Remote network attack and defense virtual simulation system based on virtualization and cloud technology

A virtual simulation, remote network technology, applied in transmission systems, electrical components, etc., can solve the problem of inability to remotely share network topology attack and defense scenarios, single and other problems, to avoid repeated investment in construction, improve utilization, and achieve the effect of remote sharing

Active Publication Date: 2014-04-02
CHANGCHUN UNIV OF SCI & TECH
View PDF4 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a remote network attack and defense virtual simulation system based on virtualization and cloud technology in order to solve the problem that the existing network attack and defense virtual simulation system cannot remotely share and construct the network topology structure and the single attack and defense scene

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote network attack and defense virtual simulation system based on virtualization and cloud technology
  • Remote network attack and defense virtual simulation system based on virtualization and cloud technology
  • Remote network attack and defense virtual simulation system based on virtualization and cloud technology

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0017] Specific implementation mode 1. Combination Figure 1 to Figure 3 Describe this embodiment, the remote network attack and defense virtual simulation system based on virtualization and cloud technology, including a remote access control module, a virtual attack machine cloud module, a virtual target machine cloud module, a monitoring center module, a management center module and an experiment configuration module;

[0018] The management center module allows administrators to maintain account information that can be connected to the virtual simulation system, including user name, initial password and operable experiment category; maintain Windows and Linux operating system images located in the virtual attack machine cloud module according to the experiment category File and port scanning tools, SQL injection tools, network sniffer, Trojan horse implantation tools, remote control tools, cross-site scripting attack tools, DDos attack tools and password cracking attack tool...

specific Embodiment approach 2

[0025] Specific embodiment two, combine figure 2 and image 3 Describe this embodiment, this embodiment is an embodiment of the virtual simulation system based on remote network attack and defense described in the first embodiment: the hardware equipment involved in this embodiment includes a VPN gateway, a switch, a firewall, an application server, a first network Cloud storage and second network cloud storage.

[0026] The application server is connected to the first network cloud storage, the second network cloud storage and switches, installed Ubuntu operating system, Openstatck, JDK, ApacheTomcat and Mysql, and deployed JSP / Servlet programs, including figure 1 The shown remote access control module, virtual attack machine cloud module, virtual target machine cloud module, monitoring center module, management center module, experiment configuration module and extended device configuration module.

[0027] The first network cloud storage is connected to the switch throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides to a remote network attack and defense virtual simulation system based on virtualization and cloud technology, relates to the field of information safety and experimental system remote sharing, solves the problems of incapability of remotely sharing and building a network topology as well as a onefold attack and defense scene in the conventional network attack and defense virtual simulation system, and provides the remote network attack and defense virtual simulation system. According to the invention, virtualization and cloud technology are used to establish a virtual attacker and a virtual target airplane on cloud storage, network connection equipment and network guard equipment are configured for the virtual attacker and the virtual target airplane, and diversified network topologies and attack and defense scenes are established for users to carry out attack and defense experiment; the system comprises a remote access control module, an experimental configuration module, a virtual attacker cloud module, a virtual target drone cloud module, a monitoring center module, an expansion equipment configuration module and a management center module; users are allowed to use the virtual simulation system remotely through a VPN (Virtual Private Network), repeated investment and construction to the attack and defense virtual simulation system are avoided, and the use ratio of experimental facilities is improved.

Description

technical field [0001] The invention relates to the field of information security and remote sharing of experimental systems, in particular to the configuration, operation and sharing of a virtual simulation experimental system for network attack and protection. Background technique [0002] The particularity and destructiveness of network attack and defense technology itself make it difficult to complete its teaching and research in a real network environment. At present, the teaching and research work of network attack and defense is generally carried out in an independent network using hardware equipment to build a physical experiment environment or using virtual simulation technology to simulate the real network environment. Among them, the former puts forward higher requirements for the investment in the laboratory. It is difficult for ordinary universities and research institutions to bear such a huge cost. Moreover, when the network scale and network structure require...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 底晓强杨华民赵建平李鹏飞翟宏宇张宇昕李华李奇孙一鸣从立钢祁晖
Owner CHANGCHUN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products