Research on the Path of Improving Network Attack and Defense Ability of Students in Applied Colleges and Universities Based on Information Security Technology
Published Online: Jun 05, 2025
Received: Dec 30, 2024
Accepted: Apr 21, 2025
DOI: https://doi.org/10.2478/amns-2025-1051
Keywords
© 2025 Bowei Ge, Yueping Deng and Jiaxin Ren, published by Sciendo.
This work is licensed under the Creative Commons Attribution 4.0 International License.
With the rapid development of big data and cloud computing, especially after the exposure of the Prism Gate incident in the United States, it indicates that the situation in the field of network security has become more severe and complex. China has in recent years introduced information security protection regulations in various fields, involving basic information networks such as telecommunication networks, broadcasting and television networks, and the Internet, as a way to improve the ability to prevent attacks, tampering, and stealing [1-3]. Attack and defense technology as the core skills of network security, it is urgent to cultivate talents who can utilize the existing mainstream technology of information security for network attack and prevention [4-5]. In addition, the demand of enterprises for technicians in this direction is increasing dramatically. Therefore, it is necessary to set up a network attack and defense experimental course, which aims to cultivate students to master the basic knowledge framework in the direction of network and information security, and to have actual network attack, forensic analysis and security protection practical technical ability [6-8].
As the discipline of network attack and defense is characterized by rapid technological update and complicated cross-disciplinary knowledge system, the theory involved covers many aspects such as mathematics, communication technology, cryptography and computer technology. Therefore, our university has also faced this considerable challenge since the introduction of this course [9]. After the discussion of pedagogical activities in the Department of Information Security, active communication with students in general, as well as through the analysis of the course laboratory report, it was found that the network attack and defense experimental teaching faces the problems of failing to mobilize the students’ enthusiasm for learning, demonstration lectures are more than students’ hands-on experiments, and the lack of effective methods of experimental examination and so on [10-12]. In view of the above problems, the teaching mode of network attack and defense experiment is in urgent need of rectification. First of all, the choice of textbooks should be from the selection of the publication time of the newer course materials, so that students can master the cutting-edge technical knowledge, and further improve the quality of teaching [13-15]. Secondly, the arrangement of the theoretical explanation time should be less than the students’ own hands-on time, but it can not affect the complete explanation of the content. Then we should stimulate students’ interest and curiosity in this course, cultivate students’ innovation ability, analysis and problem solving ability, so that they can meet the technical requirements of enterprises for network attack and defense technicians [16-18].
Cybersecurity is a combination of conceptual and practical courses, mainly containing network fundamentals and network attack and penetration techniques, and the common method used in training programs is to utilize network ranges for training professionals and practical exercises [19-21]. The cyber range can simulate a variety of real network environments, and completing specific offensive and defensive tasks can well exercise the practical ability of students, but the cyber range focuses more on the cultivation of practical ability, which requires students to have certain professional skills, which undoubtedly raises the threshold for entry for a college student or beginner who has just started to contact the attack and defense of the network, and it takes a high cost to build a real attack and defense platform [22-25]. Therefore, it is necessary to explore a scientific and reasonable network attack and defense teaching path to support students to observe, analyze and verify the underlying principles of network attack and defense, so that students can learn to use, improve their learning interest, get started quickly, and provide environmental support for the cultivation of network security talents [26-28].
Literature [29] analyzes the smart grid cybersecurity problem across the network and conceptualizes an abstract and unified state space framework to generalize the cyber-physical attack and defense models, and discusses in depth the current advanced cyber information defense models. Literature [30] conceptualizes a stealthy jamming strategy based on deep learning algorithms to jam Zigbee traffic, effectively reducing the negative impact of cross-technology jamming while providing better stealth. Literature [31] systematically reviews the research on intelligent transportation network attack and defense systems and provides valuable insights into the integration of artificial intelligence, autonomous attack and defense systems and intelligent transportation models. Literature [32] dialectically analyzes the network security attack and defense countermeasures based on machine learning algorithms, and focuses on the potential risks of this technical solution, which makes a positive contribution to the research and practice of adversarial learning in network security. Literature [33] analyzes the problems related to distributed denial-of-service (DDoS) attacks in software-defined networks (SDN), and summarizes the key security implications of SDN and the cutting-edge research and practice of SDN security technology, in order to provide decision-making reference for stakeholders. The above research examines and analyzes the current research and practice of network security attack and defense, and deepens the understanding of the future development and practice of network security attack and defense technology, which also provides some important insights and references for the teaching and cultivation of network security attack and defense technology talents.
