Journal of System Simulation ›› 2018, Vol. 30 ›› Issue (1): 191-196.doi: 10.16182/j.issn1004731x.joss.201801024

Previous Articles     Next Articles

Security Evaluation Techniques and Network Performance Simulation Based on Queue Model

Liu Lifang1, Zhao Lisha1, Qi Xiaogang2, Xiong Wei3   

  1. 1.School of Computer Science and Technology, Xidian University, Xi’an 710071, China;
    2.School of Mathematics and Statistics, Xidian University, Xi’an 710071, China;
    3.National Key Laboratory of Electronic Information System Technology, Beijing 101416, China
  • Received:2015-11-27 Published:2019-01-02

Abstract: With the booming development of Internet technology, network security threats force every country to pay more and more attention to network security. By analyzing and summarizing the principles of network security threats, three kinds of proactive security threats are proposed in this paper, including saturation security threats, deleting security threats, and tampering security threats. OPNET is employed as the simulation tool to establish multi-service communications network model, in which the node are based on the queuing theory model. In addition, different traffic intensity parameters are designed to simulate the network performance under various running situations. Fuzzy comprehensive evaluation method is used to assess the effect of network security threats.

Key words: network security threats, OPNET simulation technology, effect evaluation, queue theory

CLC Number: