Computer Network Defense Scheme Simulation Execution System

A computer network and execution system technology, which is applied in the computer network defense scheme simulation execution system, scheme simulation implementation, and computer network defense scheme description problems, can solve problems such as lack of defense scheme deployment methods, improve efficiency and ensure correctness sexual effect

Inactive Publication Date: 2016-01-20
BEIHANG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (2) Lack of deployment methods for automatic execution of defense solutions
[0008] (3) The simulation research of network defense is mostly used for security assessment and training exercises, and the simulation execution mechanism to realize the automatic deployment of the defense scheme needs further research, especially the simulation of the linkage defense scheme to realize the linkage defense tasks of various defense equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer Network Defense Scheme Simulation Execution System
  • Computer Network Defense Scheme Simulation Execution System
  • Computer Network Defense Scheme Simulation Execution System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Such as figure 1 As shown, the computer network defense scheme simulation execution system of the present invention, the input is a defense scheme, and the output is a defense scheme execution report, including a scheme explanation module, a scheme deployment module, a scheme simulation module and an execution result display module.

[0030] The whole implementation process is as follows:

[0031] (1) Program explanation module

[0032] Design the computer network defense scheme description language CNDSDL and its interpreter, conduct lexical analysis, syntax analysis and semantic analysis on the defense scheme described by CDNSDL, explain and generate various defense tasks that conform to the grammatical format of the defense scheme.

[0033] Definition 1 Scheme: A scheme is a binary group composed of a set of tasks and a set of relationships between tasks. Recorded as:

[0034] Scheme : : ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer network defense scheme simulation execution system comprises the steps of (1) designing and achieving a formalized computer network defense scheme description language (CNDSDL) with context-free grammar, providing an extended backus naur form (EBNF), designing a language interpreter based on the CNDSDL; (2) proposing a scheme arrangement method based on the CNDSDL, wherein the method comprises a deadlock detection and scheduling algorithm for tasks in a defense scheme, guaranteeing correctness of the defense scheme; and (3) achieving simulation of the defense scheme in a GT net simulation platform, wherein the simulation comprises simulation of an identification section (IDS), a firewall, backups, recovering and linkage tasks among the IDS, a bug library and the firewall.

Description

technical field [0001] The invention designs and implements a computer network defense scheme simulation execution system, belongs to the technical field of computer network security, and relates to the description of the computer network defense scheme, the deployment of the scheme, and the simulation realization of the scheme. Background technique [0002] Due to the diversity and openness of the Internet itself, many software and hardware vulnerabilities in computer systems and network equipment, as well as the growth of the network scale and the increasingly complex structure, the relationship between various parts of the system is complex and diverse, and the means of network attacks are also complicated. With the development of diversity, people are faced with many risks brought by network security issues, which poses greater challenges to computer network defense. In order to meet the needs of ensuring the security of large-scale computer networks and application syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/455
Inventor 夏春和魏昭罗杨吴伟康余洋
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products