The research on the theme of network security attack and defense teaching reform and innovation mainly involves, the transformation of teaching strategies, such as the introduction of network attack teaching strategies, focusing on practice and hands-on, and the empowerment of information technology tools, such as virtual reality technology simulation practice platforms, convenient isolation of network security hands-on equipment and so on. Literature [34] proposes to promote school-enterprise cooperation to build a network security crime attack and defense research laboratory to promote the cultivation of high-quality network security professional applied talents, and looks forward to the future of school-enterprise cooperation in talent cultivation. Literature [35] examines the obstacles of teachers’ network security attack and defense education, and proposes the introduction of portable isolation equipment has assisted network security attack and defense teaching. Literature [36] reveals that the current network security defense teaching mode is too concerned about the defensive aspects of teaching, unable to effectively respond to modern security attacks, and focuses on the analysis of virtual reality technology in the data asset attack and defense research. Literature [37] suggests that the introduction of network security attack strategies into network security attack and defense teaching is more capable of cultivating high-quality and professional network security attack and defense talents, but the related ethical issues need to be emphasized and prevented. Literature [38] describes that the virtual laboratory plays an important role in the teaching of network attack and defense courses, which can effectively stimulate students’ enthusiasm for learning network attack and defense security while cultivating their practical ability. Literature [39] describes that traditional network security course teaching focuses on theory and ignores practice, and tries to use Emulab to create a controllable, convenient and rapidly deployable security network practice platform for students to improve students’ network security attack and defense practice ability. These pedagogical innovations and reforms have contributed to the quality improvement of cyber security and defense teaching to a certain extent, but the above studies are limited to a certain school and a certain class, and there is still a need to further explore the path to improve the effectiveness of cyber security and defense education with universal applicability.
The main research objective of this paper is to simulate the network attack and defense game for students in colleges and universities through information security technology and to design a network protection system to improve the student network attack and defense capabilities in colleges and universities. For the complexity of student networks, topology extraction of network features is carried out using three methods: degree distribution, average path length and clustering coefficient. According to the topological characteristics of the student network in universities, the WS model is identified as the initial network for the attack and defense simulation, and the “randomized reconnection” rule is abandoned, and the connecting edges in the original network are fixed and “randomized edge addition” is carried out, so as to construct the NW small world network model for the attack and defense simulation. Network model. Based on this model, a network information security protection system can be designed to simulate attack and defense games, including information security assessment, intrusion feature extraction, network access mechanism and other functions. The model is applied to carry out attack and defense simulation experiments to verify the effect of attack and defense capability enhancement, and finally gives the path of attack and defense capability enhancement for high school students’ networks.
Student information network in higher education is a kind of complex network. In order to better parse the structure of this network, this paper uses the following statistical properties to extract features from the student network.
In an undirected network, the degree is defined as the number of connected edges of the node with other nodes in the network, i.e., the number of nodes with path length 1 to this node. Denote the degree of node
Where
In directed networks, edges are considered as vectors with starting and ending points, and the sum of edges ending at a node is called the in-degree of the node, and vice versa, the sum of edges starting at this node is called the out-degree of the node, which are denoted by
In a weighted undirected network, the degree is defined as the strength of a node,
Similarly, in a weighted directed network, the intensity of node
Due to the large size of the actual network, the degree of individual nodes does not portray some of the properties of the network well, so the degree distribution is introduced to capture the overall nature of the degree. The degree distribution is the number of nodes in a specific network with a particular degree value of
The length of the shortest path between two points in a network is called the distance between these two nodes. However the number of shortest paths between two points is estimated to be multiple, but the distance is certain. The mean of the sum of the distances between all pairs of nodes is the average path length of the network
Network connectivity is a necessary condition for the above equation to hold. If the network is not connected, the result obtained from the above equation will become infinite, and in order to more conveniently represent the average path length
Although many of the actual network nodes are numerous and structurally complex, their
In a real network, there may also be connections between the neighbors of node
Where
0 ≤
There are a variety of models that can be used for network simulation, and in this paper, model selection is based on an analysis of the following models.
