1 Introduction
The computer connects every person in the world,
controlling their daily business through internet
networking or browsing. The development of
internet technology has thrown a number of
challenges in the form of necessity in day-to-day
life. Digital technology has brought a big change in
the society. But, it is being the heaven of crimes
using computer networks by the trained
intelligentsia. The new type of such crime called
cybercrime. It is a current research topic for the
investigators. Many researchers have studied, [1],
[2], [3], [4], [5], [6], [7], [8], this new crime using
mathematical modeling. Among different types of
internet-based crimes, the Denial of Service (DoS)
attack is one of them. This attack is a very critical
and continuous threat to cyber security. DoS is a
cyber-attack in which cybercriminals search
network resources or an IP address
or machine from thousands of hosts infected with
malware to make it unavailable to the intended
users by interrupting the services indefinitely. It is
done by notification of superficial requests when
the computer of the user is turned on in an attempt
to prevent some or all legal services from being
fulfilled or slow down the system to hamper the
services. When the DoS attack originates from
many different sources, it is called a Distributed
Denial of Service (DDoS) attack. So, it is difficult
to locate the error and may not be possible to block
the source of the attack. The DoS attacks are
targeted by consuming resources, and forcing a
computer to reset. e.g., network bandwidth, CPU
cycles memory, etc. so that the network does not
work properly that leads to the site. If someone
uses the same connection for internal software,
employees notice slowness issues. The TTL (time
to live) on a ping request timed out and the victim’s
server responds with service outages. DDoS attacks
can last as long as 24 hours and the cost of business
is minimized while the user remains
under attack. In this attack different kits like
Stacheldraht, Trinoo, Mstream, Tribe Flood
Network (TFN), etc. are launched to other
computers by DDoS attackers. DDoS attacks are
performed in two ways; (i) the crafted packets are
sent to crash a system that causes a reboot or
freezing of some operating system. (ii) Exhausted
the resources like operating system, data structures,
computing power, network bandwidth etc. of the
targeted computer. Due to DDoS attacks, the
quality of service is disabled or interrupted to the
intended users. It is tedious work to deal with the
second form of attack rather than the first form of
attack. A botnet is the usual medium of DDoS
attacks. Intelligent criminals make a network of
computers called BOTNET to launch an effective
DDoS attack. The people who control a botnet are
called botnet owners or botnet masters. The
software applications that are programmed to run
automatically according to their instruction without
users needing to start them are known as zombies
or bots. The source of the botnet is called the
control server. The most effective methods to
control, respond, and prevent the spread of DDoS
attacks are updating the operating system, data
mining, firewall, auto patching, etc. To reduce
transmission of botnet infective nodes, buy more
bandwidth, build redundancy into your
infrastructure, configure your network hardware
against DDoS attacks, deploy anti-DDoS hardware
and software modules, and deploy a DDoS
protection appliance and DNS servers. The visitor’s
information could be stolen using the attacks. They
are often used to make 'political' statements against
the targeted organization or just as a form of
malicious vandalism. For example, the criminals
demand a ransom amount from the website
owners to stop the attack. So, it is an emerging
attention for the researchers to investigate and
locate the attacking sources. Many authors have
presented their investigation reports in this regard
for locating the attacking node and providing the
security system to the network, [9], [10], [11], [12].
The connection to the internet increases the
complexity of interconnected networks.
Mathematical modeling is used as a tool to identify
and understand the problem of DDoS attacks. In
order to provide better defense mechanisms, many
researchers have used epidemic models. Dynamic
models for infectious diseases are mostly based on
compartment structures that were initially proposed
for several areas of Mathematical Biology, [13],
[14], [15]. It was developed later by many other
mathematicians in the modeling of cybercrimes or
computer related malicious objects. These epidemic
models are dynamic in nature. Therefore,
transmission of malicious objects is epidemic in
nature. So, many mathematical models have been
developed that specify the comprehensible view of
attacking behavior as well as the spread of the
malware objects in the network, [16], [17], [18],
[19], [20], [21], [22], [23]. The use of vaccination
and quarantine effects were studied for the DDoS
attack and spread of malware in the computer
network, [24], [25], [26], [27], [28]. Presently, this
type of cybercrime is a new, global issue and draws
serious attention. But currently, less study has been
conducted in this field. Therefore, we have
developed this model to formulate the attacking
WSEAS TRANSACTIONS on COMMUNICATIONS
DOI: 10.37394/23204.2023.22.18
Yerra Shankar Rao, Aswin Kumar Rauta,
Satya Narayan Kund, Bhagirathi Sethi, Jangyadatta Behera