<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A model of a DDoS attack scenario on elements of specialized information technology and methods of combating cybercriminals</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Mykola</forename><surname>Stetsyuk</surname></persName>
							<email>mykola.stetsiuk@khmnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>11 Institutska Street</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Viktor</forename><surname>Cheshun</surname></persName>
							<email>cheshunvn@khmnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>11 Institutska Street</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yuriy</forename><surname>Stetsyuk</surname></persName>
							<email>yuriy.stetsuk@khmnu.edu.ua</email>
						</author>
						<author>
							<persName><forename type="first">Оleksandr</forename><surname>Kozelskiy</surname></persName>
							<email>oleksandr.kozelskiy@khmnu.edu.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>11 Institutska Street</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Abdel- Badeeh</forename><forename type="middle">M</forename><surname>Salem</surname></persName>
							<email>abmsalem@yahoo.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>11 Institutska Street</addrLine>
									<postCode>29000</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Ain Shams University</orgName>
								<address>
									<country key="EG">Egypt</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">International Workshop on Intelligent Information Technologies and Systems of Information Security</orgName>
								<address>
									<addrLine>March 28</addrLine>
									<postCode>2024</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A model of a DDoS attack scenario on elements of specialized information technology and methods of combating cybercriminals</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">BB3206B5654AEC5BB95215E2A2CEDB79</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:04+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>сybersecurity, malware, DDoS attack, attack scenario, stochastic network, software vulnerability 1 Badeeh M. Salem)</term>
					<term>0000-0003-3875-0416 (M. Stetsiuk)</term>
					<term>0000-0002-3935-2068 (V.Cheshun)</term>
					<term>0000-0001-9880-2666 (Y.Stetsiuk)</term>
					<term>0000-0002-4104-745X (O. Kozelskiy)</term>
					<term>0000-0003-0268-6539 (Abdel-Badeeh M. Salem)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this article, we present a scenario model of a DDoS attack on elements of specialized information technology. The proposed model ensures the finding of initial data for a comprehensive assessment of the stability of the functioning of a specialized information system operating under the conditions of the action of malicious software on its network elements. The approbation of the model and the simulation of the DDoS attack process in the environment of the MathCAD application program allowed us to conclude that the proposed model allows adequately, with a sufficient level of detail and flexibility, to display the simulated process, is sensitive to changes in input data, and allows obtaining consistent simulation results. as well as identify appropriate directions for ensuring the viability of specialized information systems. The resulting model allows you to estimate not only the potential capabilities of malicious software, but also the time it takes to implement a DDoS attack on network elements of information systems. The work also provides practical advice regarding the inclusion in the architectures of developed specialized information systems of hardware to prevent malware attacks.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Introduction</head><p>Ensuring information security is an important aspect of the development of modern society. Due to the fact that confidential and secret information is processed and stored in information systems, this problem is relevant in the design and operation of specialized information systems <ref type="bibr" target="#b0">[1]</ref>.</p><p>The difficulty of ensuring stable operation of modern specialized information systems (IS) has recently been constantly increasing due to more frequent cases of attacks implemented by malicious software <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref>. These attacks are accompanied, as a rule, by information influences on IS elements. Information influences are carried out by the offender using computer attacks, which aim to make the functions implemented by specialized IS unavailable or difficult to access. The result of the influence of malicious software is the blocking of commands, work failures or the complete impossibility of IS operation <ref type="bibr" target="#b1">[2]</ref>.</p><p>In works <ref type="bibr">[1, 4 -7]</ref>, the most famous types of computer attacks are given, where DDoS attacks (Distributed Denial of Service) occupy a special place. The prevalence of this type of attacks is due to the simplicity of their implementation and the serious consequences of their implementation.