There are three main types of common regular networks: global coupling networks, nearest neighbor coupling networks, and star coupling networks [41].
Globally coupled network: every node has a connecting edge to the remaining Nearest-neighbor coupling network: each node is connected to only Star-coupled network: In a network with
In order to model the properties of real networks, the ER stochastic model has been proposed with the construction algorithm:
Given Randomly select two unlike nodes that are not connected to each other and generate a random number
The average path length of the ER network is
Many actual networks, despite their large number of nodes and complex structure, not only do not have large average path lengths, but also have relatively small clustering coefficients. Both ER random networks and nearest-neighbor coupling networks do not have the “small average path length” and “large clustering coefficient” characteristics of real networks.
The WS model improves on the shortcomings of the above model with the following construction algorithm:
Generate a regular graph: Generate a regular network with the number of nodes Random reconnection: select each edge in the network in turn, keep one of the endpoints of the selected edge unchanged, and then randomly select one of the remaining nodes in the network as the second endpoint of this edge, and reconnect between these two nodes with probability
In this paper, we improve the WS model based on the WS model to construct the NW small-world network model, and its construction algorithm is as follows:
Given a rule graph: generate a rule network with the number of nodes Randomize edge addition: first randomly select
The WS small world network clustering coefficient is:
The NW small world network clustering coefficient is:
The average path length for both WS and NW models can be approximated as:
The WS small world network degree distribution is:
If
If
The improved model discards the original rule of “randomized reconnection”, and replaces it with fixing the connecting edges in the original regular network, and directly adds “randomized edges” in it, which can simultaneously satisfy the two characteristics of the real network, and realize the attack and defense simulation of the student network [43].
In the process of designing the network information security protection system based on attack and defense game, the information security risk should be assessed regularly, and the inevitable connection between different network information risks should be reasonably assessed, and the relationship between the network information risk assessment elements is shown in Fig. 1, which includes the security threat, information vulnerability, riskiness, security and other links.

Relationship of network information risk assessment elements
Through the above analyzed contents, the system will control the hidden dangers of network information security risks by calculating the value of loss generated after encountering the threat of external factors, and the calculation formula is shown in Equation (15):
In equation (15),
According to Eq. (15), the attack and defense game model is used to predict the attack behaviors used by attackers in the future, comprehensively analyze the important factors affecting the network security threat, and scientifically assess the network security risk, and the calculation formula is shown in Eq. (16):
In Eq. (16),
It is necessary to comprehensively study the characteristics of network intrusion, determine the security coefficients of network information specifically generated, use anomaly detection means to count the contents of the user’s session, and calculate the coincidence degree of the different ways of intrusion. Therefore, when extracting network intrusion data, it is necessary to operate according to the following requirements:
Describe the user’s daily behavior and analyze various measurement information into the measurement by vector analysis method. Actively analyze various intrusion information, measure relevant weight information, and calculate intrusion means elements based on behavioral information. Analyze the actual information in each picture, calculate the relevant vectors in the user behavior, and analyze it against the threshold vectors. After comparing the behavioral information, if the error of its information is higher than the measurement standard, it means that the behavior is a wrong behavior. It will concentrate the anomaly coefficients in the content of the session and determine the intrusive characteristics based on the value of the anomaly coefficients. At the same time, when calculating the data generated in the user characteristics, it is necessary to judge the initial value and adjust the relevant data according to the analysis results and user information to ensure that the system can operate normally.
When using the network to transmit information and data, it is necessary to further improve the network information access mechanism, safeguard the security of network information in all aspects, scientifically assess the characteristics of network intrusion, and avoid the transmission of network information being affected by external factors. The current network information security protection system is a static configuration control mode, when the campus network managers found the vulnerability, only to take corresponding measures to deal with, seriously affecting the solution effect. To address this situation, campus network administrators need to build a sound dynamic mechanism and set up a permission management mechanism to improve the effectiveness of daily management.
