{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:38:59Z","timestamp":1760236739038,"version":"build-2065373602"},"reference-count":30,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T00:00:00Z","timestamp":1639699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>A Distributed Denial of Service (DDoS) attack is a type of cybercrime that renders a target service unavailable by overwhelming it with traffic from several sources (attack nodes). In this paper, we focus on DDoS attacks on a computer network by spreading bots throughout the network. A mathematical differential equation model is proposed to represent the dynamism of nodes at different compartments of the model. The model considers two levels of security, with the assumption that the recovered nodes do not return to the same security level. In previous models, the recovered nodes are returned to be suspect on the same security level, which is an unrealistic assumption. Moreover, it is assumed that the attacker can use the infected target nodes to attack again. With such epidemic-like assumptions of infection, different cases are presented and discussed, and the stability of the model is analyzed as well; reversing the symmetry transformation of attacking nodes population is also proven. The proposed model has many parameters in order to precisely describe the infection movement and propagation. Numerical simulation methods are used to solve the developed system of equations using MATLAB, with the intention of finding the best counteraction to control DDoS spread throughout a network.<\/jats:p>","DOI":"10.3390\/sym13122443","type":"journal-article","created":{"date-parts":[[2021,12,20]],"date-time":"2021-12-20T02:40:32Z","timestamp":1639968032000},"page":"2443","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Novel Model for Distributed Denial of Service Attack Analysis and Interactivity"],"prefix":"10.3390","volume":"13","author":[{"given":"Ashraf","family":"Ahmad","sequence":"first","affiliation":[{"name":"King Hussein School of Computing Sciences, Princess Sumaya University for Technology, Amman 11941, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6509-2749","authenticated-orcid":false,"given":"Yousef","family":"AbuHour","sequence":"additional","affiliation":[{"name":"Jordan Design Development Bureau (JODDB), National Encryption Center, Amman 11180, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7909-537X","authenticated-orcid":false,"given":"Firas","family":"Alghanim","sequence":"additional","affiliation":[{"name":"King Hussein School of Computing Sciences, Princess Sumaya University for Technology, Amman 11941, Jordan"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,17]]},"reference":[{"key":"ref_1","unstructured":"Gligor, V.D. (1983, January 25\u201327). A Note on the Denial-of-Service Problem. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA."},{"key":"ref_2","unstructured":"Moore, D. (2021, November 05). The Spread of the Code-Red Worm (CRv2). Available online: http:\/\/www.caida.org\/publications\/papers\/2002\/codered\/codered.pdf."},{"key":"ref_3","unstructured":"Calem, R.E. (2021, November 05). New York\u2019s Panix Service Is Crippled by Hacker Attack. Available online: https:\/\/archive.nytimes.com\/www.nytimes.com\/library\/cyber\/week\/0914panix.html."},{"key":"ref_4","unstructured":"Alexander, K., and Oleg Kupreev, E.B. (2021, November 05). DDoS Attacks in Q1 2018. Available online: https:\/\/securelist.com\/ddos-report-in-q1-2018\/85373\/."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1216370.1216373","article-title":"Survey of network-based defense mechanisms countering the DoS and DDoS problems","volume":"39","author":"Peng","year":"2007","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_6","unstructured":"Calce, M., and Silverman, C. (2008). Mafiaboy: How I Cracked the Internet and Why It\u2019s Still Broken, Penguin Group Canada."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MC.2000.839316","article-title":"Denial-of-service attacks rip the Internet","volume":"33","author":"Garber","year":"2000","journal-title":"IEEE Comput. Soc."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1093\/comjnl\/bxp078","article-title":"Protection against denial of service attacks: A survey","volume":"53","author":"Loukas","year":"2009","journal-title":"Comput. J."},{"key":"ref_9","unstructured":"Hilton, S. (2021, November 05). Dyn Analysis Summary of Friday October 21 Attack. Available online: https:\/\/dyn.com\/blog\/dyn-analysis-summary-of-friday-october-21-attack\/."},{"key":"ref_10","unstructured":"Weagle, S. (2021, November 05). Financial Impact of Mirai DDoS Attack on Dyn Revealed in New Data. Available online: https:\/\/www.corero.com\/blog\/financial-impact-of-mirai-ddos-attack-on-dyn-revealed-in-new-data\/."