help of non-linear ordinary differential equations. Distributed Denial of Service (DDoS) attacks in the computer network are studied. The modeling of both attacking nodes and targeting nodes is performed. Botnet based malicious devices and their threats on computer networks are addressed using appropriate parameters. The basic reproduction numbers for both the attacking and the targeting population are calculated and interpreted. Local and global stability analysis is carried out for the infection-free and endemic equilibrium points. Differential equations are solved with the help of the Runge-Kutta 4th order numerical method and graphs are analyzed using MATLAB software. Simulation shows that the success or failure depends on the number of initially infected computers in the attacking group. The proposed model exhibits the phenomenon of backward bifurcation for different values of transmission parameters. This model gives the theoretical base for controlling and predicting the DDoS attack. This shows the way to minimize the attack in the network. This study will be helpful to identify the botnet devices and run the latest version of antivirus in the network to protect against DDoS attacks from attacking sources. The application of this study is to ascertain online crime and locate the attacking nodes in the field of online transactions of real-life problems that involve the internet and computer networking systems. Moreover, our model can play an important role in policy-making against the distributed attack.</jats:p></jats:abstract><publication_date media_type="online"><month>12</month><day>31</day><year>2023</year></publication_date><publication_date media_type="print"><month>12</month><day>31</day><year>2023</year></publication_date><pages><first_page>183</first_page><last_page>191</last_page></pages><publisher_item><item_number item_number_type="article_number">18</item_number></publisher_item><ai:program xmlns:ai="http://www.crossref.org/AccessIndicators.xsd" name="AccessIndicators"><ai:free_to_read start_date="2024-01-15"/><ai:license_ref applies_to="am" start_date="2024-01-15">https://wseas.com/journals/communications/2023/a365104-016(2023).pdf</ai:license_ref></ai:program><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.37394/23204.2023.22.18</doi><resource>https://wseas.com/journals/communications/2023/a365104-016(2023).pdf</resource></doi_data><citation_list><citation key="ref0"><doi>10.47750/jptcp.2023.30.09.030</doi><unstructured_citation>S.Siva Saravana Babu, G.Saravanakumar, Naveen V M, Ajitesh Kumar A S B, Koushik P H, Carolyne Sneha, &amp; Bhuvaneswari. A DDoS Attack Categorization and Prediction Method Based on Machine Learning. Journal of Population Therapeutics and Clinical Pharmacology, 30(9), 2023, 300–307. https://doi.org/10.47750/jptcp.2023.30.09.03 0. </unstructured_citation></citation><citation key="ref1"><doi>10.2139/ssrn.3852902</doi><unstructured_citation>U, Rahamathullah and E, Karthikeyan, Distributed Denial of Service Attacks Prevention, Detection and Mitigation – A Review. Proceedings of the International Conference on Smart Data Intelligence (ICSMDI 2021), Available at May-2021, http://dx.doi.org/10.2139/ssrn.3852902. </unstructured_citation></citation><citation key="ref2"><doi>10.1016/j.jnca.2021.103079</doi><unstructured_citation>X. Liu, J. Ren, H. He, B. Zhang, C. Song, and Y. Wang, ‘‘A Fast All-Packets Based DDoS Attack Detection Approach Based on Network Graph And Graph Kernel,’’ J. Netw. Comput. Appl., vol. 185, Jul. 2021, Art. no. 103079. </unstructured_citation></citation><citation key="ref3"><doi>10.1016/j.physa.2019.123240</doi><unstructured_citation>Yerra Shankar Rao, Ajit Kumar Keshri, Bimal Kumar Mishra, Tarini Charana Panda, Distributed Denial of Service Attack on Targeted Resources in a Computer Network for Critical Infrastructure: A Differential eEpidemic Model, Physica A: Statistical Mechanics and its Applications, Volume 540, 2020, 