Font Size: a A A

High Performance Network Simulation Technology Research For DDoS

Posted on:2017-02-20Degree:MasterType:Thesis
Country:ChinaCandidate:W Y XuFull Text:PDF
GTID:2308330488482486Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the popularity of the Internet technology,and DDoS(Distributed Denial- Of-Service) attacks are increasingly frequent.Network simulation as an important and common tool to research network behavior and evaluate the network communication protocol, which has been also used for the research of DDoS attacks. Due to network scale expands unceasingly, the computational overhead of the network simulation also increases increasingly,and this makes the performance of the network simulation degrade.In order to simulate the process of DDoS attacks efficiently,two simulation methods is proposed in this article.First,it put forward a kind of network simulation method based on trafficflow reduction.This method keeps the original topology without changing,and scales back the network input flow to reduce the computational overhead in the network simulation.For retaining the authenticity of the results before and after simulation,it optimizes and adjusts the network behavior parameters,and gives a router model.According to the router model,this paper analyses and demonstrates the authenticity of the simulation method in detail when the relevant network parameters are adjusted.For further validating the method,it designs two experiments to validate the key information such as throughput,instantaneous queue length and so on.Using the same topology,this paper simulates the DDoS attacks by this method.Analysing the simulation results of key information of network, it tests and validates the feasibility of this method in DDoS attacks simulationIn addition, the paper also presents another network simulation method based on topology simplification. The mothod reduces the cost of network simulation by cutting some terminal nodes of the network.Unlike the previous one, it guarantees the input rate of terminal node and core network topology unchanged.In the model of this method, it also adjusts some network parameters of the network simulation and gives the adjustment scheme. According to adjustment scheme and characteristics of the simulation model,it devises two experiments to verify the efficiency of the simulation which uses this method.And it shows the authenticity and reliability of this method which is used to simluate the LDo S and LDDoS attacks by experimental results.
Keywords/Search Tags:Traffic flow reduction, DDoS attacks, Network simulation, Authenticity of simulation
PDF Full Text Request
Related items