When a user accesses information resources, in addition to verifying the user’s permission to use, but also to play the function of dynamic management, and users need to meet the rules set between the system. Campus network managers should use the access mechanism to comprehensively analyze the user’s actual access to the environment, and further standardize the user access process, the user should not only set up the user’s access mechanism when accessing. Also want to control the number of accesses in a predetermined time node. If the frequency of attacks in this stage is too frequent, the path of the attack in a certain network area should be calculated, and sound preventive measures should be formulated. Currently, the following types of network intrusion alert information fusion techniques are available:
Utilizing the connection between the attack sequence alarm information in the data to effectively fuse network intrusion alarm information to achieve the role of automatic alarm. Among the deficiencies are: insufficient scalability, flexibility, accuracy, the system can not cover all the sequences of computer network attacks, and can not realize the comprehensive alarm work. Attack premise. If the wrongdoers want to launch an attack, there must be prerequisites, if the attack alarm information can be fused in the pre-attack, so as to make good preparations for the later stage, it can improve the flexibility of prevention, and is conducive to the campus network managers to stand in the attack perspective to analyze the basic results. Alarm Trigger Probability. The main purpose of this method is to cooperate with the alarm system to propose a unified formula to calculate the probability, by analyzing the degree of things attacked and the connection between each attack step to calculate the specific probability. The calculation expression is shown in equation (17):
In equation (17),
Through the campus network managers comprehensively analyze the security of autonomous protection network information, and take reasonable solution measures for the protection security, so as to establish the network information security protection system for college students based on the attack and defense game model.
In order to verify the protection effectiveness of the information security protection system against multi-layer network simulation attacks, the complex student information network coupled with the physical network (including servers, routers, switches, etc.) and the information network (including the student management system, library system, campus social platforms, etc.) of a university is selected as an experimental object, and the attack and defense simulation is carried out on the complex student network, and the changes of the complex network and sub-network are observed. In order to compare and analyze the structural characteristics and anti-destruction characteristics of the complex student information network of the university, this paper mainly uses the complex student information network and the library system to simulate the attack and defense.
In this paper, the attack and defense simulation mainly adopts the complex network attack mode, which is to simulate the attack on the nodes of the complex network as a whole, and the attack parameters are set as follows: the number of preset attack rounds is set to 50, the attack mode is selected as the complex network attack mode, the target of attack is selected as the complex network, the number of attacks is set to 3, and the attack strategy is selected as the degree of centrality.
In the information security protection system for multi-layer network attack static experiments in this information security protection system operating steps are as follows:
Enter the multilayer network experiment interface, select the experimental network, click the load network button, after loading the completion of each sub-network, click the fusion network button, the visualization display module displays each sub-network and complex student network topology. Set the attack parameters, including the preset number of attack rounds, attack mode, attack target, attack quantity, and attack strategy. Click the Static Experiment button to realize the dynamic evolution of the network topology for multi-layer network attacks until the preset number of attack rounds or network collapse is reached and the experiment ends. Click Generate File button to generate the data file.
In this section, maximum connectivity, network efficiency, number of connected slices and maximum connected slice size are selected as network evaluation metrics to attack the complex network through the complex network attack pattern, and the changes of network evaluation metrics are analyzed graphically.
Figure 2 demonstrates the change of network efficiency under the degree centrality strategy attack, where the horizontal coordinate is the number of attack rounds and the vertical coordinate is the network evaluation index value. It can be seen that under the degree centrality descending attack, the network efficiency of complex student network, information network and physical network decreases with the increase of the number of attack rounds, which is due to the fact that with the increase of the number of attack rounds, the connecting edges between nodes and nodes are reduced, and the shortest paths between the nodes will become longer, which leads to the decrease of network efficiency. The decreasing trend of network efficiency of physical network is more obvious than the decreasing trend of complex student network and information network, this is due to the fact that the physical network basically disintegrates in the early stage of the attack, while the decreasing trend of network efficiency of complex student network and information network is similar, and their resistance to the attack is similar, which indicates that the information network is dominant in the complex student network.

Variation of net work efficiency under betweenness centrality strategy attacks
The variation of maximum connectivity degree under degree centrality strategy attack is shown in Fig. 3. Under the degree centrality descending attack, the maximum connectivity of the complex student network, information network and physical network decreases with the increase of the number of attack rounds, and after the 1st round of attack, the maximum connectivity of the physical network decreases from 1 to about 0.68, while the complex student network and information network decrease from 1 to about 0.98. After the 7th round of attack, the maximum connectivity of the physical network decreases to 0.09, at this time, there are only a few isolated nodes and small connectivity slices in the physical network, and the physical network is basically disintegrated. After the 15th round of attack, the maximum connectivity of complex student network and information network drops to about 0.09, and the change of maximum connectivity of complex student network and information network tends to flatten out in the subsequent attacks, and the complex student network, information network, and physical network basically disintegrate. Overall the information network’s maximum connectivity decreasing trend is similar to that of the complex student network, and its ability to resist attacks is similar, reflecting the dominant position of the information network in the student network.

