Network Attack-Defense Simulation Training System Based on HLA

被引:1
|
作者
Chen, Gang [1 ]
Xiang, Shang [2 ]
Ji, GuanQun [2 ]
Jia, YiLong [2 ]
机构
[1] Commun Acad, Wuhan, Peoples R China
[2] East China Normal Univ, Shanghai, Peoples R China
关键词
network attack-defense; simulation system; HLA; network simulation;
D O I
10.1109/ICCMS.2009.52
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Soldiers possessing of network attack-defense ability are the key factor for future information war. Aiming at the problem of lacking daily training and drilling environment, a method of building Network Attack-Defense Simulation Training System (NADSTS) based on HLA is put forward. With the method, attack and defense training are designed as different federation member. The system is divided to presentation, application and adapter layer clearly. Key technologies involves network attack-defense, network simulation and simulation driving are also presented. Software is developed based on plug-in framework. Its simulation examples show greatest traits on building similar large-scale simulation system.
引用
收藏
页码:303 / +
页数:2
相关论文
共 50 条
  • [1] Simulation Design and Application of Attack-Defense System in the Sea Based on HLA
    Pan Changpeng
    Chen Jie
    Yan Jiangang
    [J]. PROCEEDINGS OF THE 10TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA 2012), 2012, : 2417 - 2420
  • [2] Research on Network Attack-Defense Simulation Training Platform
    Lin, ZhiWei
    Chen, Gang
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 462 - +
  • [3] The Design of Attack-defense Training Environments Based on Virtualization
    Zhang Yuehong
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON ELECTROMECHANICAL CONTROL TECHNOLOGY AND TRANSPORTATION (ICECTT 2020), 2020, : 283 - 290
  • [4] Network Security Analysis of Industrial Control System Based on Attack-Defense Tree
    He, Sui
    Lei, Ding
    Shuang, Wang
    Liu, Chunbo
    Gu, Zhaojun
    [J]. PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 651 - 655
  • [5] Attack-defense trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    [J]. JOURNAL OF LOGIC AND COMPUTATION, 2014, 24 (01) : 55 - 87
  • [6] Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid
    Yang, JH
    Wu, ZH
    Tang, SL
    Guo, XS
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 164 - 172
  • [7] Research on Network Attack Training Simulation System Based on Attack Tree
    Shen, Jianjun
    Yang, Jun
    Chen, Gang
    [J]. MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1917 - +
  • [8] Attack-Defense Differential Game Model for Network Defense Strategy Selection
    Zhang, Hengwei
    Jiang, Lv
    Huang, Shirui
    Wang, Jindong
    Zhang, Yuchen
    [J]. IEEE ACCESS, 2019, 7 : 50618 - 50629
  • [9] Attack-defense tree-based analysis and optimal defense synthesis for system design
    Meng, Baoluo
    Viswanathan, Arjun
    Paul, Saswata
    Smith, William
    Moitra, Abha
    Siu, Kit
    Durling, Michael
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2024,
  • [10] Foundations of Attack-Defense Trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 80 - +