Modeling Internet Backbone Traffic Based on Multi-Commodity Flow

Article Preview

Abstract:

Network traffic is the key factor to describe the adaptive business of Internet. As Internet becomes key battlefield of cyber warfare, how to model the Internet traffic at the macro level has become a hot research topic in war simulation and cyber warfare. Focusing on the global undersea cable system which serves as the backbone of the Internet, this paper proposes an Internet traffic modeling method based on multi-commodity flow. This method can estimate the traffic demand between each pair of regions, generate traffic flow distribution in global undersea cable system, and support adaptive adjustment of Internet traffic according to damage situation of undersea cable system in a crisis. Finally, the method is validated by an example.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2261-2268

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Nakashima, Ellen. With Plan X, Pentagon seeks to spread U.S. military might to cyberspace,. The New York Times. Retrieved 1 June (2012).

Google Scholar

[2] Chang, H., et al., The many facets of Internet topology and traffic. Networks and Heterogeneous Media, 2006. 1(4): pp.569-600.

Google Scholar

[3] Mayada Omer, R.N. a.A.M., Measuring the resilience of the global internet infrastructure system, in 3rd Annual IEEE International Systems Conference. 2009: Vancouver, Canada.

DOI: 10.1109/systems.2009.4815790

Google Scholar

[4] Crain, J.K., ASSESSING RESILIENCE IN THE GLOBAL UNDERSEA CABLE INFRASTRUCTURE in NAVAL POST GRADUATE SCHOOL. (2012).

Google Scholar

[5] Ozdaglar, A.E. and D.P. Bertsekas, Optimal solution of integer multicommodity flow problems with application in optical networks, in Frontiers in global optimization. 2004, Springer. pp.411-435.

DOI: 10.1007/978-1-4613-0251-3_23

Google Scholar

[6] Brown, G., et al., Defending critical infrastructure. Interfaces, 2006. 36(6): pp.530-544.

Google Scholar

[7] Scaparra, M.P. and R.L. Church, A bilevel mixed-integer program for critical infrastructure protection planning. Computers & Operations Research, 2008. 35(6): p.1905-(1923).

DOI: 10.1016/j.cor.2006.09.019

Google Scholar

[8] Ten C W, M.G., Liu C C., Cybersecurity for Critical Infrastructures Attack and defender model. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions, 2010. 40(4): p.13.

DOI: 10.1109/tsmca.2010.2048028

Google Scholar

[9] Brown G G, C.W.M., Salmeron J, et al., Analyzing the vulnerability of critical infrastructure to attack and planning defenses. 2005, NAVAL POSTGRADUATE SCHOOL MONTEREY CA DEPT OF OPERATIONS RESEARCH.

Google Scholar

[10] Information on http: /www. submarinecablemap. com.

Google Scholar

[11] Collins, L. (2011). Comms redundancy proves its value., Engineering & Technology 6(4): 58-59.

DOI: 10.1049/et.2011.0408

Google Scholar