Font Size: a A A

Research And Implementation Of Attack Traffic Generation Technology

Posted on:2018-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:C FuFull Text:PDF
GTID:2348330518494699Subject:Information security
Abstract/Summary:PDF Full Text Request
Attack traffic generation has great significance on the research of network security and the assessment of network equipment. In terms of current research in the field of attack traffic generation, traffic generation methods are limited to two kinds, which are single code construction and building model construction, separately. However, single code construction has several defects, for example, single attack traffic and low traffic speed. It is not mature to construct the attack traffic technology by modelling and it is unable to find an effective mathematical model for modeling different attack traffics.The attack traffic generation system introduced in this paper relies on the original samples of attack traffic. It can generate complex attack traffic as long as the attack traffic samples are abundant. Furthermore, in the field of traffic generation, the system can play an important role. With the development of network equipment performance, the test traffic increases correspondingly. At present, there are two types of traffic generation system, they are the traffic generation system based on hardware which is expensive, and the system based on the software which cannot meet the current demand in the maximum rate. The network traffic generated by our system can achieve a limit rate of gigabit network card,and can control high precision velocity according to the demand, in order to achieve personalized test requirements.This paper proposes a high-speed flow generation system, which can be used to attack traffic generation process.Attack traffic generation system realizes the attack traffic generation process by capturing flow sample files, and it adopts the collaboration of copying and sending to realize the traffic sending model of multi-thread concurrence. And it controls the accuracy of traffic sending by using the time control system and traffic control algorithm of high accuracy. In the whole generation process, we analyze the data structure of traffic and design the data flow and process flow of the traffic in the memory. Finally, experiments simulate to compare our system and the mature traffic generation system and demonstrate the superiority of our system from the result data level.
Keywords/Search Tags:Computer Networks, Attack Flow Samples, Network Traffic Generation, Flow Control
PDF Full Text Request
Related items