Testbeds and Research Infrastructure: Development of Networks and Communities. 9th International ICST Conference, TridentCom 2014, Guangzhou, China, May 5-7, 2014, Revised Selected Papers

Research Article

The Study on the Network Security Simulation for HITLS Technology

Download127 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-13326-3_45,
        author={MuDan Gu and HuiKui Zhou and YingHan Hong and Li Zhang},
        title={The Study on the Network Security Simulation for HITLS Technology},
        proceedings={Testbeds and Research Infrastructure: Development of Networks and Communities. 9th International ICST Conference, TridentCom 2014, Guangzhou, China, May 5-7, 2014, Revised Selected Papers},
        proceedings_a={TRIDENTCOM},
        year={2014},
        month={11},
        keywords={HITLS technology Network security simulation Attack effect simulation},
        doi={10.1007/978-3-319-13326-3_45}
    }
    
  • MuDan Gu
    HuiKui Zhou
    YingHan Hong
    Li Zhang
    Year: 2014
    The Study on the Network Security Simulation for HITLS Technology
    TRIDENTCOM
    Springer
    DOI: 10.1007/978-3-319-13326-3_45
MuDan Gu1,*, HuiKui Zhou1, YingHan Hong2, Li Zhang1
  • 1: Nanchang Institute of Science & Technology
  • 2: Hanshan Normal University
*Contact email: 583517476@qq.com

Abstract

Network security simulation model for HITLS technology is established, which aims to solve the problems in present network security simulation, that is, the network vulnerability and lack of network attack responses. This paper studies the implement methods of this model from the angle of basic structure, network security simulation frame and simulation controlling. The simulation environment based on network security simulation model for HITLS technology can provide fast and safe prototyping, demonstration, testing, and analysis, which evaluates the safety and performance of the equipment. By comparing the numbers of success for network communication before and after signaling and link attacking, the effectiveness of this method is verified. The model has broad application prospects.