天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

基于拓撲抽象的網(wǎng)絡(luò)安全事件模擬系統(tǒng)的設(shè)計與實現(xiàn)

發(fā)布時間:2018-02-27 02:31

  本文關(guān)鍵詞: 網(wǎng)絡(luò)安全事件 網(wǎng)絡(luò)模擬 拓撲抽象 NS3 出處:《哈爾濱工業(yè)大學(xué)》2014年碩士論文 論文類型:學(xué)位論文


【摘要】:隨著計算機的易用性增強計算機如今已經(jīng)基本在全民中普及。而作為計算機通信媒介的互聯(lián)網(wǎng),更是以其便捷、快速的特點,在信息時代占據(jù)著不可替代的地位。然而,互聯(lián)網(wǎng)在給人們生活帶來便捷的同時,卻給人們帶來一些由網(wǎng)絡(luò)安全事件帶來的困擾。有關(guān)部門要防止和控制這些事件的發(fā)生,就需要研究這些網(wǎng)絡(luò)安全事件,,從而制定相關(guān)的控制方案。 在研究網(wǎng)絡(luò)安全事件時,由于這些事件都是具有危害性的,因此不適宜在真實網(wǎng)絡(luò)環(huán)境中進行實驗。而網(wǎng)絡(luò)模擬作為計算機模擬技術(shù)的一種,具有安全無破壞性、可控性等特點,非常適合作為研究網(wǎng)絡(luò)安全事件的方法。但是,現(xiàn)如今的網(wǎng)絡(luò)規(guī)模急速增長,網(wǎng)絡(luò)模擬工具已無法很好地完成模擬過程。因此,本文提出一種拓撲抽象方案,實現(xiàn)對網(wǎng)絡(luò)拓撲中主機節(jié)點和路由器節(jié)點的抽象,從而縮小網(wǎng)絡(luò)拓撲的規(guī)模,保證大規(guī)模網(wǎng)絡(luò)模擬的正常運行。 本文采用一種全新的模擬器NS3作為網(wǎng)絡(luò)模擬工具。首先分析NS3的網(wǎng)絡(luò)模擬原理及NS3的網(wǎng)絡(luò)模擬過程。在此基礎(chǔ)上,提出對網(wǎng)絡(luò)拓撲的抽象方案,采用樹形抽象和基于鏈路特征的抽象算法實現(xiàn)對網(wǎng)絡(luò)拓撲的抽象。并設(shè)計基于計算的數(shù)據(jù)包收發(fā)模型,實現(xiàn)模擬時抽象節(jié)點與非抽象節(jié)點之間的抽象路由。最后根據(jù)網(wǎng)絡(luò)安全事件的原理,設(shè)計實現(xiàn)在NS3模擬器上對三種安全事件的模擬,同時完成一個基于拓撲抽象的網(wǎng)絡(luò)安全事件模擬系統(tǒng)并對該系統(tǒng)的前臺功能和數(shù)據(jù)庫進行了分別測試,最后對安全事件模擬結(jié)果進行了結(jié)果分析。 綜上所述,本文主要利用NS3網(wǎng)絡(luò)模擬器和拓撲抽象技術(shù),完成一個基于拓撲抽象的網(wǎng)絡(luò)安全事件模擬系統(tǒng)。通過系統(tǒng)測試表明,該系統(tǒng)能夠正常完成系統(tǒng)設(shè)計中的設(shè)計目標,從實驗結(jié)果來看,拓撲抽象也能夠很好的保持安全事件本身的真實性,可作為研究者研究網(wǎng)絡(luò)安全事件的工具。
[Abstract]:With the ease of use of computers, computers have been basically popularized among all the people. However, the Internet, as a computer communication medium, is playing an irreplaceable role in the information age because of its convenient and rapid characteristics. The Internet not only brings convenience to people's life, but also brings some troubles caused by network security events. To prevent and control these incidents, relevant departments need to study these network security events. Thus, the related control program is formulated. In the study of network security events, because these events are harmful, they are not suitable for experiments in the real network environment. As a kind of computer simulation technology, network simulation is safe and non-destructive. Controllability is very suitable for studying network security events. However, with the rapid growth of network scale nowadays, network simulation tools can not complete the simulation process well. Therefore, a topology abstraction scheme is proposed in this paper. Abstract the host node and router node in network topology so as to reduce the scale of network topology and ensure the normal operation of large-scale network simulation. In this paper, a new simulator, NS3, is used as a network simulation tool. Firstly, the principle of network simulation of NS3 and the process of network simulation of NS3 are analyzed. On this basis, the abstract scheme of network topology is proposed. The network topology is abstracted by tree abstraction and link feature based abstraction algorithm, and a computational packet transceiver model is designed. Finally, according to the principle of network security events, we design and implement the simulation of three kinds of security events in NS3 simulator. At the same time, a network security event simulation system based on topology abstraction is completed, and the foreground function and database of the system are tested separately. Finally, the simulation results of security events are analyzed. To sum up, this paper mainly uses NS3 network simulator and topology abstraction technology to complete a network security event simulation system based on topology abstraction. From the experimental results, topology abstraction can also maintain the authenticity of the security event itself, which can be used as a tool for researchers to study network security events.
【學(xué)位授予單位】:哈爾濱工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP393.08

【參考文獻】

相關(guān)期刊論文 前10條

1 劉彪;;NS-2模擬器及其教育應(yīng)用[J];電腦知識與技術(shù)(學(xué)術(shù)交流);2007年10期

2 劉愛波;陸月明;紀越峰;;基于非對稱有向網(wǎng)絡(luò)的拓撲抽象算法研究[J];電子學(xué)報;2006年01期

3 張宏超;;淺析網(wǎng)絡(luò)安全[J];硅谷;2009年02期

4 劉愛波,陸月明,紀越峰;智能光網(wǎng)絡(luò)路由及其關(guān)鍵技術(shù)分析[J];光通信技術(shù);2004年08期

5 高鵬;;新媒體領(lǐng)域中非關(guān)系型數(shù)據(jù)庫的選擇[J];廣播與電視技術(shù);2013年05期

6 丁振全;董開坤;;基于聚合系數(shù)的拓撲抽象算法[J];計算機工程;2012年06期

7 查東輝;;網(wǎng)絡(luò)蠕蟲傳播模型的分析與仿真研究[J];計算機仿真;2012年02期

8 張賢軍;李鶴;;計算機網(wǎng)絡(luò)仿真技術(shù)及仿真工具[J];艦船電子工程;2013年01期

9 邊瑞卿;;DDoS攻擊原理及防范[J];科技信息;2013年08期

10 雷擎,王行剛;計算機網(wǎng)絡(luò)模擬方法與工具[J];通信學(xué)報;2001年09期

相關(guān)博士學(xué)位論文 前1條

1 周翰遜;網(wǎng)絡(luò)蠕蟲傳播模型及檢測技術(shù)研究[D];東北大學(xué);2009年



本文編號:1540761

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1540761.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶c9061***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com