{"title":"拒绝服务攻击下计算机网络的流体控制模型","authors":"I. O. Petrovich","doi":"10.1109/ICAICT.2011.6110970","DOIUrl":null,"url":null,"abstract":"In this paper we consider fluid controlled models of networks. We proposed an new approach to analyzing network work using fluid models and conflict control theory domain. We obtain analytic solution for certain class of networks and proved time optimality. In the network game we found Nash equilibrium. We consider special case of network activity - denial of service attack and found dependency on download time depending of attack direction and traffic volume. The theoretical results were tested in an simulation environment OMNET + +.","PeriodicalId":376977,"journal":{"name":"2011 5th International Conference on Application of Information and Communication Technologies (AICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Fluid controlled models of computer networks under denial of service attacks\",\"authors\":\"I. O. Petrovich\",\"doi\":\"10.1109/ICAICT.2011.6110970\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we consider fluid controlled models of networks. We proposed an new approach to analyzing network work using fluid models and conflict control theory domain. We obtain analytic solution for certain class of networks and proved time optimality. In the network game we found Nash equilibrium. We consider special case of network activity - denial of service attack and found dependency on download time depending of attack direction and traffic volume. The theoretical results were tested in an simulation environment OMNET + +.\",\"PeriodicalId\":376977,\"journal\":{\"name\":\"2011 5th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 5th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2011.6110970\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 5th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2011.6110970","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fluid controlled models of computer networks under denial of service attacks
In this paper we consider fluid controlled models of networks. We proposed an new approach to analyzing network work using fluid models and conflict control theory domain. We obtain analytic solution for certain class of networks and proved time optimality. In the network game we found Nash equilibrium. We consider special case of network activity - denial of service attack and found dependency on download time depending of attack direction and traffic volume. The theoretical results were tested in an simulation environment OMNET + +.