This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimi...This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimization in order to accurately detect and efficiently filter the traffic of distributed denial-of-service attack. This paper presents the design of our software, and describes all important algorithms of detection and filtering. Experimental results showed that our method has only a low delay to detect abnormal traffic of distributed denial-of-service attacks, and with a high percentage o f filtering.展开更多
The self similarity of the network traffic has great influences on the performance. But there are few analytical or even numerical solutions for such a model. So simulation becomes the most efficient method for resear...The self similarity of the network traffic has great influences on the performance. But there are few analytical or even numerical solutions for such a model. So simulation becomes the most efficient method for research. Fractal Gaussian noise (FGN) is the most popularly used self similar model. This paper presented an FGN generator based on fast Fourier transform (FFT). The study indicates that this algorithm is fairly fast and accurate.展开更多
Aiming at the soft real-lime fault tolerant demand of critical webapplications at present, such as E-commerce, a new fault tolerant scheduling algorithm based onprobability is proposed. To achieve fault tolerant sched...Aiming at the soft real-lime fault tolerant demand of critical webapplications at present, such as E-commerce, a new fault tolerant scheduling algorithm based onprobability is proposed. To achieve fault tolerant scheduling, the primary/slave backuptechnology isapplied on the basis of task's self similar accessing characteristics, when the primary taskcompleted successfully, the resources allocated for the slave task are reclaimed, thus advancingsystem's efficiency. Experimental results demonstrate on the premise of satisfying system's certainfault tolerant probability, task's schcdulabi-listic probability is improved, especially, the highertask's self similar degree is, the more obviously the utilization of system resources is enhanced.展开更多
文摘This paper proposes a distributed denial-of-service attack detection method based on self similar and wavelet analysis. This method adopts an optimized transmission control protocol cookie technology for filter optimization in order to accurately detect and efficiently filter the traffic of distributed denial-of-service attack. This paper presents the design of our software, and describes all important algorithms of detection and filtering. Experimental results showed that our method has only a low delay to detect abnormal traffic of distributed denial-of-service attacks, and with a high percentage o f filtering.
文摘The self similarity of the network traffic has great influences on the performance. But there are few analytical or even numerical solutions for such a model. So simulation becomes the most efficient method for research. Fractal Gaussian noise (FGN) is the most popularly used self similar model. This paper presented an FGN generator based on fast Fourier transform (FFT). The study indicates that this algorithm is fairly fast and accurate.
文摘Aiming at the soft real-lime fault tolerant demand of critical webapplications at present, such as E-commerce, a new fault tolerant scheduling algorithm based onprobability is proposed. To achieve fault tolerant scheduling, the primary/slave backuptechnology isapplied on the basis of task's self similar accessing characteristics, when the primary taskcompleted successfully, the resources allocated for the slave task are reclaimed, thus advancingsystem's efficiency. Experimental results demonstrate on the premise of satisfying system's certainfault tolerant probability, task's schcdulabi-listic probability is improved, especially, the highertask's self similar degree is, the more obviously the utilization of system resources is enhanced.