123240, https://doi.org/10.1016/j.physa.2019.123240. </unstructured_citation></citation><citation key="ref4"><doi>10.1007/978-981-13-9942-8_17</doi><unstructured_citation>Yerra Shankar Rao, Hemraj Saini, Geetanjali Rath , Tarini Charan Panda, Effect of Vaccination in the Computer Network for Distributed Attacks - A Dynamic Model, Advances in Computing and Data Sciences, 2019, pp. 175-184. Switzerland AG, Springer Nature. </unstructured_citation></citation><citation key="ref5"><doi>10.1109/tpds.2019.2942591</doi><unstructured_citation>Z. Li, H. Jin, D. Zou, B. Yuan, Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment, IEEE Transactions on Parallel and Distributed Systems 31 (3) ,2020, 695– 706, https://doi.org/ 10.1109/TPDS.2019.2942591. </unstructured_citation></citation><citation key="ref6"><doi>10.1109/surv.2013.031413.00127</doi><unstructured_citation>Zargar, S. T., Joshi, J., &amp; Tipper, D. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Communications Surveys &amp; Tutorials, 15,2013 (4), 2046– 2069. </unstructured_citation></citation><citation key="ref7"><doi>10.1186/1687-1847-2014-295</doi><unstructured_citation>Zhang, Z., Si, F. Dynamics of a Delayed SEIRS-V Model on the Transmission of Worms in a Wireless Sensor Network. Adv. Differential Equation. 2014, -295. </unstructured_citation></citation><citation key="ref8"><doi>10.1016/j.apm.2009.06.011</doi><unstructured_citation>Mishra, B. K., &amp; Jha, N., SEIQRS Model for the Transmission of Malicious Objects in a Computer Network. Applied Mathematical Modelling, 34 ,2010, 710–715. </unstructured_citation></citation><citation key="ref9"><doi>10.1109/tifs.2021.3054522</doi><unstructured_citation>R. Biswas, S. Kim, J. Wu, Sampling Rate Distribution for Flow Monitoring and DDoS Detection in Datacentre, IEEE Transactions on Information Forensics and Security 16 2021 2524–2534, https://doi.org/10.1109/TIFS.2021.3054522. </unstructured_citation></citation><citation key="ref10"><doi>10.4018/ijbdcn.2017010105</doi><unstructured_citation>Yerra Shankar Rao, Rauta A.K., Saini Hemraj., Panda.,T.C., Mathematical Model for Cyber-attack in the Computer Network, International Journal of Business Data Communications and networking, 13(1)2017,58-65. </unstructured_citation></citation><citation key="ref11"><doi>10.1016/j.mcm.2010.02.044</doi><unstructured_citation>S.J. Wang, Q.M. Liu, X.F. Yu, Y. Ma, Bifurcation Analysis of a Model for Network Worm Propagation with Time Delay, Mathematical and Computer Modelling 52(3–4),2010,435–447. </unstructured_citation></citation><citation key="ref12"><doi>10.1098/rspa.1927.0118</doi><unstructured_citation>Kermack, W. O., &amp; McKendrick, A. G. Contributions of Mathematical Theory to Epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, 115, 1927, 700–721. </unstructured_citation></citation><citation key="ref13"><doi>10.1098/rspa.1932.0171</doi><unstructured_citation>Kermack, W. O., &amp; McKendrick, A. G. Contributions of Mathematical Theory to Epidemics, Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, 138,1932, 55–83. </unstructured_citation></citation><citation key="ref14"><doi>10.1098/rspa.1933.0106</doi><unstructured_citation>Kermack, W. O., &amp; McKendrick, A. G. Contributions of Mathematical Theory to Epidemics. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, 141, 1933, 94–122. </unstructured_citation></citation><citation key="ref15"><doi>10.3390/sym13122443</doi><unstructured_citation>Ahmad, A.; Abuhour, Y.; Alghanim, F. A Novel Model for Distributed Denial of Service Attack Analysis and Interactivity. Symmetry 2021, 13, 2443. https://doi.org/10.3390/sym13122443. </unstructured_citation></citation><citation key="ref16"><doi>10.1515/nleng-2017-0094</doi><unstructured_citation>Bimal Kumar Mishra, Ajit Kumar Keshri, Dheeresh Kumar Mallick, and Binay Kumar Mishra, Mathematical Model on Distributed Denial of Service Attack Through Internet of Things in a Network, Nonlinear Engineering 2018, pp.1-10. </unstructured_citation></citation><citation