Information safety attack and defense system structure of cloud platform

A technology of information security and system architecture, applied in the field of information security, can solve problems such as different, lack of network attack and defense systems, difficulty in adapting to the needs of new technologies and new security threats, etc., to reduce and difficulty, reduce security risks, and easy to deploy and the effect of using

Active Publication Date: 2015-03-11
XIAN UNIV OF POSTS & TELECOMM +1
View PDF6 Cites 80 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technology, on the one hand, has different focuses and costs on the one hand, and the focus of network attack and defense technology is also different. It often focuses on solving a certain problem, and lacks a complete network attack and defense system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety attack and defense system structure of cloud platform
  • Information safety attack and defense system structure of cloud platform
  • Information safety attack and defense system structure of cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] see figure 1 , The present invention provides a cloud platform information security attack and defense architecture, the architecture includes a network shooting range system, a security protection system, a comprehensive attack system and a security trap analysis system.

[0053] The network shooting range system is an important foundation of the offensive and defensive system. The system can be designed in a virtualized environment and has a variety of vulnerability images, which can simulate operating system-level, application-level, and network-level vulnerabilities, and can quickly and dynamically deploy attacked objects as needed. In this way, an opportunity for attack drills is provided for the attacking network, and at the same time, the effect of the attack can be detected.

[0054] The network shooting range system can use a single or multiple servers to run a virtualized environment to realize the shooting range network. Each of the virtual servers is desig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information safety attack and defense system structure of a cloud platform. The system structure comprises a network target range system, a security defending system, a comprehensive striking environment and a safety trap analysis system; the network target range system comprises a plurality of information security hole environments capable of simulating the security holes of an operating system level, an application level and a network level; the security defending system comprises a plurality of information safety protection tools which have monitoring, defending and audit capacities; the comprehensive striking system comprises a plurality of osmosis attacking tools with the comprehensive and multidirectional attacking capacity; the trap analysis system comprises diversified trap environments which can attract and trap hostile attack behaviors, and provide the analysis capacity on the attack behaviors to obtain the attacking features. The information safety attack and defense system structure provided by the invention is applicable to an information security attack and defense and verification system of the cloud platform; furthermore, by the combination of a virtualized service-oriented application technology, the problem of information security risk that the security system of the cloud platform is difficult to verify can be solved.

Description

technical field [0001] The present invention relates to the field of information security, and more specifically, relates to an information security attack and defense architecture of a cloud platform. Background technique [0002] The service-based cloud computing platform is an important form of information infrastructure in the Internet age. It is the latest form of high-performance and distributed computing development. It provides high-performance, low-cost computing and data services with a new business model to support various information applications. As a new form of informatization based on virtualization, characterized by services, and based on on-demand use as a business model. After the concept of cloud computing was born, it quickly attracted the attention of the government, industry and academia, and the promotion and popularization of its application has become irresistible. Major enterprises are conducting research and development of cloud computing produ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/1433H04L63/1441H04L67/1097
Inventor 朱志祥张勇吴晨刘盛辉
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products