Research on Network Attack-Defense Simulation Training Platform

被引:0
|
作者
Lin, ZhiWei [1 ]
Chen, Gang [2 ]
机构
[1] Beijing Inst Technol, Dept Automat Control, Beijing 100081, Peoples R China
[2] Commun Acad, Informat Campaign Dept, Wuhan, Peoples R China
关键词
network attack-defense; simulation training; HLA; network simulation;
D O I
10.1109/NSWCTC.2009.181
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now, network attack-defense is a hotspot of network security fields. Computer network war will be the most important type of future information war. A relative general and extensible simulation platform can offer training support for building the troops' battle effectiveness. So a method of building Network Attack-Defense Simulation Training Platform (NADSTP) based on HLA and network simulation is put forward. With this method, the platform is designed composing of several different training federation members and hierarchy framework is adopted. Key technologies involve attack-defense theory and skills, network simulation and simulation driving are also detailed. Finally, platform is realized based on plug-in framework and simulation examples are presented. It can provide beneficial reference for constructing similar large-scale simulation training system.
引用
收藏
页码:462 / +
页数:2
相关论文
共 50 条
  • [31] Deployment Optimization of Defense Stations in an Attack-Defense Aerial War Game
    Jia, Zhi-Xiang
    Kiang, Jean-Fu
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [32] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678
  • [33] Attack-Defense Game in Interdependent Networks: A Functional Perspective
    Sun, Jingya
    Wang, Shuliang
    Zhang, Jianhua
    Dong, Qiqi
    [J]. JOURNAL OF INFRASTRUCTURE SYSTEMS, 2023, 29 (03)
  • [34] Modelling Attack-defense Trees Using Timed Automata
    Gadyatskaya, Olga
    Hansen, Rene Rydhof
    Larsen, Kim Guldstrand
    Legay, Axel
    Olesen, Mads Chr.
    Poulsen, Danny Bogsted
    [J]. FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, FORMATS 2016, 2016, 9884 : 35 - 50
  • [35] Attack-Defense Utility Quantification And Security Risk Assessment
    Yang, Su
    Wu, Chensi
    Xie, Weiqiang
    Wang, Wenjie
    Zhang, Yuqing
    [J]. 2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 1456 - 1461
  • [36] On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
    Kordy, Barbara
    Widel, Wojciech
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2018, 2018, 10804 : 325 - 346
  • [37] Design Method for Virtual Network Attack and Defense Platform
    Wang Fangnian
    Peng Gang
    Che Wanfang
    Niu Cong
    Bai Yun
    Zhu Genbiao
    [J]. CONFERENCE ON MODELING, IDENTIFICATION AND CONTROL, 2012, 3 : 335 - 340
  • [38] A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
    Jhawar, Ravi
    Lounis, Karim
    Mauw, Sjouke
    [J]. SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 138 - 153
  • [39] Modeling and security analysis of enterprise network using attack-defense stochastic game Petri nets
    Wang, Yuanzhuo
    Li, Jingyuan
    Meng, Kun
    Lin, Chuang
    Cheng, Xueqi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (01) : 89 - 99
  • [40] Anti-ship Missile Attack-Defense Confrontation Ability Verification Technology Based on Simulation
    Zhang Jianqiang
    Wang Houxiang
    Yang Hongmei
    [J]. MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1227 - +