Dissertation > Excellent graduate degree dissertation topics show

Solution of Large Sparse Matrix in Network Research and Influence of Traffic Model on Worm Tracing

Author: ZhouRuiBo
Tutor: HuLiang
School: Jilin University
Course: Software Engineering
Keywords: Sparse matrix Compression decomposition Internet worm Traffic model Propagation model
CLC: TP393.08
Type: Master's thesis
Year: 2008
Downloads: 66
Quote: 0
Read: Download Dissertation

Abstract


Several important applications can be modeled as large sparse graphs, e.g., network traffic monitoring, research citation network analysis, and computation of PageRank. Considering the web is too huge, computing such sparse graphs directly may not be feasible in pratice. This text firstly presented a parallel implementation of large-scale spare matrix algorithm to compute PageRank vector of large network graph. Then we analyzed the performance of this algorithm using convergence experiments and analyzed the influence of the parameter. Then we proposed parameters should be greater than 0.85 when iteration convergence. Finally, the performance of parallel comparison method is compared with the other four different methods, the contrast shows that parallel iterative algorithm with high accuracy and stability, and time and space consuming influenced by the parameters with little impact.Network worms have been a serious security threat on the Internet. Tracing worm propagation path can identify the overall structure of a worm attack’s propagation. To detect and defense large scale internet worms, setting up a convenient and safe experimental environment that capable of running and observing real world worm become an important work, it can be a large scale worm test bed for forensic evidence. This paper provides a systemic analysis of large-scale worm propagation tracing experiment strategy which is based on virtual machine technology by setting up an experimental environment called dummy (DU). First, the framework of DU is addressed. Then, it gives the design and control of DU. Finally, DU is analyzed with experiments, and some conclusions are drawn from the experiment results. Experimental results show that DU can trigger large-scale worm outbreaks within the controllable scope of human, observe propagation process of the worm, experiment detection and defense techniques, discover worm propagation characteristic such as scanning method and propagation process, real-time collect network traffic and propagation process, investigate network traffic, dynamically throw out the result, launch speculate algorithm for reconstructing out propagation path of the worm. Then actual worm propagation process can be captured and compared with the results using tracing algorithm.Worms have been a serious security threat on the Internet. They can spread across the Internet quickly with terrible influence, and Internet worms have been a primary issue faced by malicious code researchers. Currently, research on worm detection and containment continuously improved, tracing the evolution of a worm outbreak (attacking path of worm) is an important research area, it not only reconstruct patient zero (i.e., the initial victim), but also the infection node list in evolution process. The reconstruction result has significance in restraining evolution of worm and forensic evidence.Tracing worm at the early stage is helpful to the detection and containment. As Internet traffic usually follows the power-law Poisson model, researches on the worm tracing algorithm for power-law Poisson model is more essential. Based on the hypothesis testing and model parameter computation, we present the k accumulation algorithm for reconstructing worm propagation path under power-law Poisson model, then prove and verify its accuracy through simulation experiments. Experiment results indicate that our algorithm has a significant accuracy.This article firstly presented a parallel implementation of large-scale spare matrix algorithm to computing PageRank vector of large network graph. And then we provide a systemic analysis of large-scale worm propagation tracing experiment strategy which is based on virtual machine technology by setting up an experimental environment called DU. In the rear of this paper, we present the k accumulation algorithm for reconstructing worm propagation path under power-law Poisson model.

Related Dissertations

  1. \,U468.2
  2. WSN -based monitoring design and simulation of track,TP274
  3. MPLS network queue parameters to optimize the design of,TP393.06
  4. GPU-based acceleration techniques EDA,TP391.41
  5. Research on Relationship between Land Use and Transportation Planning in Middle-sized and Small Cities,TU984.191
  6. Research on Accelerating Krylov Subspace Method with GPU,TP391.41
  7. Modeling Radio Fading Channel and Evaluating Packet-level Performance for VANET,TN929.5
  8. Study on the Model and Impact of Lane-changing Vehicles for City Road,U491.112
  9. P2P-based principle of benign worms,TP393.08
  10. Research of the Worm and Virus’ Cooperation Propagation Model,TP393.08
  11. The Research of the Traffic Model in the Xinxiang Mobile Company NO.14 Softswitch Terminal Board Expansion Plan,TN929.5
  12. The Computer Virus Spreading Model Based on Game Theory,O225
  13. Design and Implementation of Simulation System of the Next Generation Switching Fabric,TP393.09
  14. Network Traffic Model Based on Wavelet Decomposition and Arima,TP393.06
  15. Optimization and Realization for Sparse Matrix-Vector Multiplication on FPGA,TP332
  16. The Research and Adjustment of Xinjiang Mobile Communication’s Propagation Model,TN929.5
  17. Research of WCDMA Network Planning,TN929.533
  18. Study in TD-SCDMA Wireless Network Programming,TN929.533
  19. Research and implementation of digital audio intercom systems,TN912.2
  20. Research on Physical Zone Control in Wireless MESH Network,TN929.5
  21. Theory and Solution of Large and Sparse Matrix Equations in IT Field,O241.6

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile