•  
  •  
 

Journal of System Simulation

Abstract

Abstract: With the booming development of Internet technology, network security threats force every country to pay more and more attention to network security. By analyzing and summarizing the principles of network security threats, three kinds of proactive security threats are proposed in this paper, including saturation security threats, deleting security threats, and tampering security threats. OPNET is employed as the simulation tool to establish multi-service communications network model, in which the node are based on the queuing theory model. In addition, different traffic intensity parameters are designed to simulate the network performance under various running situations. Fuzzy comprehensive evaluation method is used to assess the effect of network security threats.

First Page

191

Last Page

196

CLC

TP393

Recommended Citation

Liu Lifang, Zhao Lisha, Qi Xiaogang, Xiong Wei. Security Evaluation Techniques and Network Performance Simulation Based on Queue Model[J]. Journal of System Simulation, 2018, 30(1): 191-196.

DOI

10.16182/j.issn1004731x.joss.201801024

Share

COinS