Next Article in Journal
Rapid Test Method for Multi-Beam Profile of Phased Array Antennas
Next Article in Special Issue
Robust Sliding Mode Control for Stochastic Uncertain Discrete Systems with Two-Channel Packet Dropouts and Time-Varying Delays
Previous Article in Journal
Extraction of a Weak Flow Field for a Multi-Rotor Unmanned Aerial Vehicle (UAV) Using High-Speed Background-Oriented Schlieren (BOS) Technology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cloud-Based User Behavior Emulation Approach for Space-Ground Integrated Networks

School of Artificial Intelligence and Computer Science, Jiangnan University, Wuxi 214122, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(1), 44; https://doi.org/10.3390/s22010044
Submission received: 6 December 2021 / Revised: 19 December 2021 / Accepted: 20 December 2021 / Published: 22 December 2021
(This article belongs to the Special Issue AI-Aided Wireless Sensor Networks and Smart Cyber-Physical Systems)

Abstract

:
Cyber-physical systems (CPSs) based on space-ground integrated networks (SGINs) enable CPSs to break through geographical restrictions in space. Therefore, providing a test platform is necessary for new technical verification and network security strategy evaluations of SGINs. User behavior emulation technology can effectively support the construction of a test platform. Given the inherent dynamic changes, diverse behaviors, and large-scale characteristics of SGIN users, we propose user behavior emulation technology based on a cloud platform. First, the dynamic emulation architecture for user behavior for SGINs is designed. Then, normal user behavior emulation strategy driven by the group user behavior model in real time is proposed, which can improve the fidelity of emulation. Moreover, rogue user behavior emulation technology is adopted, based on traffic replay, to perform the security evaluation. Specifically, virtual Internet Protocol (IP) technology and the epoll model are effectively integrated in this investigation to resolve the contradiction between large-scale emulation and computational overhead. The experimental results demonstrate that the strategy meets the requirement of a diverse and high-fidelity dynamic user behavior emulation and reaches the emulation scale of 100,000-level concurrent communication for normal users and 100,000-level concurrent attacks for rogue users.

