Research Article
The Study on the Network Security Simulation for HITLS Technology
@INPROCEEDINGS{10.1007/978-3-319-13326-3_45, author={MuDan Gu and HuiKui Zhou and YingHan Hong and Li Zhang}, title={The Study on the Network Security Simulation for HITLS Technology}, proceedings={Testbeds and Research Infrastructure: Development of Networks and Communities. 9th International ICST Conference, TridentCom 2014, Guangzhou, China, May 5-7, 2014, Revised Selected Papers}, proceedings_a={TRIDENTCOM}, year={2014}, month={11}, keywords={HITLS technology Network security simulation Attack effect simulation}, doi={10.1007/978-3-319-13326-3_45} }
- MuDan Gu
HuiKui Zhou
YingHan Hong
Li Zhang
Year: 2014
The Study on the Network Security Simulation for HITLS Technology
TRIDENTCOM
Springer
DOI: 10.1007/978-3-319-13326-3_45
Abstract
Network security simulation model for HITLS technology is established, which aims to solve the problems in present network security simulation, that is, the network vulnerability and lack of network attack responses. This paper studies the implement methods of this model from the angle of basic structure, network security simulation frame and simulation controlling. The simulation environment based on network security simulation model for HITLS technology can provide fast and safe prototyping, demonstration, testing, and analysis, which evaluates the safety and performance of the equipment. By comparing the numbers of success for network communication before and after signaling and link attacking, the effectiveness of this method is verified. The model has broad application prospects.