• 제목/요약/키워드: Network simulation

검색결과 7,368건 처리시간 0.043초

데이터 엔지니어링 방법론을 기반으로한 네트워크 트래픽 분석 시스템 (Network Traffic Analysis System Based on Data Engineering Methodology)

  • 한영신;김태규;정재은;정찬기;이칠기
    • 한국시뮬레이션학회논문지
    • /
    • 제18권1호
    • /
    • pp.27-34
    • /
    • 2009
  • 현재 네트워크 사용자 특히 인터넷 사용자 증가 속도는 가히 기하급수적이라 할 수 있다. 더불어 질 높은 서비스에 대한 요구가 제기되고 있는데 이것은 필연적으로 트래픽의 폭증을 가져오고 있다. 따라서 네트워크 트래픽의 효율적 분석 관리는 과거에 비해 더욱 중요한 사항으로 대두되고 있다. SES를 이용한 네트워크 분석은 네트워크 관리자들에게 쉽고, 효율적으로 트래픽데이터를 접근이 가능하다. 따라서 본 연구의 목적은 대용량의 네트워크 트래픽 데이터 효과적으로 처리하기 위해 최적화된 네트워크 트래픽 시스템을 구현하기 위하여 데이터 엔지니어링 방법론인 SES를 이용하여 네트워크 패킷의 정보 구조를 설계한후 DEVS를 이용하여 분석하는 시스템을 구현하고자 한다.

Fast Simulation for Excessive Backlogs in Tandem Networks

  • Lee, Jiyeon
    • Communications for Statistical Applications and Methods
    • /
    • 제7권2호
    • /
    • pp.499-511
    • /
    • 2000
  • We consider a stable tandem network which consists of two M/M/1 nodes and study the probability that the total backlog exceeds a large level N. Since the excessive backlog is a rare event, it is difficult to estimate this probability efficiently by using the crude Monte Carlo simulation. Instead we perform the ;$h$-transform proposed by McDonald(1999) to obtain the twisted network, in which the node with the larger load is overloaded. Then we use it to run the fast simulation.

  • PDF

SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 시뮬레이션 (Network Security Modeling and Simulation Using the SES/MB Framework)

  • 지승도;박종서;이장세;김환국;정기찬;정정례
    • 정보보호학회논문지
    • /
    • 제11권2호
    • /
    • pp.13-26
    • /
    • 2001
  • 본 논문은 계층 구조적이고 모듈화 된 모델링 및 시뮬레이션 프레임워크를 이용한 네트워크 보안 모델링과 시뮬레이션 기법의 연구를 주목적으로 한다. 최근, Howard와 Amroso는 사이버 공격, 방어 및 결과에 대한 원인-결과 모델을 개발하였다. 또한, Cohen은 원인-결과 모델을 이용하여 단순한 네트워크 보안 시뮬레이션 방법론을 제안한 바 있으나, 복잡한 네트워크 보안과 모델과 모델 기반의 사이버 공격에 대한 시뮬레이션은 불가능한 실정이다. 따라서, 본 논문에서 는 인공지능의 기호적 형식론과 시뮬레이션의 동역학적 형식론을 체계적이고 통합한 System Entity Structure/Model Base(SES/MB)을 통하여 계층 구조적이고 모듈화 된 네트워크 보안 모델링 및 시뮬레이션 방법론을 제안하고 사이버 공격 시나리오를 이용한 사례연구를 통하여 타당성을 검증하였다.

A Study on the Performance Enhancements of Video Streaming Service in MPLS Network

  • Kwak Kyoung Hwan;Park In Kap;Kim Chung Hyun
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.549-551
    • /
    • 2004
  • This paper used OPNET to simulate video streaming service a test IP network and MPLS network with the traffic shaping that have with CQ_ LLQ algorithm, LSP of fixed bandwidth, policy of limitation users and measures parameters such as delay, throughput, packet loss. To verify the performance of video streaming service in IP network and MPLS network, two scenario that have same topology and traffic source. One is the simulation for best-effort service in pure IP network. The other is the simulation for QoS-enabled service in MPLS Network. Based on simulation result, the MPLS network with CQ_ LLQ algorithm and fixed LSP show advantage of the video streaming service QoS, specially delay and packet loss

  • PDF

Study on The Development of Basic Simulation Network for Operational Transient Analysis of The CANDU Power Plant

  • Park, Jong-Woon;Lim, Jae-cheon;Suh, Jae-seung;Chung, Ji-bum;Kim, Sung-Bae
    • 한국원자력학회:학술대회논문집
    • /
    • 한국원자력학회 1995년도 추계학술발표회논문집(1)
    • /
    • pp.423-428
    • /
    • 1995
  • Simulation models have been developed to predict the overall behavior of the CANDU plant systems during normal operational transients. For real time simulation purpose, simplified thermal hydraulic models are applied with appropriate system control logics, which include primary heat transport system solver with its component models and secondary side system models. The secondary side models are mainly used to provide boundary conditions for primary system calculation and to accomodate plant power control logics. Also, for the effective use of simulation package, hardware oriented basic simulation network has been established with appropriate graphic display system. Through validation with typical plant power maneuvering cases using proven plant performance analysis computer code, the present simulation package shows reasonable capability in the prediction of the dynamic behavior of plant variables during operational transients of CANDU plant, which means that this simulation tool can be utilized as a basic framework for full scope simulation network through further improvements.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

