Simulation method oriented to LDoS (Low-rate Denial of Service) and LDDoS (Low-rate Distributed Denial of Service)

A simulation method and network simulation technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of high computational overhead, low simulation running time, and reduce LDoS and LDDoS simulation, and achieve the effect of reducing computational overhead.

Active Publication Date: 2014-11-19
JIANGNAN UNIV
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose a simulation method for LDoS and LDDoS, which can guarantee the authenticity of LDoS and LDDoS simulation for the existing LDoS / LDDoS simulation method based on traditional discrete event simulation technology. Under the premise, the calculation overhead of LDoS and LDDoS simulation is greatly reduced, and the simulation running time is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Simulation method oriented to LDoS (Low-rate Denial of Service) and LDDoS (Low-rate Distributed Denial of Service)
  • Simulation method oriented to LDoS (Low-rate Denial of Service) and LDDoS (Low-rate Distributed Denial of Service)
  • Simulation method oriented to LDoS (Low-rate Denial of Service) and LDDoS (Low-rate Distributed Denial of Service)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Embodiment 1 LDoS attack

[0056] In this instance, based on image 3 , setting K=1 indicates that there is only one attack source, which is an LDoS attack; L=10 indicates that there are 10 normal TCP flows. By comparing the simulation results of the TCP arrival traffic rate obtained by this method with the results obtained by the traditional method (traditional discrete event simulation technology), the simulation authenticity of this method is verified, such as Figure 4 shown. In this embodiment, the simulation time is 1000 seconds, and the attack time period is between 200-800 seconds. It can be found that the simulation results obtained by this method are basically consistent with those obtained by the traditional method, indicating that this method can guarantee the authenticity of the LDoS simulation results. Table 1 compares the average TCP arrival traffic rate of the two methods under the condition of LDoS attack and without LDoS attack. It can be seen that ...

Embodiment 2

[0062] Embodiment 2 LDDoS attack

[0063] In this instance, based on image 3 , set K=5, indicating that there are multiple attack sources, which is an LDDoS attack; L=10, indicating that there are 10 normal TCP flows. By comparing the simulation results of the TCP arrival traffic rate obtained by this method with the results obtained by the traditional method (traditional discrete event simulation technology), the simulation authenticity of this method is verified, such as Figure 5 shown. In this embodiment, the simulation time is 1000 seconds, and the attack time period is between 200-800 seconds. It can be found that the simulation results obtained by this method are basically consistent with those obtained by the traditional method, indicating that this method can guarantee the authenticity of the LDDoS simulation results. Table 3 compares the average TCP arrival traffic rate of the two methods under the condition of LDDoS attack and without LDDoS attack. It can be see...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a simulation method oriented to LDoS (Low-rate Denial of Service) and LDDoS (Low-rate Distributed Denial of Service), and mainly aims to solve the problem of high simulation computation overhead in the current research of LDoS and LDDoS based on a discrete event network simulation technology. The method comprises the following implementation steps: (1) reading a network simulation topology; (2) reading UDP (User Datagram Protocol) attack flows; (3) reading normal TCP (Transmission Control Protocol) flows; (4) constructing a network simulation topology scene based on a simplified queue and a link model; (5) reducing the pulse amplitude of the UDP attack flows to 1/P, and configuring an attack flow simulation application; (6) reducing the quantity of the TCP flows to 1/P, and configuring a TCP flow simulation application; (7) running a simulation scene based on a discrete event network simulation technology, and recording the simulation result of the LDoS/LDDoS; and (8) amplifying the recorded simulation result of the LDoS/LDDoS by P times to form a final simulation output result. By adopting the simulation method, the simulation computation overhead can be reduced greatly on the premise of ensuring the LDoS/LDDoS simulation authenticity, and simulation deduction of a large-scale LDoS/LDDoS attack-attack-defense strategy can be supported.

Description

technical field [0001] The invention relates to a simulation method for LDoS (low-rate denial-of-service attack) and LDDoS (low-rate distributed denial-of-service attack), which can be used to efficiently deduce the effect of LDoS and LDDoS attack and defense strategies based on network simulation technology. Background technique [0002] Today, all kinds of malicious attacks have caused huge hidden dangers to the Internet, seriously affecting business operations, network information transmission and normal use of users. Denial of service attack (DoS) and distributed denial of service attack (DDoS) are recognized as one of the biggest threats to the Internet. DoS and DDoS mainly use various means to consume network bandwidth and system resources, paralyzing the normal services of the normal system, unable to serve normal users, and thus denying normal users access to services. In recent years, DoS / DDoS has emerged a more harmful attack method, that is, low-rate denial-of-se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/861
Inventor 王晓锋徐文远刘渊刘凯宇
Owner JIANGNAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products