STEMM Institute Press
Science, Technology, Engineering, Management and Medicine
Application of Digital Twin Technology in Campus Network Security
DOI: https://doi.org/10.62517/jike.202404308
Author(s)
Gang Li1,*, Kun Sha2, Hai Fu1, Yaowen Sun1
Affiliation(s)
1Naval Submarine Academy, Qingdao, Shandong, China 2Naval Medical University, Shanghai, China *Corresponding Author.
Abstract
With the popularization of computer networks, information resources have been shared to the greatest extent possible, and the construction of campus networks in colleges and universities has been paid more and more attention to, and campus networks are an important component of computer networks, which are developing very rapidly. The construction of campus network can provide convenient network services to teachers and students as well as administrators on campus, but at the same time, it is also subject to many network security threats, resulting in serious consequences such as student information leakage. This paper analyzes the application of digital twin technology in campus network security management, especially in the security risk assessment and attack detection and response module, the digital twin model shows powerful data processing and intelligent analysis capabilities, not only real-time analysis of network traffic, user behavior and device status, but also timely detection and response to network security events. The digital twin technology builds a safer, smarter and more dynamic campus network environment for teachers and students.
Keywords
Campus Networks; Network Security; Digital Twins, Risk Assessment; Attack Detection
References
[1] Wu Jianli, Yang Hua, Zhang Liang. Research and application implementation of cross-campus campus network IPv6 security based on HCL simulation. Journal of Hangzhou Normal University (Natural Science Edition), 2019, 22(3): 319-328. [2] Miller P.Inoue. Acollaborative Intrusion Detection System. Fuzzy Information Proeessing Societ, IEEE, 2003.519-524. [3] Luo Xi. Research and application of Campus Network security system [4] Tang Wenchun, Xu Qin, Lv Yunshan, Liu Ling. Application of digital twin technology in campus network security. Integrated Circuit Applications. 2024, 41(7), 360-361. [5] Hu Yuanjun. Research and application of campus network security risk assessment method. SCIENCE & TECHNOLOGY INFORMATION. 2024, 12, 19-21 [6] Cai Xinchun. Research and implementation of campus network security prevention technology. Hefei: Hefei University of Technology, 2014. 06 [7] Xie Zhijian, Xie Dongqing, Zhou Zhouyi. VPN virtual private network architecture based on IP packet encryption. Computer Engineering, 2012, (3): 45-46. [8] Qian Minye. Research on campus network security control strategy. Hebei University of Technology, 2017. [9] Rosene, Rekhtery. BGP/MPLS VPNs. IETF RFC 2547. 2012, 3. [10] Stalling W. Cryptography and Network Security: Principles and Practice. (Second Edition) Prentice-hall Inc, 2013, 212-216. [11] By Bruce Schneier. Translated by Wu Shizhong et al. Applied Cryptography. Beijing: China Machine Press, 2000, 115-119. [12] Zou Changchun, Gong Weibo, Donald Towsley. Code red worm propagation modeling and analysis. ACM Conference on Computer and Communications Security, 2002: 321-322. [13] Grieves M. Grieves M. Digital twin: manufacturing excellence through virtual factory replication. White paper, 2014, 1(2014): 1-7. [14] Tao Fei, Liu Weiran, Liu Jianhua, et al. Exploration of digital twin and its application. Computer Integrated Manufacturing Systems, 2018, 24(1): 1-18. [15] Tao Fei, Liu Weiran, Zhang Meng et al. Digital twin five-dimensional model and ten fields of application. Computer Integrated Manufacturing System, 2019, 25(01): 1-18. [16] Nie Ronmei, Zhou Xiaoya, Xiao Jin et al. Digital twin technology review analysis and development prospects. Total Aerospace Technology, 2002, 6(01): 1-6.
Copyright @ 2020-2035 STEMM Institute Press All Rights Reserved