检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:王磊[1] 苏命峰 WANG Lei;SU Ming-feng(Central South University,School of Computer Science and Engineering,Changsha Hunan 410083,China)
出 处:《计算机仿真》2021年第7期355-359,共5页Computer Simulation
基 金:湖南省自然科学基金资助项目(2019JJ70057)。
摘 要:为了提升虚拟EDA实验攻击过程的信息安全性,提出信息安全虚拟EDA实验攻击过程实时仿真。结合虚拟EDA实验的基本原理,构建相应的虚拟EDA实验模型,分析实验数据的信息安全情况。安装攻击模拟器设备,在虚拟EDA实验模型中选择攻击对象和攻击方式,设置网络攻击行为规则,从准备阶段、实时攻击阶段和善后处理阶段三个阶段,实现信息安全虚拟EDA实验的实时攻击过程。将设计的攻击过程实时仿真方法应用到虚拟EDA实验中,发现仿真方法应用后虚拟EDA实验信息的篡改量和丢包量有所下降,证明攻击过程实时仿真方法具有较高的应用价值。This paper puts forwards the real-time simulation of information security virtual EDA experiment attack process to improvethe information security of virtual EDA experiment attack process.According to the basic principle of virtual EDA experiment, the corresponding virtual EDA experiment model was established. For this reason, the information security of experimental data was analyzed in detail.The attack simulator was installed to select the attack object and attack mode. Network attack behavior rules were set. From three stages(preparation, real-time attack and aftertreatment), the real-time attack process of information security virtual EDA experiment was realized. After applying the designed simulation method, the amount of tampering and packet loss of virtual EDA experiment information was reduced, showing that the real-time simulation method of attack process has ideal application value.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.145.158.23