期刊文献+

区分服务模型下多目标最优化安全路由算法

Multi-object optimal secure routing algorithm based on differentiated service model
下载PDF
导出
摘要 将安全度量作为一种QoS参数进行路由选择是目前网络安全路由研究的一个新思路,针对现有方法采用一个安全度量参数描述链路安全性,进行路由选择存在的问题,提出一种多安全度量的链路安全性描述策略,能够更加全面准确地描述网络链路的安全特征;该描述策略应用于区分服务模型下的安全路由选择,并提出了基于改进的非支配遗传算法的多目标最优化安全路由算法求解这一多目标多约束的NP完全问题。随机网络的仿真结果表明,算法能为用户提供安全性能较高的路由,并能满足不同等级要求的服务质量。 Bringing security metric as a QoS parameter is a new strategy in QoS routing:Aiming at the problems that the way of characterizing the link safety using only one security metric in QoS routing,a strategy that using multi-security metric as routing parameter is proposed.This will characterize the link safety much more exact.The authors will use the strategy mentioned before for secure routing based on differentiated service.An algorithm named MOSRA (Multi-Object Optimal Secure Routing Algorithm) based on nondominated sorting genetic algorithm under Differentiated Service Model is proposed to solve the NP complete.The simulation results show that the algorithm can provide better security performance and satisfy different serve requirements.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第19期104-108,共5页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60572092)
关键词 区分服务 多目标最优化 安全路由 遗传算法 differentiated service multi-object optimal secure routing genetic algorithm- Ⅱ (NSGA- Ⅱ )
  • 相关文献

参考文献14

  • 1Duflos S, Gay V, Kervella B, et al.Integration of security parameters in the service level specification to improve QoS management of secure distributed multimedia serviees[C]//Proceedings of the 19th International Conference on Advanced Information Networking and Applications, 2005,2 : 145-148.
  • 2Sakarindr P,Ansari N,Rojas-Cessa R,et al.Security-enhanced quality of service (SQoS): a network analysis [C]//Military Communications Conference, 2005,4 : 2165-2171.
  • 3Lindskog S,Jonsson E.Adding security to quality of service architectures[C]//Proceedings of the SSGRR Conference, 2002.
  • 4Naqvi S,Riguidel M.Quantifiable security metrics for large scale heterogeneous systems[C]//Proc of 4Oth IEEE International, 2006 : 209-215.
  • 5Pamula J, Ammann P.A weakest-adversary security metric for network configuration security analysis[C]//Proceedings of the 2nd ACM Workshop on Quality of Protection,Alexandria,Virginia,USA,2006,31-38.
  • 6Alkahtmi,Woodward M E.The analytic hierarchy process applied to best effort QoS routing with multiple metrics:a comparative evaluation[C]//5th European,Personal Mobile Communications Conference, 2003 : 539-544.
  • 7Almerhag I A,Woodward M E.Security as a quality of service routing problem[C]//Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology,, 2005:222-223.
  • 8Kalyamnoy D.A fast and elitist multiobjective genetic algorithm: NSGA-Ⅱ [J].IEEE Trans on Computation,2002,6(2): 182-197.
  • 9Baltatu M,Lioy A,Maino F.Security issues in control,management[C]//TERENA Networking Colfference,2000:22-25.
  • 10Goncalves M.Firewalls complete [EB/OL]. ( 2002-10-16 ). http :// www.secinf.net/firewalls_and_VPN/Firewalls_Complete.

二级参考文献27

  • 1Magoni D, Pansiot JJ. Evaluation of Internet topology generators by power law and distance indicators. In: Proc. of the IEEE ICON 2002. Singapore: IEEE, 2002. 401-406.
  • 2Floyd S, Paxson V. Difficulties in simulating the Internet. IEEE/ACM Trans. on Networking, 2001,9(4):392-403.
  • 3Zheng H. Internet worm research [Ph.D. Thesis]. Tianjin: Nankai University, 2003 (in Chinese with English abstract).
  • 4Chalmers RC, Almeroth KC. On the topology of multicast trees. IEEE/ACM Trans. on Networking, 2003,11(1):153-165.
  • 5NMS Home Page. http://www.darpa.mil/ipto/programs/nms/index.htm
  • 6Waxman BM. Routing of multipoint connections. IEEE Journal on Selected Areas in Communications, 1988,6(9):1617-1622.
  • 7Doar MB. A better model for generating test networks. In: Proc. of the GLOBECOM'96. London: IEEE, 1996. 86-93.
  • 8Zegura EW, Calvert KL, Donahoo MJ. A quantitative comparison of graph-based models for Internet topology. IEEE/ACM Trans. on Networking, 1997,5(6):770-783.
  • 9Faloutsos M, Faloutsos P, Faloutsos C. On power-law relationships of the Internet topology. ACM SIGCOMM Computer Communication Review, 1999,29(4):251-262.
  • 10Palmer CR, Steffan JG. Generating network topologies that obey power laws. In: Proc. of the GLOBECOM 2000, Vol 1. San Francisco: IEEE, 2000. 434 -438.

共引文献63

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部