key="ref17"><doi>10.1016/j.cnsns.2013.12.026</doi><unstructured_citation>C. Gan, X. Yang, W. Liu, Q. Zhu, J. Jin, L. He, Propagation of Computer Virus Both Across the Internet and External Computer: A Complex Network Approach, Communication of Nonlinear Sci. Numer.Simul., 19(8), 2014, 2785–2792. </unstructured_citation></citation><citation key="ref18"><doi>10.1007/s11071-013-0889-5</doi><unstructured_citation>C. Gan, X. Yang, Q. Zhu, J. Jin, L. He, The Spread of Computer Viruses Under the Effect of External Computers, Nonlinear Dynamic, 73, 2013, 1615–1620. </unstructured_citation></citation><citation key="ref19"><unstructured_citation>J. P. Salle, The Stability of Dynamical System, SIAM, Philadelphia, PA , 1976. </unstructured_citation></citation><citation key="ref20"><doi>10.1016/j.jestch.2021.09.011</doi><unstructured_citation>Juan Fernando Balarezo, Song Wang, Karina Gomez Chavez, Akram Al-Hourani, Sitham paranathan Kandeepan, A Survey on DoS/DDoS Attacks Mathematical Modeling for Traditional, SDN and virtual networks, Engineering Science and Technology, an International Journal, Volume 31, 2022, 101065, , https://doi.org/10.1016/j.jestch.2021.09.011. </unstructured_citation></citation><citation key="ref21"><doi>10.1007/978-3-642-39149-1_9</doi><unstructured_citation>K. Mishra and K. Halder, e-Epidemic Models on the Attack and Defense of Malicious Objects in Networks, Theories and Simulations of Complex Social Systems, Intelligent Systems Reference Library 52, Springer-Verlag Berlin Heidelberg, 2014. </unstructured_citation></citation><citation key="ref22"><doi>10.1109/access.2020.3009733</doi><unstructured_citation>K.S. Sahoo, B.K. Tripathy, K. Naik, S. Rama Subba Reddy, B. Balusamy, M. Khari, D. Burgos, An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks, IEEE Access 8 ,2020, https://doi.org/10.1109/ACCESS.2020.30097 33. </unstructured_citation></citation><citation key="ref23"><unstructured_citation>L. X. Yang, X. Yang, and Y. Y. Tang, A Bivirus Competing Spreading Model with Generic Infection Rates, IEEE Transactions on Network Science and Engineering, 2017. </unstructured_citation></citation><citation key="ref24"><doi>10.1016/j.nonrwa.2012.07.005</doi><unstructured_citation>L.X. Yang, X. Yang,Q. Zhu, L.We, A Computer Virus Model with Graded Cure Rates, Nonlinear Anal. Real World Appl. 14, 2013, 414–422. </unstructured_citation></citation><citation key="ref25"><doi>10.1016/j.physa.2013.08.024</doi><unstructured_citation>L.Yang, X.Yang, The Effect of Infected External Computers on the Spread of Viruses, A Compartment Model Study, Physica A 392, 2013, 6523–6525. </unstructured_citation></citation><citation key="ref26"><doi>10.1145/1402946.1402981</doi><unstructured_citation>Liu, X., Yang, X., &amp; Lu, Y, To Filter or to Authorize: Network-Layer DoS Defense Against Multimillion-Node Botnets. In ACM SIGCOMM computer communication review, 38, 2008, (4), pp. 195–206). New York: ACM. </unstructured_citation></citation><citation key="ref27"><doi>10.3390/s23136176</doi><unstructured_citation>Liu, Z.; Wang, Y.; Feng, F.; Liu, Y.; Li, Z.; Shan, Y., A DDoS Detection Method Based on Feature Engineering and Machine Learning in Software-Defined Networks. Sensors 2023, 23, 6176. https://doi.org/10.3390/s23136176. </unstructured_citation></citation><citation key="ref28"><unstructured_citation>A.M. Lyapunov, The General Problem of the Stability of Motion, Taylor and Francis, London, 1992. </unstructured_citation></citation><citation key="ref29"><doi>10.1016/s0893-9659(02)00069-1</doi><unstructured_citation>Korobeinikon,G.C. Wake, Lyapunov Functions and Global Stability for SIR, SIRS, and SIS Epidemiological Models, Appl. Math. Lett. 15 ,2002, 955–960. </unstructured_citation></citation><citation key="ref30"><doi>10.1093/imammb/21.2.75</doi><unstructured_citation>Korobeinikov, Lyapunov Functions and Global Properties for SEIR and SEIS Epidemic Models, Math. Med. Biol. 21, 2004, 75–83.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>