Skip to main navigation Skip to search Skip to main content

Study of an algorithm for generation and deployment of background traffic nodes based on virtualization

  • Weichong Xie
  • , Zhengmin Li*
  • , Kaikun Dong
  • , Yinghong Shen
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

The analysis of network attack and defense was conducted, and aiming at the traditional background traffic simulation technology's problems in generation and deployment of traffic nodes such as size limitation of background traffic, authenticity limitation of background traffic, and number and position limitations of the tools for background traffic generation and deployment, an algorithm for generation and deployment of lightweight background traffic nodes based on virtualization was proposed. This is a three-phase algorithm that consists of the target traffic mapping based on resource amount, the adding of background traffic application based on the shortest route, and the node mapping based on the least communication cost, aiming to solve the problems of massive, rapid generation of background traffic nodes and flexible deployment of them in network attack and defense experiments. The experimental results show that using the proposed lightweight background traffic nodes to generate the background traffic can satisfy the self-similarity of networks, the small consumption of resource, the fast starting speed, and the massive, flexible and quick deployment according to the actual network attack and defense experiment.

Original languageEnglish
Pages (from-to)969-977
Number of pages9
JournalGaojishu Tongxin/Chinese High Technology Letters
Volume26
Issue number12
DOIs
StatePublished - 1 Dec 2016
Externally publishedYes

Keywords

  • Background traffic
  • Docker
  • Dynamic deployment
  • Self-similarity
  • Virtual mapping

Fingerprint

Dive into the research topics of 'Study of an algorithm for generation and deployment of background traffic nodes based on virtualization'. Together they form a unique fingerprint.

Cite this