Study of an algorithm for generation and deployment of background traffic nodes based on virtualization

Weichong Xie,Zhengmin Li,Kaikun Dong,Yinghong Shen
DOI: https://doi.org/10.3772/j.issn.1002-0470.2016.12.006
2016-01-01
Abstract:The analysis of network attack and defense was conducted,and aiming at the traditional background traffic simulation technology's problems in generation and deployment of traffic nodes such as size limitation of background traffic,authenticity limitation of background traffic,and number and position limitations of the tools for background traffic generation and deployment,an algorithm for generation and deployment of lightweight background traffic nodes based on virtualization was proposed.This is a three-phase algorithm that consists of the target traffic mapping based on resource amount,the adding of background traffic application based on the shortest route,and the node mapping based on the least communication cost,aiming to solve the problems of massive,rapid generation of background traffic nodes and flexible deployment of them in network attack and defense experiments.The experimental results show that using the proposed lightweight background traffic nodes to generate the background traffic can satisfy the self-similarity of networks,the small consumption of resource,the fast starting speed,and the massive,flexible and quick deployment according to the actual network attack and defense experiment.
What problem does this paper attempt to address?