Abstract:
DDoS attacks are a widespread method of making network information systems out of service. Furthermore, the malefactors combine multiple types of attacks in order to increase the intrusion efficiency. This paper considers the network traffic parameters enabling system state monitoring and invasion tracking. There are defined thresholds and conditions that allow linking the parameters’ behavior to the type of attacks the system is exposed to.