1. Introduction

In recent years, cyber-physical systems (CPSs) have become a research hotspot since they make the entire system more reliable, efficient, and coordinated [1]. A CPS integrates computing, communication, and controlling systems, thus generating new ideas for studies of space-ground integrated networks [2]. However, many security problems emerge when a CPS is integrated with the space-ground integrated network (SGIN). On the one hand, security risks arise from the CPS itself. For instance, CPSs face many advanced persistent threat (APT) attacks [3], and massive user data information leads to a privacy security problem [4]. On the other hand, security risks exist in SGINs. For example, the complexity of the network structure makes it difficult to determine the source of the attack [5], and the SGIN is vulnerable to rogue program attacks during the operation of accessing and handover [6].
To resolve these security issues, many strategies have been implemented in recent years. For example, Sun et al. [3] have proposed a secure fuzzy testing approach for honeypot identification inspired by vulnerability mining to capture and predict network attacks against CPSs. In Ref. [4], the authors have effectively monitored resource access and prevented unauthorized information flow through an access control mechanism. In Ref. [7], the authors have proposed an event-based mobile vehicle cyber-physical security governance framework to achieve the goals of real-time event prediction. In Ref. [8], the authors have applied a cybersecurity knowledge graph to build an attack analysis framework for cyberattack-and-defense test platforms. In Ref. [5], the authors have constructed a cybersecurity knowledge graph for SGINs to attribute network attacks simply, effectively, and automatically. In terms of these new security strategies, providing an emulation platform is necessary for the performance testing of SGIN.
The literature related to this article can mainly be classified into three categories: the mathematical model of user behavior, the emulation of user behavior based on discrete event simulation, and the emulation of user behavior based on virtualization.
Regarding the mathematical model of user behavior, the authors in Ref. [9] have proposed a user behavior analysis method based on conversation emulation. This method used the ant colony optimization algorithm to model user behavior. However, the theoretical analysis method requires a large amount of calculation with a slow training process, which is not suitable for large-scale user behavior emulation experiments. In Ref. [10], the authors have proposed a web behavior classification model for the collective user. The user identification method based on the computer mouse dynamic behaviors has been investigated in Ref. [11]. A top-down layered method has been proposed in Ref. [12] to build a behavior traffic model in the satellite terminal. In Ref. [13], the authors have proposed a multiple-strategy differential privacy framework on STF (MDPSTF) for user traffic model analysis. In Ref. [14], the authors have proposed a GPU-accelerated parallel H-ELM to efficiently process large-scale data. It can provide support for user behavior models. The above efforts have provided a theoretical analysis basis for the user behavior emulation. However, such research cannot establish a systematic emulation of user behavior.
Regarding the emulation of user behavior based on discrete event simulation, in Ref. [15], the authors have constructed the network emulation model of the campus network and analyzed the user behavior of the networks by using the OPNET simulation platform. In Ref. [16], the authors have designed an emulation system in the wireless heterogeneous network (HetNet) based on network simulator 3 (NS3) and verified the behavior of wireless access users. Nicol [17] has proposed a hybrid discrete-continuous model that minimizes network worm’s execution time to achieve large-scale emulation of network worm behavior. The authors in Ref. [18] have proposed a multilayer network traffic model based on time-space correlation and Markov transfer to construct user groups related to traffic time and space based on OPNET. However, user behavior emulation based on discrete event simulation cannot load real business systems and traffic. Moreover, it faces certain limitations in emulation fidelity.
Regarding the emulation of user behavior based on virtualization, in Ref. [19], the authors have constructed an emulation platform for the performance evaluation of crowdsensing applications based on virtualization. In Ref. [20], the authors have proposed an estimation mechanism that is based on analyzing the interaction between user behavior and network performance and verified the effectiveness through emulation experiments based on virtualization. A network traffic generator based on container virtualization technology has been proposed in Ref. [21] to emulate users’ web crawling behavior. In Ref. [22], the authors have studied the utilization of paravirtualization techniques merged with systems management tools to build an automated emulation framework for grid experiments and validated the effectiveness and advantages through user behavior experiments. In Ref. [23], the authors have proposed a wireless data service providing framework in C-RAN aiming to provide user service in C-RAN in a more efficient way based on mobile cloud computing (MCC). The investigations mentioned above have improved the simulation fidelity. However, it is mainly oriented to the traditional Internet, and there is a lack of research on SGIN users.
User behavior emulation based on virtualization technology has been turning to the mainstream research direction. The OpenStack cloud platform, which integrates full virtualization technology (e.g., kernel virtual machine, KVM) and lightweight virtualization technology (e.g., Docker), has become a better choice for realizing user behavior emulation due to its low cost, security, flexibility, credibility, and other advantages.
Providing a realistic emulation environment of user behavior is necessary for the security technology test of the SGIN emulation platform. However, there are still problems with user behavior emulation, e.g., single-user behavior, small scale, and poor fidelity.
In this article, we propose a large-scale user behavior emulation technology in SGINs based on the OpenStack cloud platform as a multiscale virtualization technology. To meet the needs of dynamic user behavior emulation, we integrate a systems tool kit (STK) [24] with OpenStack. By utilizing STK satellite orbit model data to online drive the emulation network link state, we can dynamically control the network environment in which the user behavior emulation is located. Considering the characteristics of multiple user types and diverse behaviors, we study the emulation technology of normal user behavior based on the real-time drive of the user behavior model. Additionally, the emulation technology of rogue user behavior based on traffic replay is analyzed. To realize large-scale user behavior emulation, virtual Internet Protocol (IP) technology is adopted to achieve a single network card and multiple users. Furthermore, the epoll model is employed to improve efficiency in large-scale communication.
Overall, the main contributions of this article are summarized as follows:
  • Through the seamless integration of STK and OpenStack, the dynamic emulation needs of user behavior can be met;
  • By studying the emulation technology of normal user behavior, based on the real-time drive of the user behavior model, and rogue user behavior, based on the traffic replay, the realistic emulation of diversified user behavior is realized. A delay compensation strategy is proposed to improve replay fidelity;
  • Virtual IP technology and the epoll model are integrated effectively, which solves the problem of high resource consumption and low communication efficiency in large-scale user behavior emulation.
The rest of this article is organized as follows: Section 2 introduces the emulation system of the SGIN. In Section 3, an implementation of user behavior emulation in SGINs is proposed and analyzed. Experimental verification is carried out in Section 4. We conclude the entire article in Section 5.

