The design and implementation of a network simulation platform

S. Von Solms, S. W. Peach

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Network security risks are becoming an increasing threat as new network attack methods are constantly being developed by hackers to compromise secure networks and devices. The use of a network simulation environment that can realistically replicate these events and their effects can enable researchers to identify these threats and find ways to counter them. In this paper we present the design of a network simulation platform which can enable researchers to study dynamic behaviour of networks, network protocols, and emerging classes of distributed applications in a controlled setting under realworld conditions.

Original languageEnglish
Title of host publicationICAST 2013 - 5th International Conference on Adaptive Science and Technology
Subtitle of host publicationThe Future is Now: Adaptive Science and Technology Unbound, Proceedings
PublisherIEEE Computer Society
ISBN (Print)9781479930678
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event5th International Conference on Adaptive Science and Technology: The Future is Now: Adaptive Science and Technology Unbound, ICAST 2013 - Pretoria, South Africa
Duration: 25 Nov 201327 Nov 2013

Publication series

NameIEEE International Conference on Adaptive Science and Technology, ICAST
ISSN (Print)2326-9413
ISSN (Electronic)2326-9448

Conference

Conference5th International Conference on Adaptive Science and Technology: The Future is Now: Adaptive Science and Technology Unbound, ICAST 2013
Country/TerritorySouth Africa
CityPretoria
Period25/11/1327/11/13

Keywords

  • emulation
  • networks
  • simulation
  • virtualisation

ASJC Scopus subject areas

  • Communication
  • Computer Networks and Communications
  • Information Systems
  • Software
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'The design and implementation of a network simulation platform'. Together they form a unique fingerprint.

Cite this