Supercharge Your Innovation With Domain-Expert AI Agents!

Method and system for simulating and detecting cloud security

A detection method and detection system technology, applied in the field of information security, can solve the problems of ignoring the characteristics and status of the internal security defense system, failing to detect and know the security status of the network system, etc., to achieve the effect of improving defense capabilities and comprehensive detection results

Active Publication Date: 2013-11-20
GUANGZHOU ZHONGCHANG KANGDA INFORMATION TECH +1
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this traditional method only focuses on external issues, while ignoring the characteristics and status of the internal security defense system, so it is impossible to comprehensively detect the network system and know the security status of the network system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for simulating and detecting cloud security
  • Method and system for simulating and detecting cloud security
  • Method and system for simulating and detecting cloud security

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0070] A specific embodiment of a cloud security simulation detection method of the present invention is as follows:

[0071] A cloud security simulation detection method, comprising:

[0072] S1. Collect the security protection architecture of the network system and the attributes of each network device in the structure; network devices include the Internet, and also include one or more of hubs, switches, firewalls, routers, computers or servers, here because Network attacks are initiated by various terminal devices through the Internet, so the Internet is also regarded as network equipment, and the source of network attacks is generally considered to be the Internet. The security protection architecture of the network system is actually the structure of the network system, and the structure of the network system composed of various network devices is called the security method architecture of the network system.

[0073] S2. Establish the network system topology structure a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for simulating and detecting cloud security. The method comprises the steps of S1, collecting a security prevention system structure of a network system and the attribute of each network device in the security prevention system structure; S2, establishing a network system topological structure according to the collected security prevention system structure of the network system; S3, setting a defensive force attribute value of the network system topological structure according to the attribute of each network device of each node of the network system topological structure; and S4, carrying out network attack simulation detection from a first-stage node of the network system topological structure according to a preset network attack type, and thus obtaining a security detection result of the network system. According to the method and the system, which are disclosed by the invention, the security level of an internal defense system of the network system under a network attack can be comprehensively detected, the detection result is comprehensive, the security level of the network system can be known, thus a basis can be provided for increasing the defense capability of the network system in a targeted way, and the method and the system can be widely applied to the field of network security.

Description

technical field [0001] The invention relates to the field of information security, in particular to a cloud security simulation detection method and system. Background technique [0002] With the rapid development of computer and communication technology, along with the continuous increase of user demand, the application of computer network system is becoming more and more extensive, and its scale is also becoming larger and larger. At the same time, network system security incidents emerge in an endless stream, and various threats reappear, which makes the computer network face a severe situation of information security. Therefore, it is particularly important to carry out security detection on the network system. The traditional method is to detect various external threats by detecting the characteristics of various threats (such as virus modification data signatures, TCP content and sequence sent during network attacks, etc.), so as to judge the security status of the en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 江枚元王涛钟奇范冰冰
Owner GUANGZHOU ZHONGCHANG KANGDA INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More