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Awrejcewicz, J., Losyeva, N., and Puzyrov, V. (2020). Stability and Boundedness of the Solutions of Multi-Parameter Dynamical Systems with Circulatory Forces. Symmetry, 12.","DOI":"10.3390\/sym12081210"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"De la Sen, M., Ibeas, A., and Agarwal, R.P. (2020). On Confinement and Quarantine Concerns on an SEIAR Epidemic Model with Simulated Parameterizations for the COVID-19 Pandemic. Symmetry, 12.","DOI":"10.3390\/sym12101646"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0167-2789(97)00199-1","article-title":"Time-reversal symmetry in dynamical systems: A survey","volume":"112","author":"Lamb","year":"1998","journal-title":"Phys. D Nonlinear Phenom."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Lamb, J.S., and Brands, H. (1994). Symmetries and reversing symmetries in kicked systems. Dynamics, Bifurcation and Symmetry, Springer.","DOI":"10.1007\/978-94-011-0956-7_16"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1007\/s00034-018-0943-0","article-title":"On the stability analysis of systems of neutral delay differential equations","volume":"38","author":"Liu","year":"2019","journal-title":"Circuits Syst. Signal Process."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kirillov, O.N. (2019). Classical results and modern approaches to nonconservative stability. Dynamic Stability and Bifurcation in Nonconservative Mechanics, Springer.","DOI":"10.1007\/978-3-319-93722-9_4"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Ten, C.W., Manimaran, G., and Liu, C.C. (2010). Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Press.","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"ref_18","unstructured":"Cybersecurity and Infrastructure Security Agency (2021, June 16). Understanding Denial-of-Service Attacks, Available online: https:\/\/www.us-cert.gov\/ncas\/tips\/ST04-015."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","article-title":"A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks","volume":"15","author":"Zargar","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_20","unstructured":"Farraposo, S., Gallon, L., and Owezarski, P. (2021, November 05). Network Security and DoS Attacks. Technical Report. LAAS-CNRS. Available online: https:\/\/www.miralishahidi.ir\/resources\/Security_and_DoS.pdf."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1007\/s11071-013-0889-5","article-title":"The spread of computer virus under the effect of external computers","volume":"73","author":"Gan","year":"2013","journal-title":"Nonlinear Dyn."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3149","DOI":"10.1016\/j.cnsns.2014.01.028","article-title":"A mathematical model for a distributed attack on targeted resources in a computer network","volume":"19","author":"Haldar","year":"2014","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Mishra, B.K., and Haldar, K. (2014). e-Epidemic Models on the Attack and Defense of Malicious Objects in Networks. Theories and Simulations of Complex Social Systems, Springer.","DOI":"10.1007\/978-3-642-39149-1_9"},{"key":"ref_24","first-page":"33","article-title":"Contributions to the mathematical theory of epidemics\u2014I","volume":"53","author":"Kermack","year":"1991","journal-title":"Bull. Math. Biol."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"123240","DOI":"10.1016\/j.physa.2019.123240","article-title":"Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: A differential e-epidemic model","volume":"540","author":"Rao","year":"2020","journal-title":"Phys. A Stat. Mech. Its Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1515\/nleng-2017-0094","article-title":"Mathematical model on distributed denial of service attack through Internet of things in a network","volume":"8","author":"Mishra","year":"2019","journal-title":"Nonlinear Eng."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"6694383","DOI":"10.1155\/2021\/6694383","article-title":"Impact of Defending Strategy Decision on DDoS Attack","volume":"2021","author":"Zhang","year":"2021","journal-title":"Complexity"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/S0025-5564(02)00108-6","article-title":"Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission","volume":"180","author":"Watmough","year":"2002","journal-title":"Math. Biosci."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Anderson, R. (1982). Transmission dynamics and control of infectious disease agents. Popul. Biol. Infect. Dis., 149\u2013176.","DOI":"10.1007\/978-3-642-68635-1_9"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1063\/1.3057800","article-title":"Stability by Liapunov\u2019s Direct Method with Applications by Joseph L Salle and Solomon Lefschetz","volume":"15","author":"Lefschetz","year":"1962","journal-title":"Phys. Today"}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/12\/2443\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:51:05Z","timestamp":1760169065000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/13\/12\/2443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,17]]},"references-count":30,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["sym13122443"],"URL":"https:\/\/doi.org\/10.3390\/sym13122443","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2021,12,17]]}}}