Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack and defense test resource deployment method based on mobile agent

A mobile agent and resource technology, applied in the field of network attack and defense test resource deployment, can solve the problems of not supporting dynamic adjustment, lack of overall view of network attack and defense test resource deployment, easy deployment errors, etc., and achieve the effect of good scalability

Active Publication Date: 2015-01-14
THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still some deficiencies in the deployment of network attack and defense test resources, which are as follows: (1) The network attack and defense test resources are deployed manually, the resource deployment efficiency is low, deployment errors are easy, and the integration process from design to deployment is lacking. Capable of automatic deployment
(2) Network attack and defense test resources are pre-deployed and do not support dynamic adjustment on demand
(3) There is a lack of an overall view of network attack and defense test resource deployment. When multiple attack and defense tests are carried out at the same time, it is difficult to effectively allocate test resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack and defense test resource deployment method based on mobile agent
  • Network attack and defense test resource deployment method based on mobile agent
  • Network attack and defense test resource deployment method based on mobile agent

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0077] An embodiment of the present invention is illustrated below:

[0078] The resource configuration management seat, the test resource library, the threat environment deployment platform and the target system deployment platform are interconnected through routers in the local area network 192.168.8.0 / 22. The IP address of the resource configuration management seat is 192.168.8.2, the computer model is Lenovo ThinkCentre M8250t, and the operating system winXP sp3, the resource configuration management system has been deployed; the IP address of the test resource library is 192.168.9.2, the computer model is Lenovo ThinkCentre M8250t, the operating system is winXP sp3, the mobile agent management system and mobile agent have been deployed; the network segment of the threat environment deployment platform is 192.168.10.0 / 24, 10 attacking hosts, IP address 192.168.10.2-192.168.10.11, computer model Lenovo ThinkCentre M8250t, operating system winXP sp3; target system deployment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack and defense test resource deployment method based on a mobile agent. The method comprises the steps that a network attack and defense test resource deployment system is divided into a resource configuration management seat, a test resource library, a threatening environment deployment platform and a target system deployment platform according to a structure angle, the resource configuration management seat, the test resource library, the threatening environment deployment platform and the target system deployment platform are commonly connected with one network and transmit data by the network; a resource configuration management system is deployed at the resource configuration management seat, and a mobile agent management system and the mobile agent are deployed at the test resource library. According to the method, the automatic deployment of network attack and defense test resources is supported, and the network attack and defense test resources are distributed by utilizing the mobile agent, and are autonomously transferred to an attack host machine or a defense host machine to be installed. The adjustment of the network attack and defense test resource deployment according to dynamics is supported, and when the deployment plan is changed, the mobile agent autonomously transfers to the attack host machine or the defense host machine to adjust the test resource deployment.

Description

technical field [0001] The invention relates to a method for deploying network attack and defense test resources, in particular to a mobile agent-based network attack and defense test resource deployment method. Background technique [0002] The network attack and defense test resources refer to the reconnaissance, attack, and defense software systems used by both sides of the network confrontation during the confrontation process. At present, the network attack and defense test is widely used in the technical field of testing and verifying the function and performance of network reconnaissance, attack and defense equipment, as a means to learn and study the process and effect of network attack, and to test the usability and effectiveness of security equipment in the network . However, there are still some deficiencies in the deployment of network attack and defense test resources, which are as follows: (1) The network attack and defense test resources are deployed manually...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 王晔周正虎朱立新周光霞
Owner THE 28TH RES INST OF CHINA ELECTRONICS TECH GROUP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products