Journal of System Simulation
Abstract
Abstract: With the booming development of Internet technology, network security threats force every country to pay more and more attention to network security. By analyzing and summarizing the principles of network security threats, three kinds of proactive security threats are proposed in this paper, including saturation security threats, deleting security threats, and tampering security threats. OPNET is employed as the simulation tool to establish multi-service communications network model, in which the node are based on the queuing theory model. In addition, different traffic intensity parameters are designed to simulate the network performance under various running situations. Fuzzy comprehensive evaluation method is used to assess the effect of network security threats.
Recommended Citation
Liu, Lifang; Zhao, Lisha; Qi, Xiaogang; and Wei, Xiong
(2019)
"Security Evaluation Techniques and Network Performance Simulation Based on Queue Model,"
Journal of System Simulation: Vol. 30:
Iss.
1, Article 24.
DOI: 10.16182/j.issn1004731x.joss.201801024
Available at:
https://dc-china-simulation.researchcommons.org/journal/vol30/iss1/24
First Page
191
DOI Link
https://doi.org/10.16182/j.issn1004731x.joss.201801024
Last Page
196
CLC
TP393
Recommended Citation
Liu Lifang, Zhao Lisha, Qi Xiaogang, Xiong Wei. Security Evaluation Techniques and Network Performance Simulation Based on Queue Model[J]. Journal of System Simulation, 2018, 30(1): 191-196.
DOI
10.16182/j.issn1004731x.joss.201801024
Included in
Artificial Intelligence and Robotics Commons, Computer Engineering Commons, Numerical Analysis and Scientific Computing Commons, Operations Research, Systems Engineering and Industrial Engineering Commons, Systems Science Commons