2. User Behavior Emulation System for the SGIN

Interconnected and multiple heterogeneous networks form the SGIN. Its network is large in scale, complex in structure, and highly dynamic [25]. Its users include the terrestrial Internet, a mobile communication network. Access users are large in scale, diverse in behavior, and large in concurrent business [12]. Given the characteristics of SGIN users, based on the cloud platform and limited fixed computing resources, realizing the highly dynamic, diverse behavior and large-scale emulation of SGIN users remains a problem to be solved. Therefore, this paper constructs a user behavior emulation system for the SGINs to meet the above emulation requirements.
Figure 1 shows the overall architecture of the SGIN user behavior emulation system, including the STK simulation node and the OpenStack cloud platform. The STK simulation node is responsible for the data level of the entire emulation architecture and provides the source data for satellite network emulation on the OpenStack cloud platform. The OpenStack cloud platform is responsible for the control level of the entire emulation platform. After receiving the emulation data, it controls the space-ground integrated emulation network topology and satellite emulation link characteristics in real time. See Section 3.1 for the seamless integration of STK and OpenStack.
The OpenStack cloud platform includes a control node, a network node, and several computing nodes. The control node is responsible for the planning and deployment of the network topology. The network node deploys a data summary module for real-time statistical information and coordinates user emulation nodes through the behavior control module. Computing nodes use multiscale virtualization technology to create satellite emulation nodes, gateway station emulation nodes, and user emulation nodes. Among these nodes, the satellite emulation node is constructed with KVM to ensure the stability of the satellite link; the gateway station emulation node and user emulation node use Docker to reduce resource utilization. The gateway station emulation node deploys communication rules and data-collection modules. User communication traffic is forwarded through the communication rules. User behavior emulation data and resource loss information are obtained through the data-collection module and pushed to the data-summary module to realize information acquisition and analysis. The user emulation node integrates the control module, the user allocation module, the scene matching module, and the user emulation module. This node receives user behavior emulation instructions to achieve the corresponding emulation requirements. The functions of each module and instructions for how to communicate between modules are as follows:
  • Control module: The control module controls the entire procedure, including the user allocation module, the scene matching module, and the user emulation module. It is the control center for the realization of the entire user behavior emulation. After the module receives the instructions issued by the behavior control module in the network node, it controls other modules to coordinate work according to the instruction information to complete the user behavior emulation;
  • User allocation module: The user allocation module is the main body of user behavior emulation, and users adopt user identifications (IDs) as the distinguishing standard, which is the primary key in the user pool. To ensure the fidelity of users, the user attributes also include the user IP, user name, user password, etc. After the module receives the user creation instruction issued by the control module, it parses the instruction to obtain the required user information and then obtains the user’s characteristic attributes from the corresponding user pool and transfers them to the user emulation module;
  • Scene matching module: The scene matching module controls the communication mode and communication process of the emulated user. After the module receives the user behavior instruction issued by the control module, it obtains the specified user behavior model from the instruction. It selects the matching user behavior scene file and transfers it to the user emulation module;
  • User emulation module: The user emulation module is an emulation module of user behavior communication. This module personalizes the generation of user behavior by receiving the user characteristic attributes, communication scene files, frequency, time, and other transmitted information. Among this information, the normal user behavior generates protocol traffic based on the communication protocol. The Internet user uses a hypertext transfer protocol (HTTP) and a file transfer protocol (FTP) to realize web browsing and file transfer behaviors. The mobile terminal user uses SIPp, a configurable traffic generation tool that meets Session Initialization Protocol (SIP) standards, to emulate calls and short message services (SMSs). Moreover, normal user business traffic is generated according to the rules of the user behavior model. The normal user behavior model-driven strategy is presented in Section 3.2; rogue users generate rogue attack traffic based on traffic replay, and the specific implementation is presented in Section 3.3. Additionally, large-scale emulation experiments can be carried out according to the requirements, and the specific implementation is presented in Section 3.4.

3. Implementation for User Behavior Emulation of the SGIN

3.1. Seamless Integration of STK and OpenStack

STK’s satellite network calculation model can effectively describe dynamic characteristics such as network topology and link characteristics [26,27]; it can accurately analyze the performance and behavior of complex networks [28]. This network offers the advantages of simple management and high scalability. However, it cannot emulate the real protocol and business traffic. Network emulation based on the OpenStack cloud platform can run real business traffic, and the emulation results have high fidelity and scalability. However, the OpenStack cloud platform lacks the support of the related satellite network calculation model. In this regard, this paper studies the seamless integration of STK and OpenStack to realize the dynamic emulation of SGINs to meet the dynamic emulation needs of user behavior. The specific procedure is shown in Figure 2.
The STK scene control system loads the STK scene file. It sets the relevant parameters of the emulation scene in the STK, mainly including the STK scene ephemeris time, rain attenuation model, atmospheric absorption model, scene operation step length, and other parameters. Moreover, it reads the satellite network topology of the 3-dimensional (3D) global model and 2-dimensional (2D) map model in STK to generate the satellite scene topology.
Using the calculation model in the STK obtains link emulation data, and the on-off of the satellite link is calculated based on visibility modeling between objects. The satellite link delay can be calculated with Equation (1), where D is the link length, f ( t ) is a time-varying function, T is the link length change period, t d is the link delay, and c is the propagation speed of electromagnetic waves in the vacuum.
D = f ( t ) , t T t d = D c
Given the signal energy per bit E b and the power spectral density of the noise N 0 , the bit error rate (BER) of the link can be expressed as
B E R = 1 2 e r f c ( E b N 0 )
where the complementary error function e r f c ( . ) is defined as
e r f c ( x ) = 2 π x e n 2 d n
The source data of satellite link emulation in real time are pushed to computing nodes on the cloud platform at a specific time step through the cloud platform interface. The satellite network topology linkage module is responsible for parsing the satellite scene topology, including node information and network segment information. The node information mainly includes the node type, node size, and satellite mirroring type. The network segment information includes the network name and network subnet. The satellite network linkage emulation module is responsible for dynamic and real-time control of the satellite link characteristics in the cloud platform based on the satellite link emulation data, mainly including the link on-off, link delay, and link bit error rate.

3.2. Normal User Behavior Model-Driven Strategy

The user behavior model-driven strategy needs to be designed based on the theoretical model of the algorithm by extracting user information data and behavior rules, forming a description script of user behavior emulation, and driving the user behavior emulation in real time. In terms of the user behavior model, user behavior is random, and the relationship between users is independent and irrelevant. Dombry et al. [29] indicated that user behavior data traffic conforms to the Poisson distribution model, therefore this paper proposes a Poisson distribution algorithm based on random users to drive user behavior in real time. The specific implementation can be seen in Algorithm 1.
Algorithm 1: Poisson Distribution Algorithm Based on Random Users.
Input: Poisson distribution expectation: λ; Number of users: m; User behavior emulation times: n.
Output: Array of the user ID: p[1…n][1…n]
begin
1.      r a n d _ m a x   i s   i n i t i a l i z e d   t o   t h e   m a x i m u m   n u m b e r   o f   u s e r s
2.      for  i   0   to   n   by   1 do
3.       u R a n d 0 , 1   / r a n d _ m a x // generate a uniform distribution of [0, rand_max]
4.      x 0
5.      c d f e x p 1   *   λ
6.      w h i l e   u > = c d f   and     x < = m // get the number of users in this round
7.        x x + 1
8.        p d f 1
9.        f o r   j 0   to   x   by   1   d o    // update the probability
10.          p d f p d f   *   λ   /   j
11.       end for
12.        c d f c d f + p d f   *   e x p 1   *   λ
13.        for  k   0   to   x   by   1  do     // get random user IDs
14.                  while true
15.          u s e r I D m o d R a n d 0 , 1 , m + 1
16.          if   u s e r _ I D   is   not   in   p i
17.               break
18.               p i j u s e r _ I D
19.          end for
20.   end for
end

