The ns Manual (formerly ns Notes and Documentation)1 - NM Lab at ...

The ns Manual (formerly ns Notes and Documentation)1 - NM Lab at ... The ns Manual (formerly ns Notes and Documentation)1 - NM Lab at ...

nmlab.korea.ac.kr
from nmlab.korea.ac.kr More from this publisher
12.07.2015 Views

$client log These consist configuration of the Http client. It is attached to a central page pool . Next a random variable is attached to the client that is used by it (client) to generate intervals between two consecutive requests. Lastly the client isattached to a log file for logging its events.$cache log This is part of cache configuration that allows the cache to log its events in a log-file.$client connect $cache connect Once the client, cache, and server are configured, they need to be connected as shown in above commands.$client start-session This starts sending request for a random page from the client to the via .359

Chapter 40Worm ModelIn this chapter, we describe a scalable worm propagation model in ns, namely the detailed-network and abstract-network (DN-AN) model. It combines packet-level simulations with analytic worm spreading model. As shown in Figure 40.1, we modelthe Internet with two parts: detailed, and abstract part. A detailed-network could be an enterprise-network or the networkrun by an ISP. It simulates network connectivity and packet transmission. Users can evaluate worm detection algorithms inthe detailed network. On the other hand, we abstract the rest of the Internet with a mathematical model, namely susceptibleinfectious-removal(SIR) model (refer to [13] for detailed descriptions). Compared to the detailed network, we only trackseveral state variables in the abstract world, such as the number of infected hosts. The interaction between DN and AN isthrough actual packet transmissions, that is, the probing traffic generated by compromised hosts in both parts.For detailed description on DN-AN model, please refer to our draft paper. We implement the worm propagation model asapplications. The source code can be found at ~ns//apps/worm.{cc,h}. There is also a sample script to illustrate the DN-ANmodel under ~ns//tcl/ex/worm.tcl.40.1 OverviewWe implement the worm propagation model with three classes: class WormApp, DnhWormApp, and AnWormApp.class WormAppnd class DnhWormAppre used in the detailed network, representing invulnerable and vulnerable hostsrespectively. class AnWormApps the abstract network. Currently, our model only supports UDP-based worms.An vulnerable host is compromised upon receiving a probing packet. Then, it chooses a target host (randomly or with certainpreference to local neighbors) to scan. Probing packets have no effect on invulnerable hosts. When the abstract networkreceives probing packets, it updates its current states.probingtrafficthe restunprotectedInternetthe protected networkFigure 40.1: The DN-AN model.360

$client log <strong>The</strong>se co<strong>ns</strong>ist configur<strong>at</strong>ion of the Http client. It is <strong>at</strong>tached to a central page pool . Next a r<strong>and</strong>om variable is <strong>at</strong>tached to the client th<strong>at</strong> is used by it (client) to gener<strong>at</strong>e intervals between two co<strong>ns</strong>ecutive requests. Lastly the client is<strong>at</strong>tached to a log file for logging its events.$cache log This is part of cache configur<strong>at</strong>ion th<strong>at</strong> allows the cache to log its events in a log-file.$client connect $cache connect Once the client, cache, <strong>and</strong> server are configured, they need to be connected as shown in above comm<strong>and</strong>s.$client start-session This starts sending request for a r<strong>and</strong>om page from the client to the via .359

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!