Title: | 針對網路拓樸圖進行潛在關鍵節點的分析研究 Topology Analysis Model for finding Potential Victim Set in a Network |
Authors: | 葉書宏 Yeh,Shu-Hong 黃育綸 Huang,Yu-Lun 電控工程研究所 |
Keywords: | 網路拓樸;拓樸分析;潛在關鍵節點;Topology Analysis;Potential Victim Set |
Issue Date: | 2012 |
Abstract: | 近年來隨著網際網路的蓬勃發展,網路的服務品質與效能瓶頸都是用戶端與行動網路服務供應商最關切的議題。
行動網路服務供應商在規劃佈建網路時,也需要能動態網路分析的拓樸工具。
因此,在本篇論文中,我們針對網際網路協助找出該網路中容易受到攻擊的節點,提出了一個尋找該網路中潛在關鍵節點的方法。這些關鍵節點也許不是主要的路由器,但是如果遭受到攻擊,將使該網路中大部分的節點無法獲得服務。
我們將我們所提的方法實作在我們的網路拓樸探索系統上,透過主機端的 JTracert 分析器與手機端的 ProbeCollector 應用程式,可以收集並分析實體網路的拓樸。我們也透過美國柏克萊大學的 DETERLab 網路測試平台,以及我們的網路拓樸探索系統,驗證我們所提方法的正確性,並證實我們所找出的潛在關鍵節點,對於網路有一定的影響力。
從我們的實驗結果可知,探索網路拓樸時,所給定的拓樸端點個數越多,找到的潛在關鍵節點正確性越高。當本論文中,我們以 11 個節點的拓樸圖為例,當給定五個端點時,可以達到 80\% 的正確性;該網路中的隱藏節點越少,所找到的潛在關鍵節點也會越準確。 In recent years, with the rapid development of Internet, the network service quality and performance bottlenecks are the greatest concern for network clients and service providers. When planning and provisioning a network, a mobile network service provider needs a tool that can accurately analyze the dynamics topology of a wireless or mobile network. Therefore, in this thesis, we design an approach to identify vulnerable network nodes, defined as potential victim nodes and realize the approach in our network topology exploring system, which is composed of an analyzer (JTracert) running on the PC side and several mobile clients (ProbeCollector) running on mobile devices. We use the U.S. Berkeley DETERLab network testbed to verify our approach. We conduct several experiments to evaluate the accuracy of the proposed approach. From the experimental results, the higher accuracy we can obtain the number of endpoints we provide to the topology exploring system. More, we can obtain better accuracy if fewer nodes are hidden (invisible) during the exploration. |
URI: | http://140.113.39.130/cdrfb3/record/nctu/#GT079812629 http://hdl.handle.net/11536/73371 |
Appears in Collections: | Thesis |