Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions
Abstract
:1. Introduction
- We propose an analytical framework to study the behavior of the malware attack that allows identification of the rate at which the malware is dispersed and the number of infected nodes.
- We develop a mathematical analysis to study the impact of jamming the communications of a group of nodes under a DoS attack.
- Based on the insight gained from the mathematical description of the attacks, we recommend the use of countermeasures to investigate the dynamics of the attack when cybersecurity measures are enabled.
- We obtain the performance metrics of the system under the different attacks and different conditions of the attacks.
2. Background
3. Related Work
4. Malware and DoS Attacks in the P2P Network
4.1. Malware
4.2. Denial of Service and Distributed Denial of Service
5. Mathematical Model
5.1. Basic P2P Model
5.2. P2P Infected by Malware
- when a new non-infected leecher arrives at the rate .
- at the rate when a non-infected leecher leaves the system.
- at the rate when an infected leecher leaves the system.
- at the rate when a non-infected seed leaves the system.
- at the rate when an infected seed leaves the system.
- when a leecher downloads an infected chunk at the rate .
- at the rate when a non-infected leecher becomes a non-infected seed.
- at the rate when an infected leecher becomes an infected seed.
- at the rate when a non-infected leecher becomes an infected seed.
5.3. P2P System Infected by Malware with Countermeasure
- when a leecher downloads an infected chunk and cannot avoid infection at the rate
- at the rate when a non-infected leecher cannot prevent infection and becomes an infected seed.
5.4. Markov Chain with a DoS Attack
- To the state at the rate when a new leecher arrives. We assume that new peers are not under the DoS attack.
- To the state when a leecher without an attack leaves the system at the rate .
- To the state when a leecher under attack leaves the system at the rate . In this case, we assume that a leecher that realizes that it cannot communicate may choose to leave the system as soon as it detects a possible attack or perceives a malfunction by maybe trying to reset the communication device or leaving the system to re-enter at a future time. As such, the node may leave the system earlier than usual; then, .
- To the state when a leecher without an attack downloads the complete file and becomes a seed. Indeed, if this peer is not under attack while downloading the file, it is very likely that it will remain in the same conditions when it finishes its download process. This occurs at the rate . It is important to note that only peers without an attack can share their resources, while nodes under the DoS are not considered in the communication bandwidth. Additionally, only the leechers without an attack can become seeds, which explains the left side of this rate.
- To the state at the rate when a seed without an attack leaves the system.
- To the state at the rate when a seed that is being attacked leaves the system. In this case, since the peer has already downloaded the file, it may not detect an ongoing attack. As such, the departure rate remains the same as seeds without any attacks.
- To the state when a portion of new peers get attacked. Hence, in the case that a malicious node generates a spurious signal in a given area, some nodes inside this region can be leechers (in this case ), and some other nodes can be seeded ( in this model).