</p><p>DDoS attacks can be implemented at almost any level of the ISO/OSI network protocol stack model used by computer systems for communication <ref type="bibr">[8 -12]</ref>.</p><p>DDoS attacks on levels 3-4 and 7 of the ISO/OSI model are the most popular among criminals <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b12">13]</ref>. This is explained by the following reasons.</p><p>At the 3rd and 4th levels of the ISO/OSI model, the object of attack is the elements of the network infrastructure, such as routers and others. A DDoS attack at the third level aims at the transmission of a large volume of data (flood). The attack at the fourth level is carried out with the aim of slowing down, and with the maximum effect -blocking the operation of the web server. Loading the access channels of the web server will eventually lead to the blocking of access of the client's automated workplaces to the resources provided by the specialized IS.</p><p>Even more dangerous is a DDoS attack at the 7th level of the ISO/OSI model <ref type="bibr" target="#b10">[11]</ref>. The reason is that it is directed to the application server, which causes it to become overloaded and, to a large extent, makes the functions of the specialized IS unavailable for its automated workplaces. This type of attack is particularly difficult to implement and is characterized by high transparency for anti-virus software due to their similarity to useful traffic.</p><p>According to the National Cyber Security Coordination Center of Ukraine <ref type="bibr" target="#b0">[1]</ref>, in 2023, every fifth Ukrainian company or state organization experienced a DDoS attack. At the same time, attacks most often targeted large banks (27%), medium and small businesses (15%). DDoS attacks were aimed at creating problems in the operation of the main pages of the websites of both state institutions (including educational institutions -the authors of the article directly observed and investigated the actions of attackers on the electronic resources of the Khmelnytskyi National University), and businesses (39% of attacks), output failure of communication services, mail, communication, as well as functions that allow the user to enter the IS (19%).</p><p>Experts of the National Cyber Security Coordination Center note that last year Ukraine took the leading place in the world in terms of the number of DDoS attacks on its specialized systems for various purposes.</p><p>Thus, the task of assessing the capabilities of malicious software to carry out DDoS attacks on specialized IS is, along with others, one of the most pressing scientific tasks today.</p><p>One of the most difficult and important tasks for evaluating capabilities, detecting and countering the effects of malicious software is the selection of a mathematical model adequate for the purposes <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>. Today, a large number of cyber security models are used in information security tasks: models of a legitimate user and violator <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b19">20]</ref>, models of attacks <ref type="bibr" target="#b2">[3]</ref> and their detection <ref type="bibr" target="#b13">[14]</ref>, adaptive models of intrusion detection and countermeasures systems using methods of intelligent data analysis (multilayer direct propagation networks, radial base networks, recurrent networks and self-organizing maps, etc.) <ref type="bibr">[15 -17]</ref>.</p><p>This work is devoted to the construction and consideration of a model of the process of a computer attack of the type "Distributed Denial of Service" on the elements of a specialized information system. The resulting model allows you to estimate not only the potential capabilities of malicious software, but also the time it takes to implement a DDoS attack on network elements of information systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">A problem to be solved</head><p>Today, one of the most convenient technologies for building computer networks of organizations and companies is the MPLS network technology <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b18">19]</ref>. It combines the technique of virtual channels with the functionality of the TCP/IP stack. This network property is achieved by having the same LSR (Label Switch Router) network device act as both an IP router and a virtual circuit switch. This makes it possible to combine territorially separated parts of information systems of companies into single local networks, which is extremely convenient. That is why the MPLS technology is chosen as the basic one when creating a mathematical model of a DDoS attack.</p><p>We conduct research for the MPLS network, which consists of routers, switches, servers and client automated workstations of some specialized IS, which functions under the influence of DDoS attacks.</p><p>A DDoS attack is preceded by some preparatory actions. To a large extent, the success of the attack depends on the number of computers that make up the Bot network. Unfortunately, today, such networks not only exist, but are also provided by criminals for rent. Therefore, today the attacker has the opportunity to immediately focus directly on the object of the attack.