3.3. Rogue User Behavior Emulation Based on Traffic Replay

The implementation of rogue user behavior emulation technology mainly includes rogue traffic preprocessing and rogue attack emulation. Figure 3 shows the rogue traffic preprocessing process.
Once real rogue traffic is successfully obtained and preprocessed, the preconditions for rogue attack emulation have been completed. The specific rogue attack emulation flow is as follows:
  • The port is opened to monitor the rogue user emulation node. After receiving the rogue attack command, the attack parameters, including the rogue attack type, source/destination IP address, number of attacks, attack rate, and other information, are parsed;
  • According to the attack type, the qualified traffic and its related characteristic information from the rogue behavior model library are extracted. Moreover, the traffic message’s source/destination IP address and the destination Media Access Control (MAC) address are modified to the MAC address of the network card connected to the virtual router;
  • For two-way traffic, the interaction order and interaction time of the traffic need to be sent to the corresponding two rogue user emulation nodes;
  • After handling rogue traffic, we can set the number of rogue attacks and the attack rate and then replay the traffic in the rogue user behavior network.
For two-way traffic, the most critical goal is to ensure that the timing state of the data packets and the content of the message are consistent with the original traffic. This goal is also one of the most important indicators for evaluating the fidelity of the emulation. However, during the replay process, the replay effect may be affected by link delay, jitter, and replay node processing delay, causing out-of-sequence data packets. Therefore, this paper proposes a delay compensation strategy under the premise of ensuring the accuracy of the message sequence as far as possible to minimize the replay time error. The specific strategy is as follows:
Before the emulation experiment, equal numbers of traffic files with fixed intervals are set for replay. The time intervals Δ o and Δ r of each pair of adjacent packets in the original traffic and the replay traffic are compared to obtain an error average. The calculation equation is as follows:
E r r o r avg = i = 1 n ( | Δ r i Δ o i | ) n
The average error obtained is used to compensate for the original traffic. The specific operation is as follows: the sequence is traversed from the second packet in the original traffic. When the message satisfies Δ o i < E r r o r avg and has a different side from the previous message, the current message stamp T s i is compensated according to the following equation. The average error obtained is used to compensate for the original traffic.
T s i = T s i - 1 + E r r o r avg
Moreover, the timestamp of the packet is updated until the last packet. It is ensured that each packet interval is not less than the average error, thus reducing the error caused by the delay in replay delay.

3.4. Large-Scale User Behavior Emulation

Large-scale user behavior emulation puts forward requirements for large-scale user and user high concurrent communication. To solve the above technical difficulties, this paper proposes the following scheme:
  • Large-scale user implementation: To conserve limited physical resources and solve the problem that a cloud host has only one network card and can emulate only one user, this paper combines the technical idea of a single network card with multiple IPs [30]. Multiple virtual IPs are added to a cloud host to ensure that the emulated users have their independent IP addresses by expanding virtual information for the network card. With the help of a routing protocol, the destination network routing table is automatically added to the node to realize intercommunication between the virtual IP and the real IP and the virtual IP and the virtual IP on different hosts. Communication between users is achieved by establishing a transmission control protocol (TCP) connection, which is combined with the TCP connection mechanism by establishing a virtual user pool. When a user initiates a connection, the user is first retrieved from the pool, and the user information is encapsulated in a user request packet to achieve user communication;
  • User high concurrent communication implementation: To meet the high concurrent communication needs of large-scale SGIN users, the server uses the epoll model to realize the input/output (I/O) multiplexing of socket stream read-write operations and handle the concurrent communication data of large-scale users. Figure 4 shows the communication procedure based on the epoll model. Compared with the traditional select/poll mechanism, the epoll model does not need to traverse the entire monitored descriptor set. When the File Descriptor (FD) event status registered in the Epoll File Descriptor Tree (EFDT) changes, the kernel directly returns these events in the Events array, thus the epoll monitoring efficiency does not decrease significantly as the number of monitored events increases. Moreover, there is no limit to the number of events monitored. This limit is related to only system resources. The epoll model can achieve user behavior drive more efficiently, solve the numerical limit of high concurrent communications for large-scale users, and improve emulation efficiency.

