The development of the Network Emulation and Simulation Laboratory is motivated by the drive to contribute to the enhancement of the security and resilience of South Africa's critical information infrastructure. The goal of the Network Emulation and Simulation Laboratory is to bring together researchers and industry experts to address cybersecurity challenges through the development if cybersecurity technologies, tools and the techniques for the protection of critical information infrastructure. The laboratory will consist of developed network emulation and simulation software with capabilities specifically aimed at ease of use, easy access and scalability. The laboratory is designed to be accessible from various research institutions where researchers can utilize the experimentation platform to drive developments in the theory and practice of cybersecurity. This paper discusses the planning of the Network Emulation and Simulation Laboratory aimed at researchers at academic institutions in South Africa to study and address critical security weaknesses, discover solutions for cybersecurity threats and deliver innovative and tested technologies.
Reference:
Von Solms, S. and Van Heerden, R.P. The design of a network emulation and simulation laboratory. In: Proceddings of the 9th International Multi-conference on Society, Cybernetics and Informatics (IMSCI), Orlando, Florida, USA, 12-15 July 2015, 6pp
Von Solms, S., & Van Heerden, R. P. (2015). The design of a network emulation and simulation laboratory. http://hdl.handle.net/10204/8825
Von Solms, S, and Renier P Van Heerden. "The design of a network emulation and simulation laboratory." (2015): http://hdl.handle.net/10204/8825
Von Solms S, Van Heerden RP, The design of a network emulation and simulation laboratory; 2015. http://hdl.handle.net/10204/8825 .
The 9th International Multi-conference on Society, Cybernetics and Informatics (IMSCI), Orlando, Florida, USA, 12-15 July 2015. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website