Ignatenko Oleksii Institute of Software System NAS...

Preview:

Citation preview

Ignatenko Oleksii Institute of Software System NAS UkraineInstitute of Software System NAS Ukraine

Today network model are related to veryToday network model are related to very different areas◦ Information networks◦ Information networks◦ Telecommunications◦ Energy systemsgy y◦ Distributed production processesModeling for the purposes of control and the g p pdevelopment of control techniques for truly complex networks has become a major research activity over the past two decades.

2PMCCS 2009, Eger 18.09.2009

3PMCCS 2009, Eger 18.09.2009

SpamDenial of service attacksDenial of service attacksUnauthorized intrusionS li f i f iStealing of informationFishingViruses and worms

4PMCCS 2009, Eger 18.09.2009

5PMCCS 2009, Eger 18.09.2009

)(t)(1 tu

)(1 tw

)(tw )(2 tu)(2 tw )(2 tu

)(3 tw

)(3 tu)(tp

)(3 tw

6PMCCS 2009, Eger 18.09.2009

)(1 tq - queuing time

)( k t i l t)(tα - packets arrival rate

)(tu routing policy)(1 tu - routing policy

)()( 11 tutq +α=& )()( 11q

7PMCCS 2009, Eger 18.09.2009

We consider two constraint types for modelWe consider two constraint types for model

Geometric constraintsGeometric constraints

max)(0 α≤α≤ tmax11 )(0 qtq ≤≤

Integral constraint

max11 )( qq

int0

)( α≤α∫∞

tdtt

0∫t

8PMCCS 2009, Eger 18.09.2009

)(2 tq - attack power

)()()()( 211 tqktuttq ⋅+−α=&

)()(2 tvtq =&

9PMCCS 2009, Eger 18.09.2009

)()( tkt +&

)(tαServer

Buffers

)()()()(

1

21

tuttqktq

−α+⋅=)(1 tu)(1 tq

k )()( 1 tutα

)()()( 22 tutvtq −=&)(tv )(2 tu)(2 tq )()()( 22q

)()( μ≤+ )()( 21 tutu

10PMCCS 2009, Eger 18.09.2009

2))0((qkv>μ

max1int

21

))0((2

)0( qqkq ≤α+ν−μ

+

18.09.2009PMCCS 2009, Eger 11

60

80

100

значення

Stochastic model

50 100 150 200 250крок

20

40Real Network

)()())(()()1( tVtAtZBtQtQ +++=+

Deterministic discrete model

OMNeT++ model)()())(()()1( tvtatubtqtq +++=+

80

100

position

50 100 150 200 250step

20

40

60

Deterministic fluid model

)()())(( tvttuBq +α+=&

18.09.2009PMCCS 2009, Eger 12

Defense systemDefense systemDefense systemDefense systemUsersUsers

Network

ModelingModelingModeling environmentModeling environment

18.09.2009PMCCS 2009, Eger 13

AttackerAttacker

18.09.2009PMCCS 2009, Eger 14

Th kThanks

18.09.2009PMCCS 2009, Eger 15

Recommended