4. Experiment

This paper uses an OpenStack distributed architecture as an emulation platform to build a low-cost and large-scale emulation experimental environment. The version of OpenStack is Mitaka, and the experimental environment is set as in Table 1. The satellite emulation nodes realize the transparent forwarding function of the satellite. The gateway station emulation nodes integrate communication management services. The user emulation nodes integrate user behavior function services.
An automated deployment scheme connects the emulation node to the emulation network to construct an experimental topology. The specific experimental topology is shown in Figure 5. Geo represents the high-orbit satellite; KA and KU stand for the communication satellite; Leo stands for the low-orbit satellite; Leo_Station represents the mobile terminal gateway station; Geo_Station stands for the Internet gateway station; Leo_User represents the normal mobile terminal user; Geo_User stands for the normal Internet user; and Rogue_User represents the rogue user. When automatically assigning resources, the satellite node allocates 1 virtual central processing unit (VCPU) and 1 GB of memory, the gateway station node allocates 4 VCPUs and 4 GB of memory, and the user emulation node allocates 2 VCPUs and 2 GB of memory.

4.1. Dynamic Emulation Experiment of the SGIN

In order to verify the effectiveness of the dynamic control technology proposed in this article, we select Geo_User1 and Geo_User3 from Figure 5 and then control Geo_User1 and Geo_User3 for web browsing and file transfer behavior. The user behavior traffic rate is collected on Geo_Station1 and Geo_Station2 every 1 s. At the same time, the positions of Geo_4 and Geo_5 are switched through the STK every 60 seconds.
In Figure 6, when the satellite position is not switched, the traffic data received by the gateway station is relatively stable, which means that the user’s communication behavior is proceeding normally. When Geo_4 and Geo_5 are switched, the connected Geo_User1 communication service is affected and cannot be performed for a period of time. Geo_User3 does not communicate through the satellites mentioned above, thus communication services are performed normally. As the satellite position switch is completed, Geo_User1 establishes a connection with another satellite, and communication returns to normal. Based on the above experimental results, the technology adopted in this article can realize the dynamic control of the satellite emulation network and can more realistically reproduce user communication under the SGIN.

4.2. Normal User Behavior Model-Driven Experiment

This experiment is based on the user behavior model in Section 3.2, drives the emulation node, and realizes the function of scene reproduction. We select Geo_User3, Leo_User5 and Leo_User7 from Figure 5, and 200 users are created at each node as experimental subjects. Then, each user is controlled to generate user behavior traffic satisfying the Poisson distribution expectation of 100. Finally, the number of data packets arriving at Geo_Station2 and Leo_Station3 are collected every 1 s, and the corresponding statistical analyses are carried out according to different intervals. The whole model-driven emulation experiment lasts for 100 s.
The experimental results are shown in Figure 7. Counting the number of data packets per second in the 90–110 interval as the most frequent, the user behavior model law conforms to the Poisson distribution law. The above experimental results show that the user behavior model-driven strategy studied in this paper can effectively drive emulation nodes and realistically reproduce user communication scenes.

4.3. Rogue User Behavior Emulation Experiment

We select Abn_User1 and Geo_User1 from Figure 5. Furthermore, Rogue_User1 is controlled to carry out rogue attacks involving the Worm virus and the Trojan horse virus on Geo_User1. In addition, the snort is installed on satellite node KA in the topology to detect rogue traffic. For different types of rogue traffic, corresponding rule files are added to establish the characteristics of traffic packets. Finally, the number of rogue attacks in a single experiment is set as 10,000, and the number of experiments is ten times. Moreover, the warning rate is quantified. The experimental results are shown in Figure 8. The warning rate of rogue user behavior realized by the method in this paper is above 95%. The average warning rate of the Worm virus is 97.1% and that of the Trojan horse virus is 98.1%.
At the same time, in order to verify the effectiveness of the delay compensation strategy proposed in this paper, five sets of rogue traffic files are replayed between Rogue_User3 and Rogue_User4. The numbers of these data packets are 20,000, 50,000, 100,000, 200,000, and 300,000. The time error value obtained is compared with the time error value generated by the traffic replay software Tcpreplay [31].
The experimental results are shown in Figure 9. With the increase in data packets, the error of replay through Tcpreplay gradually increases. The error of the method used in this paper is maintained at a low level, which shows that the method of this paper has certain advantages in replay fidelity compared with the Tcpreplay replay method.
It can be observed from the experimental results that the method studied in this paper can achieve high-fidelity emulation of rogue user behavior. At the same time, it can provide environmental support for SGIN security evaluations.

4.4. Large-Scale Emulation Experiment of User Behavior

The communication system in the real environment needs to provide services for large-scale users and experimental support for constructing the SGIN, thus the emulation platform should have abilities suitable for large-scale experiments. In this paper, large-scale emulation experiments are carried out for normal user behavior. Based on the emulation topology built in Figure 5, large-scale emulation users are created and deployed on multiple normal user nodes, 1000 users are created every second, and such users are driven to generate various behavior traffic. The number of concurrent users in a period is counted by collecting communication traffic in the gateway station. Considering the pressure for the server by large-scale user concurrent communication, the memory consumption of the gateway is based on real-time statistics.
The experimental results are shown in Figure 10. As the number of concurrent users gradually increases, the communication demand pressure of the gateway station gradually increases, and the corresponding memory consumption increases accordingly. When the number of concurrent users reaches a stable value, the memory consumption of the gateway station tends to become stable.
At the same time, the communication network may encounter large-scale rogue attacks, therefore it is necessary to conduct large-scale rogue attack emulation experiments. The emulated users are deployed on rogue user nodes, 1000 users are created every second, and then the rogue users are driven to launch attacks on the normal user nodes. Finally, the concurrent number of rogue attacks within a period is collected from the attacked node. The experimental results are shown in Figure 11. With increasing time, the number of concurrent attacks by the Worm virus and the Trojan horse virus can reach 100,000.
The experimental results show that the method designed in this paper can meet the emulation scale of 100,000-level concurrent communication for normal users and 100,000-level concurrent attacks for rogue users.

