The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end ...The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end filtering and source-end filtering. The first scheme prevents attack traffic from reaching the victim, but causes the huge loss of legitimate flows due to the scarce filters (termed as collateral damages); the other extreme scheme can obtain the sufficient filters, but severely degrades the network transmission performance due to the abused filtering routers. In this paper, we propose a router based packet filtering scheme, which provides relatively more filters while reducing the quantity of filtering touters. We implement this scheme on the emulated DoS scenarios based on the synthetic and real-world Internet topologies. Our evaluation results show that compared to the previous work, our scheme just uses 20% of its filtering routers, but only increasing less than 15 percent of its collateral damage.展开更多
The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. G...The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation ideally made in a single development environment should cover different areas and all components of the system. In this paper, the authors briefly describe the behavioral models of the elements of a large scale WSN (wireless sensors network) used to create simulator, focusing specifically on the model of the transmission channel, and how it can retrieve results from the behavioral simulator. In side to legacy network simulator, for the testing and modeling of communication protocols, this simulator should not omit WSN specific aspect, in accuracy it covers the modeling of node platforms, protocols, and real world phenomena.展开更多
基金supported in part by the funding agencies of china:the Doctoral Fund of Northeastern University of Qinhuangdao(Grant No.XNB201410)the Fundamental Research Funds for the Central Universities(Grant No.N130323005)
文摘The filter-based reactive packet filtering is a key technology in attack traffic filtering for defending against the Denial-of- Service (DOS) attacks. Two kinds of relevant schemes have been proposed as victim- end filtering and source-end filtering. The first scheme prevents attack traffic from reaching the victim, but causes the huge loss of legitimate flows due to the scarce filters (termed as collateral damages); the other extreme scheme can obtain the sufficient filters, but severely degrades the network transmission performance due to the abused filtering routers. In this paper, we propose a router based packet filtering scheme, which provides relatively more filters while reducing the quantity of filtering touters. We implement this scheme on the emulated DoS scenarios based on the synthetic and real-world Internet topologies. Our evaluation results show that compared to the previous work, our scheme just uses 20% of its filtering routers, but only increasing less than 15 percent of its collateral damage.
文摘The design, manufacture and deployment of embedded systems become increasingly complex and multidisciplinary process. Before the steps of manufacturing and deployment, a simulation and validation phase is necessary. Given the increasing complexity of systems such as telecommunications systems, control systems and others, a specific simulation and validation process must take place. This simulation ideally made in a single development environment should cover different areas and all components of the system. In this paper, the authors briefly describe the behavioral models of the elements of a large scale WSN (wireless sensors network) used to create simulator, focusing specifically on the model of the transmission channel, and how it can retrieve results from the behavioral simulator. In side to legacy network simulator, for the testing and modeling of communication protocols, this simulator should not omit WSN specific aspect, in accuracy it covers the modeling of node platforms, protocols, and real world phenomena.