</p><p>As a rule, an attacker needs to conduct reconnaissance of the network of the information system chosen for the attack by performing a number of steps. For this, he needs to determine its active elements, type and versions of operating systems, as well as network services. We denote the average time spent on this as 𝑡𝑡 𝑑𝑑𝑑𝑑𝑑𝑑.𝑑𝑑𝑒𝑒𝑑𝑑𝑒𝑒 ,𝑡𝑡 𝑑𝑑𝑑𝑑𝑑𝑑.𝑂𝑂𝑂𝑂 and 𝑡𝑡 𝑑𝑑𝑑𝑑𝑑𝑑.𝑜𝑜𝑑𝑑.𝑠𝑠𝑑𝑑𝑠𝑠𝑠𝑠 with distribution functions M(t), D(t), L(t), respectively. The attacker successfully implements these actions with probabilities𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑑𝑑𝑒𝑒𝑑𝑑𝑒𝑒. , 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑂𝑂𝑂𝑂. and 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑜𝑜𝑑𝑑.𝑠𝑠𝑑𝑑𝑠𝑠𝑠𝑠 . The calculation of these probabilities can be carried out according to the method proposed in the description of the mathematical model of the information security violator <ref type="bibr" target="#b19">[20]</ref>.</p><p>If the attacker failed to set at least one of the network parameters, then his attempts will be repeated with probabilities 1 − 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑑𝑑𝑒𝑒𝑑𝑑𝑒𝑒 , 1 − 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑂𝑂𝑂𝑂 and 1 − 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑜𝑜𝑑𝑑.𝑠𝑠𝑑𝑑𝑠𝑠𝑠𝑠 , respectively, where 𝑡𝑡 𝑎𝑎𝑠𝑠𝑑𝑑𝑠𝑠.𝑠𝑠𝑑𝑑𝑟𝑟𝑑𝑑𝑟𝑟 is the average repetition time with the distribution function Z(t).</p><p>In the next step, the attacker analyzes the received data and determines the vulnerabilities of the elements of the attacked network in the spent average time 𝑡𝑡 𝑖𝑖𝑑𝑑𝑑𝑑𝑖𝑖𝑟𝑟.𝑠𝑠𝑣𝑣𝑒𝑒 with the time distribution function K(t) and determines the connection requests to the server -attack targets in the average time 𝑡𝑡 𝑠𝑠𝑑𝑑𝑟𝑟𝑣𝑣𝑑𝑑𝑠𝑠𝑟𝑟 with the time distribution function Y(t) and the probability connecting to the target server 𝑃𝑃 𝑐𝑐𝑜𝑜𝑖𝑖𝑖𝑖𝑑𝑑𝑐𝑐𝑟𝑟. , and receiving a response about its status after time 𝑡𝑡 𝑔𝑔𝑑𝑑𝑟𝑟.𝑠𝑠𝑟𝑟𝑎𝑎𝑟𝑟𝑣𝑣𝑠𝑠 with a distribution function U(t). If access is not obtained, the attacker sends a second request in the average time 𝑡𝑡 𝑠𝑠𝑑𝑑𝑟𝑟.𝑠𝑠𝑑𝑑𝑔𝑔 with the distribution function V(t).</p><p>To launch a DDoS attack, the offender activates the Bot network , indicates the object of the attack (Fig. <ref type="figure" target="#fig_0">1</ref>). Each bot computer starts sending service requests to the attack object with an average time 𝑡𝑡 𝑠𝑠𝑑𝑑𝑔𝑔.𝑠𝑠𝑑𝑑𝑔𝑔. with a time distribution function W(t).</p><p>In the case of successful implementation of all steps, the attacker sends a large number of anonymous false connection requests through the Bot-network controlled by him, which lead to the overflow of the server's RAM. Server overload, in turn, blocks the access of legitimate client automated jobs of the attacked specialized IS. Such blocking of IS servers is carried out during the average time 𝑡𝑡 𝑒𝑒𝑜𝑜𝑐𝑐𝑙𝑙. with the distribution function N(t).</p><p>The average time 𝑇𝑇 𝑖𝑖𝑒𝑒𝑟𝑟𝑒𝑒.𝑎𝑎𝑠𝑠𝑑𝑑𝑠𝑠. and the distribution function F(t) of the time of implementation by the offender of the DDoS attack are to be determined. At the same time, we will assume that the implementation time of all stages is random and characterized by an exponential distribution, and all probabilities take the same values.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">DDoS attack scenario model</head><p>Let us present the process of organizing a DDoS attack in the form of a stochastic network (Fig. <ref type="figure" target="#fig_1">2</ref>).  The DDOS attack scenario may include a parcel in a special non-correal request server for an average time 𝑡𝑡 𝑖𝑖𝑖𝑖𝑠𝑠.𝑠𝑠𝑑𝑑𝑔𝑔 with probability 1 − 𝑃𝑃 𝑖𝑖𝑖𝑖𝑠𝑠.𝑠𝑠𝑑𝑑𝑔𝑔. . This scenario is carried out under the hypothesis that the attacked server contains configuration errors or vulnerabilities known to the attacker. Successful implementation of the attack script can cause the server to "hang" due to a buffer overflow, for example.</p><p>Taking into account the given scenario of a DDoS attack, its stochastic network will take the form shown in Fig. <ref type="figure" target="#fig_2">3</ref>. Note that here: w(s), m(s), z(s), d(s), l(s), k(s), y(s), v(s), u(s), n(s) and o(s) are the Laplace-Stiltjes transformations of the corresponding distribution functions specified in the problem statement and defined as:</p><formula xml:id="formula_0">( ) [ ] s ri ri t Ri d st e S ri + = − = ∫ ∞ 0 ) (<label>(1)</label></formula><p>where: ri -the equivalent transformation function of the ith distribution function W(t), M(t),..., O(t); Ri(t) is the i-th distribution function of the average time t for the i-th stage of a Ddos attack; s is the change defined on the complex plane S, where the transformation ) (S ri exists.</p><p>To determine the equivalent function, we close the input and output of the stochastic network (Fig. <ref type="figure" target="#fig_1">2</ref> and Fig. <ref type="figure" target="#fig_2">3</ref>) with a fictitious branch 𝑄𝑄𝑄𝑄(𝑠𝑠) =</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">𝑄𝑄(𝑠𝑠)</head><p>where: Q(s) is the equivalent function of the real resulting branch of the stochastic network (Fig. <ref type="figure" target="#fig_1">2</ref>)</p><p>In our further steps, we will adhere to the DDoS attack scenario presented in the form of a stochastic network in Fig. <ref type="figure" target="#fig_1">2</ref>.