- To the state when the attacker desists its attack in some region. We consider that the average attack time is . Then, this occurs at the rate where is an indicator function (the end of an attack can only occur if an attack is present in the system) given as:
6. Numerical Solution of the Markov Chains
6.1. Simple Markov Chain
6.2. Markov Chain with Initially Infected Nodes
6.3. Markov Chain with Infected Initial Nodes and Countermeasures
7. Numerical Results
7.1. Basic P2P Network
7.2. P2P System with a Malware Attack
7.3. P2P System with Countermeasures for the Malware Attack
7.4. P2P System under a Denial of Service Attack
8. Conclusions
Author Contributions
Funding
Conflicts of Interest
Appendix A. Algorithms
Algorithm A1: Simple Chain |
Algorithm A2: Chain with infected nodes |
Algorithm A3: Chain adding a parameter as a countermeasure |
References
- Quang Hieu, V.; Mihai Lupu, B.C.O. Peer-to-Peer Computing: Principles and Applications; Springer: Berlin/Heidelberg, Germany, 2010; Volume 16. [Google Scholar]
- Esquivel, E.E.B.; Rivero-Angeles, M.E.; Fernandez-Vazquez, A. Priority scheme for mobile nodes in P2P bit-torrent based networks. In Proceedings of the 2014 28th International Conference on Advanced Information Networking and Applications Workshops, Victoria, BC, Canada, 13–16 May 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 469–473. [Google Scholar]
- Deng, L.; He, Y.; Xu, Z. Combating index poisoning in P2P file sharing. Adv. Inf. Secur. Assur. 2009, 5576, 358–367. [Google Scholar] [CrossRef]
- Wang, W.; Zhao, W. Model the P2P Attack in Computer Networks. In Proceedings of the International Conference on Logistics, Engineering, Management and Computer Science, Shenyang, China, 29–31 July 2015; pp. 1303–1307. [Google Scholar] [CrossRef] [Green Version]
- Jin, X.; Chan, S.H.G. Unstructured peer-to-peer network architectures. In Handbook of Peer-to-Peer Networking; Springer: Boston, MA, USA, 2010; pp. 117–142. [Google Scholar]
- Chaganti, R.; Boppana, R.V.; Ravi, V.; Munir, K.; Almutairi, M.; Rustam, F.; Lee, E.; Ashraf, I. A Comprehensive Review of Denial of Service Attacks in Blockchain Ecosystem and Open Challenges. IEEE Access 2022, 10, 96538–96555. [Google Scholar] [CrossRef]
- Wararkar, P.; Kapil, N.; Rehani, V.; Mehra, Y.; Bhatnagar, Y. Resolving Problems Based on Peer to Peer Network Security Issue’s. In Proceedings of the Procedia Computer Science, Nagpur, India, 11–12 December 2015; Elsevier B.V.: Amsterdam, The Netherlands, 2016; Volume 78, pp. 652–659. [Google Scholar] [CrossRef] [Green Version]
- Chumachenko, D.; Chumachenko, K.; Yakovlev, S. Intelligent simulation of network worm propagation using the code red as an example. Telecommun. Radio Eng. 2019, 78, 443–464. [Google Scholar] [CrossRef]
- Rajesh, B.; Reddy, Y.J.; Reddy, B.D.K. A survey paper on malicious computer worms. Int. J. Adv. Res. Comput. Sci. Technol. 2015, 3, 161–167. [Google Scholar]
- Frauenthal, J.C. Mathematical Modeling in Epidemiology; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
- Gourieroux, C.; Jasiak, J. Analysis of Virus Propagation: A Transition Model Representation of Stochastic Epidemiological Models. arXiv 2020, arXiv:2006.10265. [Google Scholar]
- Rasheed, M.M.; Norwawi, N.M.; Ghazali, O.; Faaeq, M.K. Detection algorithm for internet worms scanning that used user datagram protocol. Int. J. Inf. Comput. Secur. 2019, 11, 17–32. [Google Scholar] [CrossRef]
- Awasthi, S.; Kumar, N.; Srivastava, P.K. A study of epidemic approach for worm propagation in wireless sensor network. In Advances in Intelligent Computing in Engineering; Book Series AISC Vol. 1125; Springer: Singapore, 2020; pp. 315–326. [Google Scholar]