Variation of max connectivity under betweenness centrality strategy attacks
Fig. 4 reflects the variation of the number of connectivity slices under the degree centrality strategy attack. Under the degree centrality descending attack, the number of connectivity slices of complex network, information network and physical network shows a trend of increasing and then decreasing with the increase in the number of attack rounds, and as the number of attack rounds increases, the complex student network, the information network, and the physical network generates many isolated nodes and connectivity slices, which leads to the increase in the number of connectivity slices. The physical network only has isolated nodes and small connected slices left in the physical network after the 6th round of attack, and the physical network is basically disintegrated, while the maximum number of connected slices of the information network is more similar to the trend of the complex network changes, showing the dominant position occupied by the information network.

Variation of the number of connected components under attacks
Fig. 5 depicts the variation of maximum connectivity slice size under degree centrality strategy attack. Under degree centrality descending attack, the maximum connectivity slice size of complex, information and physical networks is negatively correlated with the number of attack rounds, which is due to the fact that as the number of attack rounds increases, the maximum connectivity slice disintegrates to produce isolated nodes and small connectivity slices, and the number of nodes in the maximum connectivity slice is decreasing until the end of the attack when the complex student network disintegrates, and the physical and information networks disintegrate with it. Overall, the size of the maximum connectivity slice of the information network is similar to the decreasing trend of the complex student network, and its ability to resist attacks is similar, again indicating the dominance of the information network.

Variation of size of the largest connected components under attacks
Based on the above complex student network attack pattern, it can be shown that the change trend of network evaluation indexes of complex student network and information network is more similar to that of physical network than that of physical network based on the degree centrality strategy attack of complex network attack pattern, and the results show that information network dominates in the composition of complex student network. The structure and function of the complex student network are still maintained to a certain extent after the information network is disintegrated, and the structure and function of the complex student network decreases to a smaller extent after the physical network is disintegrated, which indicates that the complex student network is more capable of resisting the attack than the single information network and physical network.
The purpose of the attack and defense experiment is to verify the rationality and feasibility of this designed network information security protection system. In order to ensure the rigor of the experiment, the experiment set the attack information for the external network, the use of firewalls to separate the internal network from the external network, the external network in the experiment can only access the mail server and the web server, while the internal network can be accessed and operated through the web server, mail server and file server.
Setting the attack content, attacking the internal network information, comparing the protection ability of the two network information security protection systems, the attack content in the experiment is shown in Table 1.
Experimental attacks
| Serial number | Attacks | Number of attacks |
|---|---|---|
| 1 | Account stealing | 25 |
| 2 | Trojan plating | 15 |
| 3 | Rebound attack | 20 |
| 4 | Web attack | 40 |
| 5 | Data monitoring | 25 |
Each attack content contains 220 network information, compare this paper protection system and the traditional system in these five kinds of attacks, the network information in the system was successfully attacked information. The more successful information is attacked, the worse the security protection function of the system is, and vice versa, the better the protection ability of the system is. The experimental process lasts for a total of 10h, and the experimental data collection is carried out every 2h, and the network defense strength is gradually enhanced.
The comparison results of this designed network information security protection system based on attack and defense game model with the traditional system are shown in Table 2. As can be seen from Table 2, the number of attacked information of the system designed in this paper is 198, 106, 126, 182 and 168 less than the traditional system in account stealing attack, planting Trojan horse attack, rebound attack, web page attack and data listening attack, respectively.
The result of experiment
| Attacks | The quantity of attacks on information | |
|---|---|---|
| Tradition system | Our system | |
| Account stealing | 223 | 25 |
| Trojan plating | 129 | 23 |
| Rebound attack | 170 | 44 |
| Web attack | 211 | 29 |
| Data monitoring | 186 | 18 |
The simulation and comparison experiment software is further used to simulate the network information system environment, and add strong attack strategy, weak attack strategy, strong defense strategy and weak defense strategy in this environment to defend the network information by using the method of this paper and the traditional defense method respectively, and set them as the experimental group and the control group respectively. In the experimental process, the simulation step size is 0.05 to simulate the strategy evolution process of both attack and defense under different conditions, and record the experimental results, which are plotted into the experimental results comparison diagram shown in Fig. 6.