4.5. Discussion

The results of the dynamic emulation experiment in Section 4.1 show that our emulation environment can achieve the real-time emulation of satellite networks, which can meet the requirements of user behavior emulation. The second experiment in Section 4.2 indicates that the proposed model-driven strategy conforms to the law of the Poisson distribution model, which shows that the strategy can effectively reproduce the user communication scene and improve the emulation fidelity. The third experiment in Section 4.3 on rogue user behavior emulation shows that the traffic replay technology proposed in this paper can realize the fidelity reproduction of rogue virus attacks to provide environmental support for security evaluation. The final experiment in Section 4.4 shows that the virtual IP technology can generate large-scale users, and the epoll model is applied to solve the problem of low communication efficiency in large-scale user behavior emulation.

5. Conclusions

With the background of SGINs and CPSs, this paper has proposed an emulation method for large-scale user behavior based on the cloud platform. It has built a user communication environment for SGINs. Dynamic control of the satellite network environment has been achieved through STK. The user behavior model has been adopted to drive business traffic generation, and the rogue attacks have been realistically reproduced through the traffic replay technology.
However, due to the lack of investigation and research on the security issues of the emulation platform, the emulation platform proposed in this paper still faces many security threats. Given the problem, our future research will enhance the security of SGINs via other novel approaches based on the user communication environment and rogue attack environment constructed in our investigation.

