Research on Network Attack-Defense Simulation Training Platform

被引:0
|
作者
Lin, ZhiWei [1 ]
Chen, Gang [2 ]
机构
[1] Beijing Inst Technol, Dept Automat Control, Beijing 100081, Peoples R China
[2] Commun Acad, Informat Campaign Dept, Wuhan, Peoples R China
关键词
network attack-defense; simulation training; HLA; network simulation;
D O I
10.1109/NSWCTC.2009.181
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now, network attack-defense is a hotspot of network security fields. Computer network war will be the most important type of future information war. A relative general and extensible simulation platform can offer training support for building the troops' battle effectiveness. So a method of building Network Attack-Defense Simulation Training Platform (NADSTP) based on HLA and network simulation is put forward. With this method, the platform is designed composing of several different training federation members and hierarchy framework is adopted. Key technologies involve attack-defense theory and skills, network simulation and simulation driving are also detailed. Finally, platform is realized based on plug-in framework and simulation examples are presented. It can provide beneficial reference for constructing similar large-scale simulation training system.
引用
收藏
页码:462 / +
页数:2
相关论文
共 50 条
  • [1] Network Attack-Defense Simulation Training System Based on HLA
    Chen, Gang
    Xiang, Shang
    Ji, GuanQun
    Jia, YiLong
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER MODELING AND SIMULATION, PROCEEDINGS, 2009, : 303 - +
  • [2] Research on the game of network security attack-defense confrontation through the optimal defense strategy
    Liu, Fei
    Gao, Hongyan
    Wei, Zegang
    [J]. SECURITY AND PRIVACY, 2021, 4 (01):
  • [3] The Design of Attack-defense Training Environments Based on Virtualization
    Zhang Yuehong
    [J]. 2020 5TH INTERNATIONAL CONFERENCE ON ELECTROMECHANICAL CONTROL TECHNOLOGY AND TRANSPORTATION (ICECTT 2020), 2020, : 283 - 290
  • [4] Attack-defense trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    [J]. JOURNAL OF LOGIC AND COMPUTATION, 2014, 24 (01) : 55 - 87
  • [5] Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid
    Yang, JH
    Wu, ZH
    Tang, SL
    Guo, XS
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 164 - 172
  • [6] Attack-Defense Differential Game Model for Network Defense Strategy Selection
    Zhang, Hengwei
    Jiang, Lv
    Huang, Shirui
    Wang, Jindong
    Zhang, Yuchen
    [J]. IEEE ACCESS, 2019, 7 : 50618 - 50629
  • [7] Foundations of Attack-Defense Trees
    Kordy, Barbara
    Mauw, Sjouke
    Radomirovic, Sasa
    Schweitzer, Patrick
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 80 - +
  • [8] Research on training effectiveness assessment of network attack and defense
    Zheng Yuanyuan
    Wang Tao
    Hou Zhiqi
    [J]. Proceedings of the First International Symposium on Test Automation & Instrumentation, Vols 1 - 3, 2006, : 165 - 168
  • [9] Impersonation Attack-Defense Tree
    Rosmansyah, Yusep
    Hendarto, Ignatius Leo Sri
    Pratama, Demby
    [J]. INTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES IN LEARNING, 2020, 15 (19) : 239 - 246
  • [10] State Grid Network Attack-defense Graph Generation Method
    Zhou, Cheng
    Fei, Jia-xuan
    [J]. COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 389 - 398