- Andersson, H.; Britton, T. Stochastic Epidemic Models and Their Statistical Analysis; Springer Science & Business Media 2000: New York, NY, USA, 2012; Volume 151. [Google Scholar]
- Zhang, Z.; Kundu, S.; Wei, R. A delayed epidemic model for propagation of malicious codes in wireless sensor network. Mathematics 2019, 7, 396. [Google Scholar] [CrossRef] [Green Version]
- Ahmad, M.A.; Woodhead, S. Containment of fast scanning computer network worms. In Proceedings of the International Conference on Internet and Distributed Computing Systems, Windsor, UK, 2–4 September 2015; Springer: Cham, Switzerland, 2015; pp. 235–247. [Google Scholar]
- Malatras, A. State-of-the-art survey on P2P overlay networks in pervasive computing environments. J. Netw. Comput. Appl. 2015, 55, 1–23. [Google Scholar] [CrossRef]
- Washbourne, L. A survey of P2P Network security. arXiv 2015, arXiv:1504.01358. [Google Scholar]
- Tang, H.; Liu, Y.; Huang, J. A worm counter-measurement strategy in P2P networks: Modeling and analysis. In Proceedings of the 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, Hangzhou, China, 30 October–1 November 2012; IEEE: Piscataway, NJ, USA, 2012; Volume 2, pp. 706–710. [Google Scholar]
- Jaideep, G.; Battula, B.P. Survey on the present state-of-the-art of P2P networks, their security issues and counter measures. Int. J. Appl. Eng. Res. 2016, 11, 616–620. [Google Scholar] [CrossRef]
- Gopalakrishnan, K. Security vulnerabilities and issues of traditional wireless sensors networks in IoT. In Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm; Intelligent Systems Reference Library; Springer: Cham, Switzerland, 2020; Volume 174, pp. 519–549. [Google Scholar]
- Ferdous, S.; Chowdhury, F.; Moniruzzaman, M. A Taxonomy of Attack Methods on Peer-to-Peer Network. In Proceedings of the 1st Indian Conference on Computational Intelligence and information Security; 2007; Volume 2007, pp. 132–138. [Google Scholar]
- Bhise, A.M.; Kamble, S.D. Detection and mitigation of Sybil attack in peer-to-peer network. Int. J. Comput. Netw. Inf. Secur. 2016, 8, 56. [Google Scholar] [CrossRef] [Green Version]
- Cerri, D.; Ghioni, A.; Paraboschi, S.; Tiraboschi, S. ID mapping attacks in P2P networks. In Proceedings of the GLOBECOM ’05, IEEE Global Telecommunications Conference, Rio de Janeiro, Brazil, 4–8 December 2005; Volume 3. [Google Scholar] [CrossRef]
- Trifa, Z.; Khemakhem, M. Taxonomy of structured P2P overlay networks security attacks. Int. J. Comput. Inf. Eng. 2012, 6, 470–476. [Google Scholar]
- Thommes, R.; Coates, M. Modeling Virus Propagation in Peer-to-Peer Networks. In Proceedings of the 2005 5th International Conference on Information Communications & Signal Processing, Bangkok, Thailand, 6–9 December 2005; pp. 981–985. [Google Scholar] [CrossRef] [Green Version]
- Rohloff, K.; Basar, T. Stochastic behavior of random constant scanning worms. In Proceedings of the 14th International Conference on Computer Communications and Networks, San Diego, CA, USA, 17–19 October 2005; pp. 339–344. [Google Scholar] [CrossRef]
- Benevenuto, F.; Costa, C.; Vasconcelos, M.; Almeida, V.; Almeida, J.; Mowbray, M. Impact of Peer Incentives on the Dissemination of Polluted Content. In Proceedings of the 2006 ACM Symposium on Applied Computing, Dijon, France, 23–27 April 2006; Association for Computing Machinery: New York, NY, USA, 2006; pp. 1875–1879. [Google Scholar] [CrossRef] [Green Version]