</p><p>Let's define loops of the first and second orders in the stochastic network model with the assumption that the values of all probabilities 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑑𝑑𝑒𝑒𝑑𝑑𝑒𝑒. , 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑂𝑂𝑂𝑂 , 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑠𝑠𝑑𝑑𝑠𝑠𝑠𝑠. , 𝑃𝑃 𝑠𝑠𝑟𝑟𝑎𝑎𝑟𝑟𝑑𝑑.𝑑𝑑𝑑𝑑𝑑𝑑𝑖𝑖𝑖𝑖 are equal and equal to some value n P . Then the loops of the first order Lk.n, where k = 1, n = 1 -4 will be defined as:</p><formula xml:id="formula_1">) ( ) 1 ( ) ( 1 . 1 s z n P s m L ⋅ − ⋅ = ; ) ( ) 1 ( ) ( ) ( 2 . 1 s z n P n P s d s m L ⋅ − ⋅ ⋅ ⋅ = ; ) ( ) 1 ( 2 ) ( ) ( ) ( 3 . 1 s z n P n P s l s d s m L ⋅ − ⋅ ⋅ ⋅ ⋅ = ; ) 1 ( ) ( 4 . 1 n P s y L − ⋅ = .</formula><p>Accordingly, loops of the second order Lk.n, where k=2, n=1 -3:</p><formula xml:id="formula_2">) ( ) ( ) ( ) 2 1 ( ) ( 1 . 2 s v s y s z n P s m L ⋅ ⋅ ⋅ − ⋅ = ; ) ( ) ( ) ( ) 2 1 ( ) ( ) ( 2 . 2 s v s y s z n P n P s d s m L ⋅ ⋅ ⋅ − ⋅ ⋅ ⋅ = ; ) ( ) ( ) ( ) 2 1 ( 2 ) ( ) ( ) ( 3 . 2 s v s y s z n P n P s l s d s m L ⋅ ⋅ ⋅ − ⋅ ⋅ ⋅ ⋅ = . Using Mason's equation: 0 ) ( ) 1 ( 1 1 = ⋅ − + = ∑ = s k Q k H k i (2)</formula><p>where 𝑄𝑄 𝑙𝑙 (𝑠𝑠) are the equivalent functions of loops of the kth order, we get the equivalent function of the stochastic network:</p><formula xml:id="formula_3">      ⋅ ⋅ + ⋅ + ⋅ ⋅         − ⋅ −       ⋅ ⋅ + ⋅ + ⋅ ⋅ ⋅ ⋅ ⋅ ⋅ ⋅ ⋅ ⋅ ⋅ ⋅ = n P s l s d n P s d s v n P s y P s l s d n P s Q 2 ) ( ) ( ) ( 1 ) ( 1 1 ) ( 2 ) ( ) ( n P d(s) 1 z(s) ) n P - (1 m(s) - 1 n 4 P n(s) u(s) y(s) k(s) l(s) d(s) m(s) w(s) ) , (<label>(3)</label></formula><p>By definition, this is a characteristic function, so its differentiation will allow finding the first and second initial moments of the random time of the implementation of a DDos attack:</p><formula xml:id="formula_4">0 ) ,<label>0 ( ) , ( ) , ( 1 = </label></formula><formula xml:id="formula_5">           = − = s n P s Q n P s Q ds d n P s M ,<label>(4) 0 ) , 0 ( ) , ( 2 2 ) , ( 2 = </label></formula><formula xml:id="formula_6">           = − = s n P s Q n P s Q ds d n P s M . (<label>5</label></formula><formula xml:id="formula_7">)</formula><p>From expressions ( <ref type="formula" target="#formula_5">4</ref>) and ( <ref type="formula" target="#formula_6">5</ref>), we get the formula for determining the average time of DDoS attack implementation:</p><formula xml:id="formula_8">0 ) , 0 ( ) , ( ) ( =             = − = s n P s Q n P s Q ds d n P p t . (<label>6</label></formula><formula xml:id="formula_9">)</formula><p>The variance of DDoS attack implementation time 𝐷𝐷(𝑡𝑡 𝑖𝑖𝑒𝑒𝑟𝑟𝑒𝑒. ), which is defined as the second central moment, is represented by the expression:</p><formula xml:id="formula_10">2 0 ) ,<label>0 ( ) , ( 0 ) , 0 ( ) , ( 2 2 )</label></formula><formula xml:id="formula_11">(               =             = − − =             = − = s n P s Q n P s Q ds d s n P s Q n P s Q ds d p t D .<label>(7)</label></formula><p>The calculation of mathematical expectation and dispersion allows to determine the time distribution function of the successful implementation of a DDoS attack as an incomplete gamma function with sufficient accuracy for engineering calculations <ref type="bibr" target="#b20">[21]</ref>:</p><formula xml:id="formula_12">       &gt; ⋅ − ⋅ − ⋅ Γ &lt; = ∫ t t if dt t e t t if t F 0 0 _ _ , 1 ) ( 0 _ _ , 0 ) ( µ α α α µ ,<label>(8)</label></formula><p>where 𝛼𝛼 = </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Approbation of the model</head><p>Calculations were made using formula <ref type="bibr" target="#b7">(8)</ref> in the environment of the MathCAD application program package, the results of which are presented in the graphs (Fig. <ref type="figure" target="#fig_4">4</ref>). The values of the average time taken by the attacker to implement the steps of the DDoS attack are shown in Table <ref type="table" target="#tab_0">1</ref> as the initial data.</p><p>The values of all of the probabilities are assumed to be equal to 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑑𝑑𝑒𝑒𝑑𝑑𝑒𝑒. , 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑂𝑂𝑂𝑂. , 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑠𝑠𝑑𝑑𝑠𝑠𝑠𝑠 , 𝑃𝑃 𝑐𝑐𝑜𝑜𝑖𝑖𝑑𝑑𝑐𝑐𝑟𝑟. Therefore, in the future we will replace them with the notation Pn and, in the calculation, we will take its value equal to 0.75 -0.9.</p><p>In  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusions</head><p>The analysis of the obtained results shows that the developed model of the scenario of the implementation of a DDoS attack by an attacker on the elements of a specialized information system is sufficiently sensitive to changes in the initial data, allows obtaining consistent results, adequately reflects the course of the computer attack and makes it possible to determine the probability-time characteristics of the attacker's cyber influence system. The simulation results show that the main influence on the success of the offender's implementation of a DDoS attack on IS elements is carried out through the parameters that can become available to him as a result of intelligence of the IS network, through knowledge of methods of identification and authentication of legitimate users.