【24h】

Modeling and Simulations of TCP MANET Worms

机译:TCP MANET蠕虫的建模和仿真

获取原文
获取原文并翻译 | 示例
           

摘要

Mobile Ad-hoc Networks (MANETs) are used for emergency situations like disaster-relief, military applications, and emergency medical situations. These applications make MANETs attractive targets for cyber-attacks and make the development of counter-measures paramount. The study of worm behavior is critical to the design of effective counter measures in MANET environments. This paper studies the behavior of TCP based worms in MANETs. We develop analytical models for the spread of TCP worms in the MANET environment that account for payload-size, bandwidth-sharing, radio range, nodal density, packet discards and several other parameters specific to MANETs. We present numerical solutions for the models and verify the results using high fidelity packet-level simulations.The results show that the analytical model developed here matches the results of the packet-level simulation in all cases except when topologies result in a high probability of disconnected clusters. Our simulation studies show that under many cases, due to the resource constrained nature of the MANET and its underlying wireless layers, the TCP-based worms rapidly become self-throttling. This may benefit the design of effective mitigation technologies in these critical networking environments.
机译:移动自组织网络(MANET)用于紧急情况,如救灾,军事应用和紧急医疗情况。这些应用使MANET成为网络攻击的有吸引力的目标,并使对策的开发至关重要。对蠕虫行为的研究对于在MANET环境中设计有效的对策至关重要。本文研究了MANET中基于TCP的蠕虫的行为。我们针对MANET环境中TCP蠕虫的传播开发了分析模型,这些模型考虑了有效载荷大小,带宽共享,无线电范围,节点密度,数据包丢弃以及MANET特定的其他几个参数。我们提供了模型的数值解并使用高保真数据包级仿真验证了结果。结果表明,在所有情况下,这里开发的分析模型都与数据包级仿真的结果匹配,除非拓扑结构导致断开的可能性很高集群。我们的仿真研究表明,在许多情况下,由于MANET及其底层无线层的资源受限制的性质,基于TCP的蠕虫迅速变得自节流。这可能有益于在这些关键的网络环境中设计有效的缓解技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号