- Thommes, R.; Coates, M. Epidemiological Modelling of Peer-to-Peer Viruses and Pollution. In Proceedings of the IEEE INFOCOM 2006, 25th IEEE International Conference on Computer Communications, Barcelona, Spain, 23–29 April 2006. [Google Scholar] [CrossRef] [Green Version]
- Kumar, R.; Yao, D.D.; Bagchi, A.; Ross, K.W.; Rubenstein, D. Fluid Modeling of Pollution Proliferation in P2P Networks. ACM SIGMETRICS Perform. Eval. Rev. 2006, 34, 335–346. [Google Scholar] [CrossRef]
- Feng, C.S.; Qin, Z.G.; Cuthbet, L.; Tokarchuk, L. Propagation modeling and analysis of viruses in P2P networks. In Proceedings of the 2008 International Conference on Machine Learning and Cybernetics, Kunming, China, 12–17 July 2008; Volume 7, pp. 3635–3640. [Google Scholar] [CrossRef]
- Liu, M.; Han, L.; Hong, F.; Zou, M. A Computer Virus Propagation Model in P2P Networks. In Proceedings of the 2009 First International Workshop on Education Technology and Computer Science, Washington, DC, USA, 7–8 March 2009; Volume 1, pp. 578–581. [Google Scholar] [CrossRef]
- Ebrahim, M.; Talha, S.M.U.; Ahmad, J. Modeling Virus Propagation in Pure Peer-to-Peer Networks. In Proceedings of the 8th International Conference on Frontiers of Information Technology, Islamabad, Pakistan, 21–23 December 2010; Association for Computing Machinery: New York, NY, USA, 2010. [Google Scholar] [CrossRef]
- Xu, X.; Geng, Y.; Xiong, J. Model of Proactive Malicious Code Propagation and Vaccine Contradiction in P2P Network. Trans. Beijing Inst. Technol. 2013, 33, 605. [Google Scholar]
- Liu, X.; Liu, J. Novel non-linear dynamics P2P network worm propagation and immune model. IET Inf. Secur. 2020, 14, 175–184. [Google Scholar] [CrossRef]
- Zhou, Y.; Wu, Z.; Ye, C.; Zhong, J.; Wang, H.; Feng, Y. Proactive worm prevention based on P2P networks. In Proceedings of the 2006 IET International Conference on Wireless, Mobile and Multimedia Networks, Hangzhou, China, 6–9 November 2006; pp. 1–4. [Google Scholar]
- Shi, C.; Han, D.; Hu, X.; Yu, Y. A unified model of pollution in P2P networks. In Proceedings of the 2008 IEEE International Symposium on Parallel and Distributed Processing, Miami, FL, USA, 14–18 April 2008; pp. 1–12. [Google Scholar] [CrossRef]
- Peng, H.; Lu, S.; Zhao, D.; Zhang, A.; Li, J. An anti-attack model based on complex network theory in P2P networks. Phys. A Stat. Mech. Its Appl. 2012, 391, 2788–2793. [Google Scholar] [CrossRef] [Green Version]
- Faheem Rasheed, M. Modelling Virus Propagation in P2P Networks. Int. J. Comput. Sci. 2012, 9, 580–587. [Google Scholar]
- Kumar, P.; Gupta, G.; Tripathi, R. A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J. Ambient Intell. Humaniz. Comput. 2021, 12, 9555–9572. [Google Scholar] [CrossRef]
- Kumar, P.; Kumar, R.; Gupta, G.P.; Tripathi, R.; Srivastava, G. P2TIF: A Blockchain and Deep Learning Framework for Privacy-Preserved Threat Intelligence in Industrial IoT. IEEE Trans. Ind. Inform. 2022, 18, 6358–6367. [Google Scholar] [CrossRef]
- Kumar, P.; Gupta, G.; Tripathi, R. Toward Design of an Intelligent Cyber Attack Detection System using Hybrid Feature Reduced Approach for IoT Networks. Arab. J. Sci. Eng. 2021, 46, 3749–3778. [Google Scholar] [CrossRef]
- Kumar, P.; Gupta, G.; Tripathi, R. Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network. Autom. Control Comput. Sci. 2021, 55, 137–147. [Google Scholar] [CrossRef]
- Veciana, G.; Yang, X. Fairness, incentives and performance in peer-to-peer networks. Seeds 2003, 250, 350. [Google Scholar]
- Qiu, D.; Srikant, R. Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks. ACM SIGCOMM Comput. Commun. Rev. 2004, 34, 367–378. [Google Scholar] [CrossRef] [Green Version]