</p><p>To increase the security of IS against the cyber influence of the violator, it is advisable to implement the organizational and technical measures outlined in <ref type="bibr">[21,23 -26]</ref>.</p><p>As can be seen from the analysis, today the main threat to information stored in IS comes from the global computer network.</p><p>Therefore, the structure of the computer network, on which the operation of the IS will be based, should provide for its division into local segments with access restrictions to them.</p><p>In such protected segments with controlled access, the server part of the IS and its client locations, which provide the basic functionality of the system, are placed. The use of managed switches with the function of creating virtual computer networks (VLAN) made it difficult for the attacker to explore the network he chose for the attack, increasing the probability of its negative termination 1 − 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑑𝑑𝑒𝑒𝑑𝑑𝑒𝑒. , 1 − 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑂𝑂𝑂𝑂 , 1 − 𝑃𝑃 𝑑𝑑𝑑𝑑𝑑𝑑.𝑜𝑜𝑑𝑑.𝑠𝑠𝑑𝑑𝑠𝑠𝑠𝑠 , 1 − 𝑃𝑃 𝑐𝑐𝑜𝑜𝑖𝑖𝑖𝑖𝑑𝑑𝑐𝑐𝑟𝑟 and at the same time allowed:</p><p>1. Protect the network from outside interference. A managed network switch port will be able to ignore and drop packets coming from other subnets, regardless of the originating IP address. 2. Flexibly manage the separation of computers by virtual subnets, ensuring isolation from each other, while their topology does not depend on where the network components are physically located.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The principle of organizing and running a DDoS attack.</figDesc><graphic coords="4,86.78,85.05,421.78,279.65" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Stochastic network of a computer DDos attack.</figDesc><graphic coords="4,88.43,389.78,418.34,91.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Stochastic network of a computer DDos attack with an incorrect request.</figDesc><graphic coords="4,87.83,605.08,419.70,90.75" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>[𝑟𝑟 ̅ 𝑝𝑝 (𝑃𝑃 𝑛𝑛 )] 2 𝐷𝐷(𝑟𝑟 ̅ 𝑝𝑝 ) is the shape parameter and 𝜇𝜇 == 𝑟𝑟 𝑝𝑝 (𝑃𝑃 𝑛𝑛 ) 𝐷𝐷(𝑟𝑟 𝑝𝑝 ) is the scale parameter ) (α Γ .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Dependence of the integral function of probability distribution on the time of implementation of a DDoS attack when it is successfully implemented with probability Pn.</figDesc><graphic coords="7,85.05,535.20,425.17,221.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5 : Simplified topology of a segmented computer network of a specialized IS.</figDesc><graphic coords="8,85.05,349.87,425.85,239.90" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>turn, the average implementation time 𝑇𝑇 𝑖𝑖𝑒𝑒𝑟𝑟𝑒𝑒.𝑎𝑎𝑠𝑠𝑑𝑑𝑠𝑠 of a DDoS attack at different values of the probability Pn is: at Pn=0,75 𝑇𝑇 𝑖𝑖𝑒𝑒𝑟𝑟𝑒𝑒.𝑎𝑎𝑠𝑠𝑑𝑑𝑠𝑠 = 64, 332 min; Pn=0,85 𝑇𝑇 𝑖𝑖𝑒𝑒𝑟𝑟𝑒𝑒.𝑎𝑎𝑠𝑠𝑑𝑑𝑠𝑠 = 50,197 min; Pn= 0,9 𝑇𝑇 𝑖𝑖𝑒𝑒𝑟𝑟𝑒𝑒.𝑎𝑎𝑠𝑠𝑑𝑑𝑠𝑠 = 41,129 min. Time parameters of DDos attack simulation.</figDesc><table><row><cell>Step time</cell><cell>Parameter</cell><cell>Time,</cell></row><row><cell></cell><cell>designation</cell><cell>min</cell></row><row><cell>Average time to determine active network elements</cell><cell>𝑡𝑡 𝑑𝑑𝑑𝑑𝑑𝑑.𝑑𝑑𝑒𝑒𝑑𝑑𝑒𝑒</cell><cell>7</cell></row><row><cell>Average time to determine OS type and</cell><cell></cell><cell></cell></row><row><cell>versions of server and client automated workstations</cell><cell>𝑡𝑡 𝑑𝑑𝑑𝑑𝑑𝑑.𝑂𝑂𝑂𝑂</cell><cell>5</cell></row><row><cell>Average time to determine services</cell><cell>𝑡𝑡 𝑑𝑑𝑑𝑑𝑑𝑑.𝑜𝑜𝑑𝑑.𝑠𝑠𝑑𝑑𝑠𝑠𝑠𝑠</cell><cell>6</cell></row><row><cell>Average service request time</cell><cell>𝑡𝑡 𝑠𝑠𝑑𝑑𝑠𝑠𝑠𝑠.𝑠𝑠𝑑𝑑𝑔𝑔.</cell><cell>2</cell></row><row><cell>Average time to identify vulnerabilities</cell><cell>𝑡𝑡 𝑖𝑖𝑑𝑑𝑑𝑑𝑖𝑖𝑟𝑟.𝑠𝑠𝑣𝑣𝑒𝑒</cell><cell>7</cell></row><row><cell>The average time to repeat the definition of network elements</cell><cell>𝑡𝑡 𝑠𝑠𝑑𝑑𝑟𝑟.𝑠𝑠𝑑𝑑𝑔𝑔</cell><cell>4</cell></row><row><cell>Average time to receive a response about the server status</cell><cell>𝑡𝑡 𝑔𝑔𝑑𝑑𝑟𝑟.𝑠𝑠𝑟𝑟𝑎𝑎𝑟𝑟𝑣𝑣𝑠𝑠.</cell><cell>1</cell></row><row><cell>Average retry time of server connection requests</cell><cell>𝑡𝑡 𝑠𝑠𝑑𝑑𝑟𝑟.𝑠𝑠𝑑𝑑𝑔𝑔</cell><cell>4</cell></row><row><cell>Average server lock time</cell><cell>𝑡𝑡 𝑒𝑒𝑜𝑜𝑐𝑐𝑙𝑙.</cell><cell>3</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>3. Ensuring the reduction of broadcasting traffic in the network. Each virtual subnet created is a separate broadcast domain whose broadcast traffic will not be broadcast between different subnets, reducing the load on network equipment. 4. The division of the network into virtual subnets allowed us to apply our own security rules for each of them, which reduces the likelihood of a DDoS attack.