Accesso libero

Research on Group Theory Strategies in Computer Security Mechanisms and Collaborative Defense Techniques for Distributed Systems

  
19 mar 2025
INFORMAZIONI SU QUESTO ARTICOLO

Cita
Scarica la copertina

Figure 1.

Energy curve
Energy curve

Figure 2.

Response time
Response time

Figure 3.

Average response time of the service
Average response time of the service

Results of the defense test

Sample set Attack packet The total number of response events of the invasion defense Success rate(%)
D1 100 100 100%
D2 200 200 100%
D3 300 300 100%
D4 400 398 99.5%
D5 500 497 99.4%
D6 600 596 99.3%
D7 700 695 99.3%
D8 800 792 99.0%
D9 900 890 98.9%
D10 1000 982 98.2%

Experimental configuration

Main engine Memory Operating system Processor
Client-side 8G Ubuntu16.04 Core i5
Server unit 8G Ubuntu16.04 Core i7
Synchronous server 4G Ubuntu16.04 Core i5
Attack machine 1 4G Ubuntu16.04 Core i5
Attack machine 2 8G Windows 7 Core i5

Network bandwidth performance

Attack rate(packets/sec) Traditional system (Mbits/sec) System of this article (Mbits/sec)
0 94.5 94.5
500 16.8 70.4
1000 4.85 65.95
1500 4.02 60.2
2000 3.68 58.6
2500 3.12 52.4
3000 2.64 50.15
3500 2.25 47.13
4000 2.15 41.52
4500 2.05 33.1
5000 1.91 30.8

Sample set

Sample set Total packet Normal packet Attack packet
D1 200 100 100
D2 400 200 200
D3 600 300 300
D4 800 400 400
D5 1000 500 500
D6 1200 600 600
D7 1400 700 700
D8 1600 800 800
D9 1800 900 900
D10 2000 1000 1000
Lingua:
Inglese
Frequenza di pubblicazione:
1 volte all'anno
Argomenti della rivista:
Scienze biologiche, Scienze della vita, altro, Matematica, Matematica applicata, Matematica generale, Fisica, Fisica, altro