- del Rey, A.M. Mathematical modeling of the propagation of malware. Secur. Commun. Netw. 2015, 5, 422–437. [Google Scholar] [CrossRef]
- Kolbitsch, C.; Comparetti, P.M.; Kruegel, C.; Kirda, E.; Zhou, X.y.; Wang, X. Effective and efficient malware detection at the end host. In Proceedings of the USENIX Security Symposium, Montreal, QC, Canada, 12–14 August 2009; Volume 4, pp. 351–366. [Google Scholar]
- Martignoni, L.; Stinson, E.; Fredrikson, M.; Jha, S.; Mitchell, J.C. A layered architecture for detecting malicious behaviors. In Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Cambridge, MA, USA, 15–17 September 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 78–97. [Google Scholar]
- Kharraz, A.; Kirda, E. Redemption: Real-time protection against ransomware at end-hosts. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses, Atlanta, GA, USA, 18–20 September 2017; Springer: Cham, Switzerland, 2017; pp. 98–119. [Google Scholar]
- Verma, A.; Rao, M.; Gupta, A.; Jeberson, W.; Singh, V. A literature review on malware and its analysis. Int. J. Curr. Res. Rev. 2013, 5, 71. [Google Scholar]
- Namanya, A.P.; Cullen, A.; Awan, I.U.; Disso, J.P. The world of Malware: An overview. In Proceedings of the 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, 6–8 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 420–427. [Google Scholar]
- Zeltser, L. Reverse Engineering Malware: Tools and Techniques Hands-On; SANS Institute: North Bethesda, MD, USA, 2007. [Google Scholar]
- Qi, M. P2P network-targeted DDoS attacks. In Proceedings of the 2009 Second International Conference on the Applications of Digital Information and Web Technologies, Washington, DC, USA, 13–14 December 2009; IEEE: Piscataway, NJ, USA, 2009; pp. 843–845. [Google Scholar]
- R. Aruna, M. Study of P2P Networks Protection Opposing Malicious Attacks. Int. J. Comput. Sci. Inf. Technol. Res. 2014, 2, 217–223. [Google Scholar]
- Jaideep, G.; Battula, B. Detection of DDOS attacks in distributed peer to peer networks. Int. J. Eng. Technol. 2018, 7, 1051. [Google Scholar] [CrossRef] [Green Version]
- Naoumov, N.; Ross, K. Exploiting P2P systems for DDoS attacks. In Proceedings of the 1st International Conference on Scalable Information Systems, Hong Kong, China, 30 May–1 June 2006; p. 47. [Google Scholar] [CrossRef]
- Yakubu, B.M.; Khan, M.I.; Khan, A.; Jabeen, F.; Jeon, G. Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home. Digit. Commun. Netw. 2023, 1–15. [Google Scholar] [CrossRef]
Reference | Introduced Methodology |
---|---|
[26] | This model is a modified version of the susceptible–exposed–infected model from the field of epidemiology. |
[27] | Computationally simple hybrid deterministic/stochastic model for the observed scanning behavior on a local network. |
[28] | Event-driven simulator. |
[29] | Discrete simulations that provide some verification. |
[30] | Non-linear differential equations. |
[31] | Deep analysis of the features of file sharing and virus propagation. |
[32] | 0.01 Files in the network as subjects instead of the computers, as is traditional. |
[33] | Epidemiological modeling that predicts. |
[34] | In-depth analysis of the active malicious code characteristics. |
[35] | Based on the worm propagation characteristics and mechanism of a conditional triggered worm attack. |
[37] | Attacks of various pollution, including file-targeted attacks and index-targeted attacks. |
[38] | Complex network theory. |
[39] | A customized form of susceptible–exposed–infected model based on the study of epidemiology. |
[8] | Deterministic models of the propagation of computer viruses in a heterogeneous network. |