</p><p>It is clear that it is almost impossible to get rid of the destructive influence of malicious software, but it is possible to significantly reduce its level using advanced countermeasures. As an example, the company "NVisionGroup" offers a comprehensive solution for protection against DDoS attacks based on Cisco Clean Pipes technology, which provides a quick response to DDoS attacks, is easily scalable, has high reliability and speed. Cisco Clean Pipes technology involves the use of Cisco Anomaly Detector and Cisco Guard modules, as well as various systems for statistical analysis of network traffic based on data received from routers using the Cisco Netflow protocol. At the same time, Anomaly Detector and statistical traffic analysis systems act as DDoS attack detection systems, and Cisco Guard as a means of countering an already detected attack.</p><p>Along with using the functionality of the latest network hardware, one should not ignore a fairly effective countermeasure, which is the elimination of software vulnerabilities at all levels. This leads to a sharp increase in the average time to find 𝑡𝑡 𝑖𝑖𝑑𝑑𝑑𝑑𝑖𝑖𝑟𝑟.𝑠𝑠𝑣𝑣𝑒𝑒. vulnerabilities and, accordingly, a decrease in the probability of successful completion of 𝑃𝑃 𝑖𝑖𝑑𝑑𝑑𝑑𝑖𝑖𝑟𝑟.𝑠𝑠𝑣𝑣𝑒𝑒. . This approach is especially effective when used in conjunction with network monitoring.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Evolution of Malware Threats and Techniques: a Review</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">N</forename><surname>Alenezi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">K</forename><surname>Alabdulrazzaq</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Alshaher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Alkharang</surname></persName>
		</author>
		<idno type="DOI">10.17762/ijcnis.v12i3.4723</idno>
		<ptr target="https://doi.org/10.17762/ijcnis.v12i3.4723" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Communication Networks and Information Security (IJCNIS)</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="326" to="337" />
			<date type="published" when="2022-04">Apr. 2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Bayesian Attack-Network Modeling Approach to Mitigating Malware-Based Banking Cyberattacks</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Zimba</surname></persName>
		</author>
		<idno type="DOI">10.5815/ijcnis.2022.01.03</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.5815/ijcnis.2022.01.03" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Network and Information Security</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="25" to="39" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Liu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.egyr.2021.08.126</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.1016/j.egyr.2021.08.126" />
	</analytic>
	<monogr>
		<title level="j">Energy Reports</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="8176" to="8186" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions</title>
		<author>
			<persName><forename type="first">Ö</forename><surname>Aslan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Aktug</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ozkan-Okay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Yilmaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Akin</surname></persName>
		</author>
		<idno type="DOI">10.3390/electronics12061333</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.3390/electronics12061333" />
	</analytic>
	<monogr>
		<title level="j">Electronics</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page">1333</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Cyber attacks and its different types</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Biju</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Gopal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Prakash</surname></persName>
		</author>
		<ptr target="https://www.irjet.net/archives/V6/i3/IRJET-V6I31244.pdf" />
	</analytic>
	<monogr>
		<title level="j">International Research Journal of Engineering and Technology (IRJET)</title>
		<imprint>
			<biblScope unit="volume">06</biblScope>
			<biblScope unit="issue">03</biblScope>
			<biblScope unit="page" from="4849" to="4852" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">Forbes</forename><surname>Ukraine</surname></persName>
		</author>
		<ptr target="https://forbes.ua/ru/news/monobank-zaznav-potuzhnoi-ddos-ataki-gorokhovskiy-12122023-17834" />
		<title level="m">Monobank repels powerful DDoS attack&quot; -Horokhovskyi</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<ptr target="https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-dos-attacks" />
		<title level="m">Enisa threat Landscape for DOS Attacks / Eurpean Union Agency for Cybersecurity</title>
				<imprint>
			<date type="published" when="2023-11">November, 2023</date>
			<biblScope unit="page">34</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Distributed Denial of Service Attacks: A Threat or Challenge</title>
		<author>
			<persName><forename type="first">J</forename><surname>Chahal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bhandari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Behal</surname></persName>
