the flow of requests
In the article the problem of increasing the number of network attacks with a simultaneous reduction in the efficiency of detection by existing approaches is presented. The problem is solved on the base of the research of dynamic characteristics of information-processing networks. The authors described the algorithm of the simulation model, allowing us to form a stream of requests for the transmission of frames in a temporary detention center, based on the classic model of threads used in queueing theory, based on an exponential distribution.
The model is intended to explore possible ways to improve the information security of computer networks. This enables studies of in-formation-processing networks for different situations that arise in the process of network attacks. This algorithm makes possible the formation of the network traffic with specified characteristics.
- Brehgg R., Rods-Ousli M., Strassberg K. Bezopasnost setejj. M.: BINOM. Laboratorija znanijj.
2006. 912 s.
- Dobrovolskijj E.V., Nechiporuk O.L. Modelirovanie setevogo trafika s ispolzovaniem
kontekstnykh metodov. Odesskaja nacionalnaja akademija svjazi. 2005. 9 s.
- Ventcel E.S.Issledovanie operacijj. M.: Sov. radio. 1972. 552 s.