Parameter | Value | Description | Units |
---|---|---|---|
c | 0.02 | Download file rate | files/s |
1 | Peer arrival rate | users/s | |
0.00125 | Upload file rate | files/s | |
0.01 | Leecher connection time | s | |
0.01 | Seed connection time | s | |
0.85 | Download efficiency coefficient |
Parameter | Value | Description | Units |
---|---|---|---|
K | 1/10 | File chunks | size/chunks |
- | Infected leechers | peers | |
- | Infected seeds | peers | |
10 | Initial number of infected seeds | peers |
Average in 100,000 Iterations | |
---|---|
Leechers | Seeds |
100 ± 15 | 16 ± 3 |
Approximate running time: 25 min |
Average in 100,000 Iterations | |||
---|---|---|---|
Healthy Leechers | Healthy Seeds | Infected Leechers | Infected Seeds |
33 ± 8 | 2 ± 1 | 10 ± 5 | 2 ± 2 |
Approximate time: 37 min |
Healthy Leechers | Healthy Seeds | DoS Leechers | DoS Seeds | ||
1 | 0.00 | 9.155 | 53.013 | 7.811 | 2.924 |
1 | 0.25 | 9.784 | 4.406 | 9.884 | 3.967 |
1 | 0.50 | 10.576 | 1.614 | 11.208 | 1.658 |
1 | 0.75 | 9.410 | 1.167 | 10.214 | 1.123 |
40 | 0.00 | 9.727 | 52.927 | 151.998 | 2.659 |
40 | 0.25 | 7.349 | 3.669 | 133.747 | 15.693 |
40 | 0.50 | 4.725 | 1.177 | 208.656 | 11.323 |
40 | 0.75 | 12.693 | 1.817 | 116.988 | 4.143 |
80 | 0.00 | 9.033 | 52.525 | 146.615 | 2.544 |
80 | 0.25 | 7.172 | 3.556 | 154.939 | 16.503 |
80 | 0.50 | 5.685 | 1.238 | 223.982 | 10.481 |
80 | 0.75 | 6.836 | 1.253 | 180.951 | 7.281 |
Healthy Leechers | Healthy Seeds | DoS Leechers | DoS Seeds | ||
1 | 0.00 | 429.252 | 2.289 | 4.119 | 2.099 |
1 | 0.25 | 41.452 | 1.946 | 54.870 | 2.082 |
1 | 0.50 | 8.488 | 1.451 | 7.729 | 1.401 |
1 | 0.75 | 4.944 | 1.519 | 2.153 | 1.394 |
40 | 0.00 | 431.542 | 1.883 | 1.713 | 17.139 |
40 | 0.25 | 19.523 | 1.814 | 285.543 | 8.148 |
40 | 0.50 | 7.048 | 1.369 | 117.530 | 9.321 |
40 | 0.75 | 4.846 | 1.390 | 39.069 | 8.573 |
80 | 0.00 | 427.611 | 1.962 | 2.633 | 20.930 |
80 | 0.25 | 15.665 | 1.461 | 329.619 | 15.223 |
80 | 0.50 | 7.597 | 1.432 | 170.413 | 11.722 |
80 | 0.75 | 6.602 | 1.603 | 36.358 | 10.091 |
and | Healthy Leechers | Healthy Seeds | DoS Leechers | DoS Seeds | |
1 | 0.00 | 439.798 | 97.388 | 4.694 | 2.283 |
1 | 0.25 | 38.829 | 5.531 | 39.261 | 4.513 |
1 | 0.50 | 9.744 | 1.517 | 9.152 | 1.405 |
1 | 0.75 | 4.192 | 1.221 | 2.164 | 1.118 |
40 | 0.00 | 404.865 | 112.855 | 2.692 | 2.889 |
40 | 0.25 | 18.157 | 3.590 | 277.356 | 14.842 |
40 | 0.50 | 6.161 | 1.357 | 159.849 | 9.440 |
40 | 0.75 | 3.824 | 1.156 | 28.004 | 3.046 |
80 | 0.00 | 423.479 | 117.059 | 3.290 | 3.241 |
80 | 0.25 | 12.866 | 3.532 | 307.616 | 17.266 |
80 | 0.50 | 5.735 | 1.301 | 163.830 | 11.180 |
80 | 0.75 | 4.727 | 1.262 | 80.808 | 8.086 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sánchez-Patiño, N.; Gallegos-Garcia, G.; Rivero-Angeles, M.E. Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions. Appl. Sci. 2023, 13, 4625. https://doi.org/10.3390/app13074625
Sánchez-Patiño N, Gallegos-Garcia G, Rivero-Angeles ME. Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions. Applied Sciences. 2023; 13(7):4625. https://doi.org/10.3390/app13074625
Chicago/Turabian StyleSánchez-Patiño, Natalia, Gina Gallegos-Garcia, and Mario E. Rivero-Angeles. 2023. "Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions" Applied Sciences 13, no. 7: 4625. https://doi.org/10.3390/app13074625
APA StyleSánchez-Patiño, N., Gallegos-Garcia, G., & Rivero-Angeles, M. E. (2023). Teletraffic Analysis of DoS and Malware Cyber Attacks on P2P Networks under Exponential Assumptions. Applied Sciences, 13(7), 4625. https://doi.org/10.3390/app13074625