		</author>
		<idno type="DOI">10.1080/13614576.2019.1611468</idno>
		<ptr target="https://doi.org/10.1080/13614576.2019.1611468" />
	</analytic>
	<monogr>
		<title level="j">New Review of Information Networking</title>
		<imprint>
			<biblScope unit="page" from="31" to="103" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">On Distributed Denial of Service Current Defense Schemes</title>
		<author>
			<persName><forename type="first">S</forename><surname>Kotey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">T</forename><surname>Tchao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Gadze</surname></persName>
		</author>
		<idno type="DOI">10.3390/technologies7010019</idno>
		<ptr target="https://doi.org/10.3390/technologies7010019" />
	</analytic>
	<monogr>
		<title level="j">Technologies</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="24" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Comparative Analysis Based on Survey of DDOS Attacks: Detection Techniques at Transport, Network, and Application Layers</title>
		<author>
			<persName><forename type="first">M</forename><surname>Khambatta</surname></persName>
		</author>
		<ptr target="https://repository.stcloudstate.edu/msia_etds/91" />
	</analytic>
	<monogr>
		<title level="m">Culminating Projects in Information Assurance</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page">80</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Signature-based Approach to Detecting Malicious Outgoing Traffic</title>
		<author>
			<persName><forename type="first">A</forename><surname>Boyarchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Petliak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Klots</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Titova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Cheshun</surname></persName>
		</author>
		<ptr target="https://ceur-ws.org/Vol-3373/paper33.pdf" />
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="486" to="506" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">DoS and DDoS Attacks at OSI Layers</title>
		<author>
			<persName><forename type="first">H</forename><surname>Alameen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Esamaddin</surname></persName>
		</author>
		<idno type="DOI">10.5281/zenodo.3610833</idno>
		<ptr target="https://doi.org/10.5281/zenodo.3610833" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Multidisciplinary Research and Publications (IJMRAP)</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="1" to="9" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Design and analysis of a model for detection of information attacks in computer networks</title>
		<author>
			<persName><forename type="first">I</forename><surname>Dzhalladova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Škapa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Novotná</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Babynyuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Economic Computation and Economic Cybernetics Studies and Research</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="95" to="112" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Research of the Neural Network Module for Detecting Anomalies in Network Traffic</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Klots</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Titova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Petliak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Cheshun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Salem</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">3156</biblScope>
			<biblScope unit="page" from="378" to="389" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">A Survey on Botnets Attack Detection Utilizing Machine and Deep Learning Models</title>
		<author>
			<persName><forename type="first">D</forename><surname>Alomari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Anis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alabdullatif</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Aljamaan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering</title>
				<meeting>the 27th International Conference on Evaluation and Assessment in Software Engineering</meeting>
		<imprint>
			<date type="published" when="2023-06">June 2023</date>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="493" to="498" />
		</imprint>
	</monogr>
	<note>EASE &apos;</note>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Automated DDOS attack detection in software defined networking</title>
		<author>
			<persName><forename type="first">N</forename><surname>Ahuja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Singal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mukhopadhyay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Kumar</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.jnca.2021.103108</idno>
		<ptr target="https://doi.org/10.1016/j.jnca.2021.103108" />
	</analytic>
	<monogr>
		<title level="j">Journal of Network and Computer Applications</title>
		<imprint>