Author Contributions

Conceptualization, L.T. and X.W.; methodology, L.T.; software, L.T.; validation, L.T.; writing—original draft preparation, Y.L. and J.W.; writing—review and editing, L.T.; project administration, X.W.; funding acquisition, X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (grant Nos. 61972182 and 62172191) and the National Key R&D Program of China (grant No. 2016YFB0800305).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors are grateful to Chen Xin Yu for her help with the preparation of figures in this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Olowononi, F.; Rawat, D.; Liu, C. Resilient machine learning for networked cyber physical systems: A survey for machine learning security to securing machine learning for cps. IEEE Commun. Surv. Tutor. 2020, 23, 524–552. [Google Scholar] [CrossRef]
  2. Kak, A.; Akyildiz, I. Towards automatic network slicing for the internet of space things. In IEEE Transactions on Network and Service Management; IEEE: New York, NY, USA, 2021. [Google Scholar] [CrossRef]
  3. Sun, Y.; Tian, Z.; Li, M.; Su, S.; Du, X.; Guizani, M. Honeypot Identification in Softwarized Industrial Cyber–Physical Systems. IEEE Trans. Ind. Inform. 2020, 17, 5542–5551. [Google Scholar] [CrossRef]
  4. Qiu, J.; Tian, Z.; Du, C.; Zuo, Q.; Su, S.; Fang, B. A Survey on Access Control in the Age of Internet of Things. IEEE Internet Things J. 2020, 7, 4682–4696. [Google Scholar] [CrossRef]
  5. Zhu, Z.; Jiang, R.; Jia, Y.; Xu, J.; Li, A. Cyber Security Knowledge Graph Based Cyber Attack Attribution Framework for Space-ground Integration Information Network. In Proceedings of the 18th International Conference on Communication Technology (ICCT), Chongqing, China, 8–11 October 2018; pp. 870–874. [Google Scholar]
  6. Li, F.; Yin, L.; Wu, W.; Zhang, L.; Shi, G. Research status and development trends of security assurance for space-ground integration information network. J. Commun. 2016, 37, 156. [Google Scholar]
  7. Xue, L.; Peng, J.; Guan, X.; Ma, X. Integrated security of cyber-physical vehicle networked systems in the age of 5G. Sci. Sin. Inf. 2019, 49, 1640–1658. [Google Scholar] [CrossRef]
  8. Qi, Y.; Jiang, R.; Jia, Y.; Li, A. Attack Analysis Framework for Cyber-Attack and Defense Test Platform. Electronics 2020, 9, 1413. [Google Scholar] [CrossRef]
  9. Loyola, P.; Rom, P.; Vel, J. Clustering-based learning approach for ant colony optimization model to simulate web user behavior. In Proceedings of the Conferences on Web Intelligence and Intelligent Agent Technology, Lyon, France, 22–27 August 2011; pp. 457–464. [Google Scholar]
  10. Liu, H.; Wang, S.; Wei, Y.; Wang, B. A novel classification model of collective user web behaviour based on network traffic contents. IET Networks 2021, 10, 173–184. [Google Scholar] [CrossRef]
  11. Wang, B.; Liu, H.; Wang, K.; Xin, G.; Song, J. Research Notes: User Identification Model Based on Mouse Behaviors. Int. J. Softw. Eng. Knowl. Eng. 2018, 28, 175–192. [Google Scholar] [CrossRef]
  12. Feng, S.; Zhu, H.; Lu, G. Dynamic modeling and simulation for LEO satellite networks. In Proceedings of the 11th International Conference on Communication Technology, Hangzhou, China, 10–12 November 2008; pp. 37–40. [Google Scholar]
  13. Wang, J.; Han, H.; Li, H.; He, S.; Sharma, P.K.; Chen, L. Multiple Strategies Differential Privacy on Sparse Tensor Factorization for Network Traffic Analysis in 5G. IEEE Trans. Ind. Inform. 2021, 18, 1939–1948. [Google Scholar] [CrossRef]
  14. Chen, C.; Li, K.; Ouyang, A.; Tang, Z.; Li, K. GPU-Accelerated Parallel Hierarchical Extreme Learning Machine on Flink for Big Data. IEEE Trans. Syst. Man, Cybern. Syst. 2017, 47, 2740–2753. [Google Scholar] [CrossRef]
  15. Zhu, K.Y.; Liu, J.Y.; Gao, X.F.; An, Y.L.; Xiong, Q. Campus Network Upgrade and Optimization Based on OPNET. Appl. Mech. Mater. 2012, 263–266, 1356–1359. [Google Scholar] [CrossRef]
  16. Zhao, Y.; Yu, H.; Liang, G. NS3-based simulation system in heterogeneous wireless network. In Proceedings of the 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), Shanghai China, 21–23 September 2015; pp. 1–6. [Google Scholar]
  17. Nicol, D.M. Efficient simulation of Internet worms. ACM Trans. Model. Comput. Simul. 2008, 18, 1–32. [Google Scholar] [CrossRef]
  18. Fan, L.; Deng, Z.; Wang, K.; Lin, W.; Li, Z.; Yu, X.; Chen, J. Simulation and Analysis of Heterogeneous Traffic of Space-Ground Integrated Information Network Based on OPNET. In Proceedings of the 2nd Information Communication Technologies Conference (ICTC), Nanjing, China, 7–9 May 2021; pp. 145–149. [Google Scholar]
  19. Rege, M.; Handziski, V.; Wolisz, A. Crowdmeter: An emulation platform for performance evaluation of crowd-sensing applications. In Proceedings of the ACM conference on Pervasive and ubiquitous computing adjunct publication, Zurich, Switzerland, 8–12 September 2013; pp. 1111–1122. [Google Scholar]
  20. Wang, B.; Tay, Y.; Golubchik, L. Resource Estimation for Network Virtualization through Users and Network Interaction Analysis. In Proceedings of 21st International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems, San Francisco, CA, USA, 14–16 August 2013; pp. 434–443. [Google Scholar]
  21. Fujdiak, R.; Uher, V.; Mlynek, P.; Blazek, P.; Slacik, J.; Sedlacek, V.; Misurec, J.; Volkova, M.; Chmelar, P. IP traffic generator using container virtualization technology. In Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Moscow, Russia, 5–9 November 2018; pp. 1–6. [Google Scholar]
  22. Calheiros, R.; Storch, M.; Alexandre, E.; De Rose, C.; Breda, M. Applying virtualization and system management in a cluster to implement an automated emulation testbed for grid applications. In Proceedings of the 20th International Symposium on Computer Architecture and High Performance Computing, Campo Grande, Brazil, 29 October–1 November 2008; pp. 97–104. [Google Scholar]
  23. Luo, Y.; Yang, K.; Tang, Q.; Zhang, J.; Li, P.; Qiu, S. An optimal data service providing framework in cloud radio access network. EURASIP J. Wirel. Commun. Netw. 2016, 2016, 1. [Google Scholar] [CrossRef] [Green Version]
  24. Systems Tool Kit. Available online: https://agi.com/products/stk (accessed on 5 December 2021).
  25. Yao, H.; Wang, L.; Wang, X.; Lu, Z.; Liu, Y. The Space-Terrestrial Integrated Network: An Overview. IEEE Commun. Mag. 2018, 56, 178–185. [Google Scholar] [CrossRef]
