Research on network attack-defense simulation training platform

Zhi Wei Lin*, Gang Chen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Now, network attack-defense is a hotspot of network security fields. Computer network war will be the most important type of future information war. A relative general and extensible simulation platform can offer training support for building the troops' battle effectiveness. So a method of building Network Attack-Defense Simulation Training Platform (NADSTP) based on HLA and network simulation is put forward. With this method, the platform is designed composing of several different training federation members and hierarchy framework is adopted. Key technologies involve attack-defense theory and skills, network simulation and simulation driving are also detailed. Finally, platform is realized based on plug-in framework and simulation examples are presented. It can provide beneficial reference for constructing similar large-scale simulation training system.

Original languageEnglish
Title of host publicationProceedings - International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009
Pages462-465
Number of pages4
DOIs
Publication statusPublished - 2009
EventInternational Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009 - Wuhan, Hubei, China
Duration: 25 Apr 200926 Apr 2009

Publication series

NameProceedings - International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009
Volume2

Conference

ConferenceInternational Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009
Country/TerritoryChina
CityWuhan, Hubei
Period25/04/0926/04/09

Keywords

  • HLA
  • Network attack-defense
  • Network simulation
  • Simulation training

Fingerprint

Dive into the research topics of 'Research on network attack-defense simulation training platform'. Together they form a unique fingerprint.

Cite this