			<biblScope unit="volume">187</biblScope>
			<biblScope unit="page" from="103" to="108" />
			<date type="published" when="2021-08">August 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Analyzing the Performance of Various Corporate Networks using Multi-Protocol Label Switching Technology</title>
		<author>
			<persName><forename type="first">M</forename><surname>Soneja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">V</forename><surname>Ravi Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International journal of engineering research &amp; technology (IJERT)</title>
		<imprint>
			<biblScope unit="volume">09</biblScope>
			<biblScope unit="issue">06</biblScope>
			<biblScope unit="page" from="1338" to="1343" />
			<date type="published" when="2020-06">June 2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Recent trends in MPLS networks: technologies, applications and challenges</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Ridwan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Mohamed Radzi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">S H M</forename><surname>Wan Ahmad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Abdullah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">Z</forename><surname>Jamaludin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">N</forename><surname>Zakaria</surname></persName>
		</author>
		<idno type="DOI">10.1049/iet-com.2018.6129</idno>
		<ptr target="https://doi.org/10.1049/iet-com.2018.6129" />
	</analytic>
	<monogr>
		<title level="j">IET Commun</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="177" to="185" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Mathematical model of an information security violator / Cybersecurity: education</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">M</forename><surname>Shcheblanin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">I</forename><surname>Rabchun</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">science, technology</title>
		<imprint>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="63" to="72" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">O</forename><surname>Virchenko</surname></persName>
		</author>
		<title level="m">Basic properties of generalized gamma functions</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="20" to="26" />
		</imprint>
		<respStmt>
			<orgName>National Technical University of Ukraine &quot;KPI</orgName>
		</respStmt>
	</monogr>
	<note>Scientific News of NTUU &quot;KPI</note>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Providing the Resilience and Survivability of Specialize d Information Technology Across Corporate Computer Networks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Stetsyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Bedratyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Stetsyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">1st International Workshop on Intelligent Information Technologies &amp; Systems of Information Security</title>
				<meeting><address><addrLine>Khmelnytskyi, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020">June 10-12, 2020. 2020</date>
			<biblScope unit="volume">2623</biblScope>
			<biblScope unit="page" from="219" to="238" />
		</imprint>
	</monogr>
	<note>CEUR Workshop Proceedings</note>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Smart Approach for Botnet Detection Based on Network Traffic Analysis</title>
		<author>
			<persName><forename type="first">L</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Obeidat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Yaqbeh</surname></persName>
		</author>
		<idno type="DOI">10.1155/2022/3073932</idno>
		<ptr target="https://doi.org/10.1155/2022/3073932" />
	</analytic>
	<monogr>
		<title level="j">Journal of Electrical and Computer Engineering</title>
		<imprint>
			<biblScope unit="volume">2022</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Real-time botnet detection on large network bandwidths using machine learning</title>
		<author>
			<persName><forename type="first">J</forename><surname>Velasco-Mata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>González-Castro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Fidalgo</surname></persName>
		</author>
		<idno type="DOI">10.1038/s41598-023-31260-0</idno>
		<ptr target="https://doi.org/10.1038/s41598-023-31260-0" />
	</analytic>
	<monogr>
		<title level="j">Scientific Reports</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page">4282</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Botnet Detection Using Artificial Intelligence</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Skandha Moorthy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Nathiya</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.procs.2023.01.119</idno>
		<ptr target="https://doi.org/10.1016/j.procs.2023.01.119" />
	</analytic>
	<monogr>
		<title level="j">Procedia Computer Science</title>
		<imprint>
			<biblScope unit="volume">218</biblScope>
			<biblScope unit="page" from="1405" to="1413" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
