Font Size: a A A

Network Security Simulation Research Based On Hardware-in-the-loop Simulation

Posted on:2010-08-10Degree:MasterType:Thesis
Country:ChinaCandidate:Y TangFull Text:PDF
GTID:2178360278480849Subject:Military Equipment
Abstract/Summary:PDF Full Text Request
The researches of network security, especially of the network attack and defense need to be presented and tested under the situation of the net being attacked and destroyed, which is difficult and dangerous to realize. For its advantage of security,economy and recurrence, the technology of simulation becomes an important instrument on researching network security. While the software simulation has problems such as hard to establish model and lack of response of application layer, hardware-in-the-loop network simulation is a new method in network security research. So in this paper, this method will be utilized to research the simulation of network security.Firstly, the basic theory, realization form and main charactors of hardware-in-the-loop network simulation are summarized, ad well as some key points are dicussed on the basis of formalization-describing of the three methods of network simulation.Secondly, a network security simulation model based on hardware-in-the-loop simulation (HILS) is proposed in this paper, which includes the basic framework of model, simulation process and basic application. As emphases, the attack & defense platform and HILS realizing methods in OPNET of network security testing simulation-subsystem are deeply researched.Finally, a HILS platform for network attack is designed and realized, which includes attack programmes, monitor programmes and OPNET inside attack checking model. Then, an ARP attack simulation experiment is undertaken on this platform, in which the experimenters can play roles in the simulation, so they can both visually feel the attack effect to qualitatively analyze the attack, and collect the statistics to quantitatively analyze it.
Keywords/Search Tags:Hardware-in-the-loop Simulation, Network Security, Simulation Model, OPNET, ARP Attack Simulation
PDF Full Text Request
Related items