期刊文献+

基于半实物的网络防御仿真测试模型

Network defense simulation test model based on hardware-in-the-loop
下载PDF
导出
摘要 针对在真实网络中对防御进行测试存在高成本高风险的不足,将半实物网络仿真方法引入防御测试研究中,分析了半实物网络仿真的原理,建立了一种基于半实物的网络防御仿真测试模型,给出了模型的两种基本应用。着重对网络防御半实物仿真测试的实现技术进行了分析,通过自定义包转换的方法来扩展OPNET所能支持的攻击的半实物仿真,最后通过仿真实验来验证了模型的有效性。该模型能够将实际节点映射到虚拟网络中,使防御测试中的实际攻防行为在虚拟网络中运行,从而既避免了建立复杂的真实测试平台,又使得测试过程安全可控,还提高了仿真测试结果的可信度。 Aiming at the deficiency of high cost and risk in testing network defense in real network,Hardware-in-the-loop simulation is introduced in network defense testing research,and a defense testing model is erected based on HITLS through analyzing of the elements of HITLS,and then two basic applications of model are given.The implementation technology of this model,and a method used to extend attacking simulation based on hardware-in-the-loop support are analyzed in detail by OPNET through creating custompacket-translation functions.At last,a HITLS experiment is given to prove the validity of this model.This model can make real attacking and defending behaviors run in simulation network,which maps the real node into the simulation network.The model can not only avoid building complex hardware experiment platform but also make the process of testing in security and control,even more it can improve the reliability of simulation.
出处 《计算机工程与设计》 CSCD 北大核心 2011年第1期66-70,共5页 Computer Engineering and Design
基金 军队预研基金项目(200904)
关键词 防御测试 半实物网络仿真 系统在环 网络仿真模型 自定义包转换 defense testing HILS SITL network simulation model custom packet-translation
  • 相关文献

参考文献7

二级参考文献17

  • 1郭文刚,宋善德.基于HLA的分布式通信网络仿真技术[J].计算机仿真,2004,21(8):91-94. 被引量:7
  • 2管天,卢泽新,白建军.一种基于半实物仿真的新型网络模拟模型研究[J].计算机工程与应用,2006,42(8):121-124. 被引量:4
  • 3Mattisa Bjorlin. A study of Modeling and Simulation for computer and network security [ J ]. University of Stockholm/Royal Institute of Technology,2005.
  • 4Shashi Guruprasad Robert Ricci Jay Leprean. Integrated Network Experimentation using Simulation and Emulation [ D ]. School of Computing, University of Utah,2005.
  • 5Agustin Zaballos, Guiomar Corral, lsard Serra, Jaume Abella. Testing Network Security using OPNET [ J ]. Universitat Ramon Llull, Spain, 2003.
  • 6张筱,林孝康.一种基于OPNET的网络半实物仿真模型[J].微计算机信息,2007(01S):257-258. 被引量:16
  • 7Andreas Fuchsberger.Intrusion detection systems and intrusion prevention systems[J].Elsevier Information Security Technical Report,2005,10:134-139.
  • 8Kaizo.Next-generation intrusion prevention:Accounting for the attack timeline[J].Elsevier Information Security Technical Report,2005,10:162-168.
  • 9Hofmeyr S.Host intrusion prevention:Part of the operating system or on top of the operating system[J].Elsevier Computers and Security,2005,24:440-442.
  • 10Zhang Xinyou,Li Chengzhong,Zheng Wenbin.Intrusion prevention system design[J].IEEE Computer and Information Technology,2004(4):386-390.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部