The denial-of-service (DoS) and distributed denial-of-service (DDoS) are two of the most raging attacks against computers networks, specially the Internet. The first action all the countermeasures to this kind of attack use to propose is the data collection from the packets, to acquire lots of clues from attack space. Then use these data to reconstruct the attack paths and determine the origins of the attack. Among these suggested countermeasures there exist those using the probability packet marking (PPM) approach, as a manner of data acquisition. On the other hand, the attack paths reconstruction may be made by means of several distinct methods. This article presents the use of some aspects of the theory of complex analysis in modelling the tracing and identifying computers network denial-of-service attackers.
[1]
S. Lang.
Complex Analysis
,
1977
.
[2]
William Feller,et al.
An Introduction to Probability Theory and Its Applications
,
1967
.
[3]
Robert H. Zakon,et al.
Hobbes' Internet Timeline
,
1997,
RFC.
[4]
Anna R. Karlin,et al.
Network support for IP traceback
,
2001,
TNET.
[5]
E. Kreyszig,et al.
Advanced Engineering Mathematics.
,
1974
.
[6]
Robert Morris.
A Weakness in the 4.2BSD Unix† TCP/IP Software
,
1999
.
[7]
F. W. Kellaway,et al.
Advanced Engineering Mathematics
,
1969,
The Mathematical Gazette.