On the self-similar nature of Ethernet traffic (extended version)
IEEE/ACM Transactions on Networking (TON)
Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Self-Similar Network Traffic and Performance Evaluation
Self-Similar Network Traffic and Performance Evaluation
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Modeling and Quantification of Security Attributes of Software Systems
DSN '02 Proceedings of the 2002 International Conference on Dependable Systems and Networks
Security of Electronic Business Applications - Structure and Quantification
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
On the relationship between file sizes, transport protocols, and self-similar network traffic
ICNP '96 Proceedings of the 1996 International Conference on Network Protocols (ICNP '96)
Hi-index | 0.00 |
The paper puts forward a method to measure the security of network data transmission as well as determine attack category. Based on the self-similarity of network traffic and fuzzy decision making, the model is constructed to determine the attack category as follows: sample the network traffic with time intervals following Poisson distribution; Divide the obtained data series of traffic into several sub series of equal size, and compute the confidence interval of Hurst parameter for each sub series with Whittle Estimation method; Compare with the confidence intervals of Hurst parameter of known attack traffics, which have already been worked out with the same method, and thereby find out what the unknown attack is. On this basis, we propose an approach of security measurement of the network data transmission. According to the number of times that the routers on the transmission path are attacked, corresponding attack properties and the damage weight value of each attack which suggests the attack's destructivity, quantitative analysis of the security of network transmission can be accomplished. The results of the experiments show that this method not only helps make the policy of network data transmission accurately and efficiently, but also guarantees the security of the network data transmission.