  26. Wang, X.; Chen, X.; Ye, H.; Liu, Y.; Zhang, G. Cloud-Based Experimental Platform for the Space-Ground Integrated Network. Wirel. Commun. Mob. Comput. 2020, 2020, 1–20. [Google Scholar] [CrossRef]
  27. Qi, J.; Li, Z.; Liu, G. Research on coverage and link of multi-layer Satellite Network based on STK. In Proceedings of the 10th International Conference on Communications and Networking in China (ChinaCom), Shanghai, China, 15–17 August 2015; pp. 410–415. [Google Scholar]
  28. Yin, M.; Li, J.; Wang, X.; Baoyin, H. A rapid method for validation and visualization of agile Earth-observation satellites scheduling. Astrodynamics 2018, 2, 325–337. [Google Scholar] [CrossRef]
  29. Dombry, C.; Kaj, I. The on–off network traffic model under intermediate scaling. Queueing Syst. 2011, 69, 29–44. [Google Scholar] [CrossRef] [Green Version]
  30. Sharma, D.; Kim, D.; Yoon, S.; Lim, H.; Cho, J.; Moore, T. FRVM: Flexible random virtual IP multiplexing in software-defined networks. In Proceedings of the 17th IEEE International Conference on Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 579–587. [Google Scholar]
  31. Masumi, K.; Han, C.; Ban, T.; Takahashi, T. Towards Efficient Labeling of Network Incident Datasets Using Tcpreplay and Snort. In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, New York, NY, USA, 26–28 April 2021; pp. 329–331. [Google Scholar]
Figure 1. Emulation architecture of the SGIN user behavior.
Figure 1. Emulation architecture of the SGIN user behavior.
Sensors 22 00044 g001
Figure 2. STK dynamic control satellite emulation network flow chart.
Figure 2. STK dynamic control satellite emulation network flow chart.
Sensors 22 00044 g002
Figure 3. Rogue traffic preprocessing flow chart. The real traffic is filtered, split, and other operations; the rogue traffic and its characteristic information are stored in the rogue behavior model library.
Figure 3. Rogue traffic preprocessing flow chart. The real traffic is filtered, split, and other operations; the rogue traffic and its characteristic information are stored in the rogue behavior model library.
Sensors 22 00044 g003
Figure 4. Epoll model communication flow chart.
Figure 4. Epoll model communication flow chart.
Sensors 22 00044 g004
Figure 5. Experimental topology. It contains 20 low-orbit satellites, 6 high-orbit satellites, 2 communication satellites, 4 Internet user groups, 8 mobile terminal user groups, 4 rogue user groups, 2 Internet gateway stations, and 4 mobile terminal gateway stations.
Figure 5. Experimental topology. It contains 20 low-orbit satellites, 6 high-orbit satellites, 2 communication satellites, 4 Internet user groups, 8 mobile terminal user groups, 4 rogue user groups, 2 Internet gateway stations, and 4 mobile terminal gateway stations.
Sensors 22 00044 g005
Figure 6. Dynamic emulation experiment of user behavior under STK control. The above experimental data measures the change in the rate of user request traffic received by Geo_Station1 as the server in the dynamic switching situation; the following experimental data measures the change in the rate of user request traffic received by Geo_Station2 as the server in the non-switching situation.
Figure 6. Dynamic emulation experiment of user behavior under STK control. The above experimental data measures the change in the rate of user request traffic received by Geo_Station1 as the server in the dynamic switching situation; the following experimental data measures the change in the rate of user request traffic received by Geo_Station2 as the server in the non-switching situation.
Sensors 22 00044 g006
Figure 7. Statistical histogram of the number of access successes for normal user behaviors. (a) Internet user; (b) Mobile terminal user. The statistical histogram is obtained by counting the number of data packets reached per second and then dividing according to the number interval.
Figure 7. Statistical histogram of the number of access successes for normal user behaviors. (a) Internet user; (b) Mobile terminal user. The statistical histogram is obtained by counting the number of data packets reached per second and then dividing according to the number interval.
Sensors 22 00044 g007
Figure 8. Emulation experiment of rogue virus attack based on traffic replay. The success rate of worm and Trojan virus attack emulation is calculated by the number of warnings generated by snort.
Figure 8. Emulation experiment of rogue virus attack based on traffic replay. The success rate of worm and Trojan virus attack emulation is calculated by the number of warnings generated by snort.
Sensors 22 00044 g008
Figure 9. Comparison of the average error between the method in this paper and the Tcpreplay replay method.
Figure 9. Comparison of the average error between the method in this paper and the Tcpreplay replay method.
Sensors 22 00044 g009
Figure 10. Large-scale emulation experiment on normal user behavior. (a) Internet user; (b) Mobile terminal user.
Figure 10. Large-scale emulation experiment on normal user behavior. (a) Internet user; (b) Mobile terminal user.
Sensors 22 00044 g010
Figure 11. Large-scale emulation experiment on rogue user behavior.
Figure 11. Large-scale emulation experiment on rogue user behavior.
Sensors 22 00044 g011
Table 1. OpenStack nodes configuration information.
Table 1. OpenStack nodes configuration information.
NodeCPUMemory
Control nodeIntel(R)Xeon(R)CPU E5-2620 v4 × 264 GB
Network nodeIntel(R)Xeon(R)CPU E5-2609 v3 × 216 GB
Computing node 1Intel(R)Xeon(R)CPU E5-4607 v2 × 432 GB
Computing node 2Intel(R)Xeon(R)CPU E5-2620 v2 × 232 GB
Computing node 3Intel(R)Xeon(R)CPU E5-2620 v2 × 232 GB
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Tao, L.; Wang, X.; Liu, Y.; Wu, J. Cloud-Based User Behavior Emulation Approach for Space-Ground Integrated Networks. Sensors 2022, 22, 44. https://doi.org/10.3390/s22010044

AMA Style

Tao L, Wang X, Liu Y, Wu J. Cloud-Based User Behavior Emulation Approach for Space-Ground Integrated Networks. Sensors. 2022; 22(1):44. https://doi.org/10.3390/s22010044

Chicago/Turabian Style

Tao, Leiting, Xiaofeng Wang, Yuan Liu, and Jie Wu. 2022. "Cloud-Based User Behavior Emulation Approach for Space-Ground Integrated Networks" Sensors 22, no. 1: 44. https://doi.org/10.3390/s22010044

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop