International Congress on Ultra Modern Telecommunications and Control Systems 2010
DOI: 10.1109/icumt.2010.5676585
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive framework to simulate network attacks and challenges

Abstract: Communication networks have evolved tremendously over the past several decades, offering a multitude of services while becoming an essential critical infrastructure in our daily lives. Networks in general, and the Internet in particular face a number of challenges to normal operation, including attacks and large-scale disasters, as well as due to the characteristics of the mobile wireless communication environment. It is therefore vital to have a framework and methodology for understanding the impact of challe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(28 citation statements)
references
References 25 publications
0
28
0
Order By: Relevance
“…A method based on the cumulative change of the giant component under targeted attacks has been proposed by Schneider et al [23]. Çetinkaya et al [24] developed a framework for analyzing packet loss relative to node and link failure. They consider packet loss under global targeted and random failure, as well as attacks contained within geographic regions.…”
Section: Related Workmentioning
confidence: 99%
“…A method based on the cumulative change of the giant component under targeted attacks has been proposed by Schneider et al [23]. Çetinkaya et al [24] developed a framework for analyzing packet loss relative to node and link failure. They consider packet loss under global targeted and random failure, as well as attacks contained within geographic regions.…”
Section: Related Workmentioning
confidence: 99%
“…This is necessary to model area-based challenges on the network, such as power failures and severe weather [20,21]. However, these intermediate nodes artificially change the graph theoretic properties of the networks, in particular artificially skewing the degree distribution toward degree-2 nodes.…”
Section: Structural Graphsmentioning
confidence: 99%
“…Most existing efforts are limited to modest scale (few hundred nodes), unrealistic network models, [7] and unrealistically simple on|off traffic models. [8] For our intended applications existing network simulators are limited in three regards:…”
Section: Introductionmentioning
confidence: 99%
“…[8] To reproduce behaviors seen in real networks we will need more sophisticated user models representing more complex activities like Web surfing, e-mail interchanges, and peer-topeer file interchange.…”
Section: Introductionmentioning
confidence: 99%