The comparison of experimental results
From the experimental results in Figure 6, it can be seen that in 50 samples, the experimental group’s effective defense of network information is significantly higher than that of the control group, and at the same time, it can be seen from the magnitude of the change of the two curves, the fluctuation of the experimental group is basically the same as the amount of network information that is attacked by the attacking strategy added in the experimental process of this paper, which indicates that the experimental group can choose different strengths of the defense strategy based on the attacking party’s attacking strategy strength, the Targeting is stronger. Therefore, through comparative experiments, it is proved that the security protection protection method proposed in this paper can effectively increase the amount of effective defense information, higher defense rate, and more in line with the needs of network information security transmission.
Comprehensive results of the above comparisons show that the network information security protection system designed in this paper has a stronger protection ability for students’ network information, which significantly reduces the number of attacks on information than the traditional system, and is more targeted in the face of different attack strategies. Therefore, it can be proved that the protection ability of the network information security protection system based on the attack and defense game model designed in this study is better than that of the traditional system, which enhances the security of students’ network information in colleges and universities.
Combined with the information security application scenarios and security status quo of university student networks, to build a security guarantee system with operational platform, management integration, situational awareness, event warning, accident traceability, technology integration, and closed-loop security, and to enhance the offensive and defensive capabilities of university student networks, the following paths can be followed mainly to carry out related work:
It establishes multi-level technical means for physical security, network security, platform security, data security and application security, and builds a deep defense system with key protection, traffic monitoring, intelligent research and judgment, rapid response and effective blocking. It collects the status and network traffic of all elements of the entire network, carries out data analysis and abnormality detection through dynamic analysis, comparison and correlation, senses and identifies abnormal events and behaviors, and supports the capabilities of early warning and notification, rapid response, and collaborative disposal.
Implementing the strategic layout of localization, in the construction process, it should strengthen the ability of independent control, safety and reliability, and adopt domestic independent core technology in hardware equipment, chip trusted, operating system, database, middleware, cryptographic algorithms, etc., to ensure that the security system is controllable, manageable and trustworthy.
With “physical security, environmental security, autonomous and controllable, safe and trustworthy, collaborative linkage” as the cornerstone of security, policy and standard guidelines and organizational talents as the support and guarantee, the network information system around the university students continues to build security macro decision-making capability, monitoring and security incident notification and early-warning capability, security unified management capability, security deep defense capability, security supervision and operation and maintenance capability to form a systematic security countermeasures capability to meet the needs of e-government security in the new era. Defense capability, security supervision and operation and maintenance capability, forming systematic security countermeasures to meet the security needs of e-government affairs in the new period.
Using network equipment, security equipment, and flow probes as detection and execution points, it collects the fullest possible information on network traffic, security logs, vulnerability scanning logs, host security, and other security threat events, carries out unified and comprehensive research and judgment, improves the accuracy rate of security analysis, and drills into the depth of network behavioral data to discover potential threats in a timely manner. Through the controller scheduling network and security equipment collaborative disposal, accelerate the threat response speed, prevent the threat from spreading in the governmental extranet, for the violation of the main body immediately blocked nearby, to realize the net security integrated protection.
In this study, we applied information security related technologies such as topological feature extraction, NW small-world attack and defense model, and security protection system to explore the path to improve the attack and defense capabilities of university students’ networks. The NW model accurately simulates the attack process of degree-centrality attack strategy on the network efficiency, maximal connectivity, the number of connected slices, and maximal size of connected slices, and it is found that the information subnetwork in the students’ network shows higher resistance to the attack capability. Attack ability. Conducting attack and defense experiments on the security protection system, in the network attacks such as account stealing attack, planting Trojan horse attack, rebound attack, web page attack, data listening attack, the security protection system suffered 198, 106, 126, 182 and 168 fewer attack messages than the previous system respectively. Adding different levels of attacks and defense strategies respectively in the test, the amount of effective defense information of the new system is always greater than that of the comparison system and is more targeted. This shows that the work in this paper provides an effective path to improve students’ network attack and defense capabilities.
