01/15/04

THIS PACKAGE ENCLOSES SEVERAL MATLAB CODES ASSOCIATED WITH three MODELS
AND THE DATA ANALYSIS, AS WELL AS THE RAW DATA:

I. SIMULATION MODELS

The simulation model is described in the section 2 of the paper.

1) ABILENEtdAS.m
Detailed description is in the section 4: Capturing Shifting Spatial-temporal Patterns.

2) ABILENEtddosCR3.m
The Constant rate attack of the section 5.2

3) ABILENEtddosGA3.m
The Subgroup attack of the section 5.3

II. RAW DATA

1) Hotspot

ABILENEtdAS-r5D5T2K2R8A160A20A5-a15on50-a15off5000

Network Flow Data: AAX

2) Constant rate attack

ABILENEtddosCR3-f10D5T10K2R8A160A20A5-a15on50-a15off5000

Network Flow Data: AAX

3) Subgroup attack

ABILENEtddosGA3-f5D5T10K2R8A160A20A5-a15on50-a15off5000


III. ANALYSIS APPROACH

aLaggre.m ------ Compiling flow at different aggregated levels
aLeigen3.m ----- Performing cross-correlation analysis at the leaf-router level
aNeigen3.m ----- Aggregating flow from the leaf-router level to the subnet-router level
ap11.m --------- Computing the spatial-temporal pattern at the subnet-router level
ap13.m --------- Computing the spatial-temporal pattern at the leaf-router level

IV. REFERENCE

J. Yuan, K. Mills, Observing the Macroscopic Dynamics of Large-Scale IP Networks, 2004
