Font Size: a A A

Research On The Assessment Method Of Security Threat And Network Performance Simulation Based On Queue Model

Posted on:2016-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:L S ZhaoFull Text:PDF
GTID:2348330488973938Subject:Engineering
Abstract/Summary:PDF Full Text Request
The effect evaluation on the computer network security threat is an important part of the information system security assessment, also is a challenging task. Based on OPNET + VS2010 platform, combined with practical work, the multi-service of input-output communications network system is established. The simulation of multi-service network and the issues of performance evaluation are also researched. The main idea of this paper is firstly establishing a network security threat model, then using OPNET simulation tool to establish the communication network model, finally collecting simulation data and evaluating the effect of network security threats, the main work is as follows:(1) After analyzing and summarizing the principles of network security threats, we proposes three typical model that is proactive security threats, internal security threats, and passive security threats. For active safety threat, malicious nodes in the network can intercept the data stream between the various types of users, and have chosen to delete or modify or copy data maliciously. Among them, the active safety threat has three methods that is deleting the data, tampering data and replicating data. When the network node, which pretends a legitimate security threat without being detected by the fall or threat through deceiving system, thereby become internal security threats. Passive safety threat does not interfere any network services or affect the normal operation of the network, it can intercept the data stream from network link, randomly or optionally forwarding data.(2) Studies on assessment techniques of network security threats are more concentrated in the following three aspects: the first research on the effect of certain types of security threats. The second is the effect of network security threats based on application-specific background. The third is using mathematical theory to improve the evaluation methods. Based on the recent widespread used and the latest evaluation methods, the article presents a comparative evaluation method. As the name suggests, the program will use a variety of assessment methods to assess safety threat and comprise the results. Based on the considerations of applicability and engineering, the paper choose AHP, fuzzy comprehensive evaluation method, gray clustering comprehensive evaluation method for the impact assessment of network security threat.(3) Establishing a communication network model based on queuing model, OPNET simulation tool is used for multi-service communications network simulation. The presence of network security threats and no security threat were to do the test case. Finally, some typical network security threats are assessed and the sorted effects is also obtained. The comparative evaluation methods obtain consistent result. This shows that the method of comparative evaluation is reasonable and effective, more accurate result.
Keywords/Search Tags:network security threats, OPNET simulation technology, effect assessment, queue theory
PDF Full Text Request
Related items