시뮬레이션 모델을 이용한 IEC/ISA 필드버스 시스템의 데이터 링크 계층 성능 분석 (Performance analysis of the data link layer of IEC/ISA fieldbus system by simulation model)

  • 이성근;홍승호
    • 제어로봇시스템학회논문지
    • /
    • 제2권3호
    • /
    • pp.209-219
    • /
    • 1996
  • Fieldbus provides a real-time data communication among field devices in the process control and manufacturing automation systems. In this paper, a Petri Net model of the 1993 draft of IEC/ISA fieldbus which is proposed as an international standard of fieldbus network is developed. Based on the Petri Net model, discrete-event simulation model of IEC/ISA fieldbus network is developed. This paper evaluates the network induced delay in the data link layer of IEC/ISA fieldbus using the simulation model. In addition, an integrated discrete-event/continuous-time simulation model of fieldbus system and distributed control system is developed. This paper investigates the real-time data processing capability of IEC/ISA fieldbus and the effect of network-induced delay to the performance of control system.

  • PDF

침입 탐지 시스템과 침입 차단 시스템의 연동을 통한 보안 시뮬레이션 (Security Simulation with Collaboration of Intrusion Detection System and Firewall)

  • 서희석;조대호
    • 한국시뮬레이션학회논문지
    • /
    • 제10권1호
    • /
    • pp.83-92
    • /
    • 2001
  • For the prevention of the network intrusion from damaging the system, both IDS (Intrusion Detection System) and Firewall are frequently applied. The collaboration of IDS and Firewall efficiently protects the network because of making up for the weak points in the each demerit. A model has been constructed based on the DEVS (Discrete Event system Specification) formalism for the simulation of the system that consists of IDS and Firewall. With this model we can simulation whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. If an agent detects intrusions, it transfers attacker's information to a Firewall. Using this mechanism attacker's packets detected by IDS can be prevented from damaging the network.

  • PDF

On the Data Features for Neighbor Path Selection in Computer Network with Regional Failure

  • Yong-Jin Lee
    • International journal of advanced smart convergence
    • /
    • 제12권3호
    • /
    • pp.13-18
    • /
    • 2023
  • This paper aims to investigate data features for neighbor path selection (NPS) in computer network with regional failures. It is necessary to find an available alternate communication path in advance when regional failures due to earthquakes or forest fires occur simultaneously. We describe previous general heuristics and simulation heuristic to solve the NPS problem in the regional fault network. The data features of general heuristics using proximity and sharing factor and the data features of simulation heuristic using machine learning are explained through examples. Simulation heuristic may be better than general heuristics in terms of communication success. However, additional data features are necessary in order to apply the simulation heuristic to the real environment. We propose novel data features for NPS in computer network with regional failures and Keras modeling for computing the communication success probability of candidate neighbor path.

자동 격리를 감안한 슬래머 웜 전파과정에 대한 모의실험 및 분석 (Simulation and Analysis of Slammer Worm Propagation With Automatic Quarantine)

  • 임재명;정한균;윤종호
    • 한국통신학회논문지
    • /
    • 제32권8B호
    • /
    • pp.529-538
    • /
    • 2007
  • 본 논문에서는 2003년 전 세계의 인터넷망에서의 심각한 소통 장애를 일으켰던 슬래머 웜 보안공격의 전파 전과정을 NS-2를 이용한 시뮬레이터로 분석하였다. 기존 연구에서는 Detailed Network-Abstract Network(DN-AN) 모델 기반의 Abstract Network-Abstract Network(AN-AN)모델을 이용한 분석이 수행되었다. 이러한 AN-AN모델은 패킷 레벨까지 정확한 분석이 가능하지만, 초기 300초의 감염구간을 모의실험 하는데 240시간이 소요되는 시간상 문제점이 있었다. 본 논문에서는 이러한 문제점을 해결하기 위한 축소된 모델링 기법을 제시하여 모의실험에 필요한 소요시간을 단축함으로써 소통 장애가 일어난 3.5시간을 107시간에 분석할 수 있었다. 아울러 기존 분석에서는 감염 호스트가 인위적인 치료나 격리 조치가 있을 때까지는 모두 동작하는 것으로 가정하였지만, 슬래머의 과도한 감염 트래픽으로 중계 라우터의 동작이 중지되는 현상에 의해 해당 장비가 감염과정에서 자연적으로 격리되는 격리율 0.00022도 함께 고려하였다. 모의실험 결과, 국제관문국의 국외$\Longrightarrow$국내방향은 4,787초에 정상 상태로 돌아온 반면, 국내$\Longrightarrow$국외방향이 3.5시간동안 포화가 되어 소통 장애가 지속됨을 알 수 있었다.