Penetration testing method for GAP isolation and exchange device

A technology of switching equipment and penetration testing, which is applied in the field of information security and can solve problems such as difficult and safe and controllable testing, complex environment configuration, and low efficiency

Inactive Publication Date: 2014-07-09
中国人民解放军信息安全测评认证中心 +1
View PDF3 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method of manually cooperating with auxiliary tools can test the GAP isolation switching equipment to a certain extent, it has many problems such as low efficiency and complex environment configuration, making it difficult to conduct large-scale, safe and controllable tests.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Penetration testing method for GAP isolation and exchange device
  • Penetration testing method for GAP isolation and exchange device
  • Penetration testing method for GAP isolation and exchange device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0016] figure 1 It is a frame diagram of the technical principles of the present invention, and the penetration testing method for GAP isolation switching equipment consists of three parts: policy configuration, session generation and result evaluation. The policy configuration module is used to customize the network attack session strategy according to the security test requirements, mainly including access control, Web attack and Trojan horse attack; the session generation module simulates the host (client and server) connected to the internal and external network, , generate a precisely defined specific network attack session, and pass through the GAP isolation switching device under test; the result evaluation module checks the status of the network attack traffic traversal (passing, intercepted, modified, etc.), and combines the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a penetration testing method for a GAP isolation and exchange device. The method comprises the concrete steps that (a) policy configuration is tested, wherein according to the working principle, the function and the implementation mode of the tested device, applicable test cases are selected from a preset penetration testing rule base, and test environment parameters are configured; (b) a network attack session is generated, wherein an independent client program and an independent server program are established, hosts in networks at the two ends of the tested device are respectively simulated, afterwards, test plugins corresponding to the test cases are respectively called, and the test environment parameters configured in the step (a) are passed to the test plugins; the test plugins produce corresponding data packets in real time, the data packets are sent through a client or a server, and therefore the network attack session is generated; (c) test results are evaluated, wherein the test results of the test cases are evaluated according to the completion condition of the network attack session and the warning information of the tested device. By the application of the penetration testing method for the GAP isolation and exchange device, automated security testing for the GAP isolation and exchange device can be achieved.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a security test for GAP isolation switching equipment, in particular to a penetration testing method for main security features such as application layer protocol control, content security, intrusion prevention and anti-trojan horse of the GAP isolation switching equipment. Background technique [0002] The network security isolation switching system (GAP isolation switching equipment) adopts the GAP isolation switching technology. The so-called GAP isolation switching, also known as Air GAP (air isolation) technology, its basic technical characteristics are "physical blocking, logical connection", that is, through this technology, it can ensure that the two networks are not connected physically. Logical connection for data exchange. The structure of the network security isolation switching device includes three modules: the internal network processing unit, the exter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 钟力姚兰阮强何金勇
Owner 中国人民解放军信息安全测评认证中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products