Method and system for detecting result obtained at fixed point in virtual network

A virtual network and fixed-point technology, applied in the field of virtual network security laboratory, can solve the problems that can only be done once and cannot be repeated

Inactive Publication Date: 2014-11-12
北京哈工创新计算机网络与信息安全技术研究中心 +2
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The most important type of experiment in network security experiments is the experiment of infiltrating into a certain host, obtaining privileges, and taking a certain file. This experiment can only be done once and cannot be repeated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting result obtained at fixed point in virtual network
  • Method and system for detecting result obtained at fixed point in virtual network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0014] Such as figure 1 , figure 2 As shown, in the management module of the network security laboratory system, the experiment management module is set to manage the user's experiment, including the experiment environment deployment module and the experiment result management module (ie figure 1 Results Management in ). The experiment environment deployment module is responsible for deploying the user's experiment environment in the cloud environment, and the experiment result management module is used to manage the submission of network security experiment results. The experimental environment (such as a virtual laboratory) is composed of one or more subnets, and the subnet contains one or more virtual machines. Among them, some virtual machines can be directly accessed by users through the access gateway, such as client computers, and some The ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for detecting a result obtained at a fixed point in a virtual network. An experiment management module is arranged to manage experiments of a user, and an experiment environment deployment module and an experiment result management module are included. A program which can only be operated through super administrator authority is arranged on a target machine, namely, a permeated host, so that a feature code with machine features is generated through operation of the program, the feature code serves as a submitted result of an experiment, and then whether the feature code accords with the machine features is detected when a user result is received. Accordingly, it is guaranteed that when the user obtains the experiment result, the user must have the authority of the administrator and the network position of the user must be on the target machine, namely, whether the user obtains the experiment result on the specific position is detected, and the user needs to have the authority of the administrator to obtain submitted data. By means of the method and system, whether the user obtains the submitted data on a specific virtual machine can be detected timely, and it is confirmed that the user has access to the target machine successfully.

Description

technical field [0001] The invention relates to the technical field of a virtual network safety laboratory and a simulated network safety laboratory. Background technique [0002] The virtual network security laboratory using the cloud platform has the characteristics of fast deployment, easy structure change, and loss-free destruction. It is the first choice for network security training. In network security training, because the content of the experiment is fixed, many people often do the same experiment, and they will all get the same result, which leads to someone skipping the experiment process and submitting the experiment results. The most important type of experiment in network security experiments is the experiment of infiltrating into a certain host, obtaining privileges, and obtaining a certain file. This experiment can only be done once and cannot be repeated. Because a section of the hidden file is retrieved, everyone gets the file and can submit it with the fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L12/28
Inventor 罗端红杨道一李莉
Owner 北京哈工创新计算机网络与信息安全技术研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products