Research on Group Theory Strategies in Computer Security Mechanisms and Collaborative Defense Techniques for Distributed Systems
19 mar 2025
INFORMAZIONI SU QUESTO ARTICOLO
Pubblicato online: 19 mar 2025
Ricevuto: 05 ott 2024
Accettato: 30 gen 2025
DOI: https://doi.org/10.2478/amns-2025-0370
Parole chiave
© 2025 Ning Peng, published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Figure 1.

Figure 2.

Figure 3.

Results of the defense test
| Sample set | Attack packet | The total number of response events of the invasion defense | Success rate(%) |
|---|---|---|---|
| D1 | 100 | 100 | 100% |
| D2 | 200 | 200 | 100% |
| D3 | 300 | 300 | 100% |
| D4 | 400 | 398 | 99.5% |
| D5 | 500 | 497 | 99.4% |
| D6 | 600 | 596 | 99.3% |
| D7 | 700 | 695 | 99.3% |
| D8 | 800 | 792 | 99.0% |
| D9 | 900 | 890 | 98.9% |
| D10 | 1000 | 982 | 98.2% |
Experimental configuration
| Main engine | Memory | Operating system | Processor |
|---|---|---|---|
| Client-side | 8G | Ubuntu16.04 | Core i5 |
| Server unit | 8G | Ubuntu16.04 | Core i7 |
| Synchronous server | 4G | Ubuntu16.04 | Core i5 |
| Attack machine 1 | 4G | Ubuntu16.04 | Core i5 |
| Attack machine 2 | 8G | Windows 7 | Core i5 |
Network bandwidth performance
| Attack rate(packets/sec) | Traditional system (Mbits/sec) | System of this article (Mbits/sec) |
|---|---|---|
| 0 | 94.5 | 94.5 |
| 500 | 16.8 | 70.4 |
| 1000 | 4.85 | 65.95 |
| 1500 | 4.02 | 60.2 |
| 2000 | 3.68 | 58.6 |
| 2500 | 3.12 | 52.4 |
| 3000 | 2.64 | 50.15 |
| 3500 | 2.25 | 47.13 |
| 4000 | 2.15 | 41.52 |
| 4500 | 2.05 | 33.1 |
| 5000 | 1.91 | 30.8 |
Sample set
| Sample set | Total packet | Normal packet | Attack packet |
|---|---|---|---|
| D1 | 200 | 100 | 100 |
| D2 | 400 | 200 | 200 |
| D3 | 600 | 300 | 300 |
| D4 | 800 | 400 | 400 |
| D5 | 1000 | 500 | 500 |
| D6 | 1200 | 600 | 600 |
| D7 | 1400 | 700 | 700 |
| D8 | 1600 | 800 | 800 |
| D9 | 1800 | 900 | 900 |
| D10 | 2000 | 1000 | 1000 |
