Data layer system of information security attack-defense platform

An information security and data layer technology, applied in the field of data layer systems, can solve the problem of inability to intuitively adjust the network topology security configuration status, and achieve the effect of improving security technology capabilities, ensuring information security, and preventing leakage

Active Publication Date: 2015-07-29
GUANGDONG POWER GRID CO LTD INFORMATION CENT +1
View PDF3 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the management personnel of the experimental platform cannot timely, effectivel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data layer system of information security attack-defense platform
  • Data layer system of information security attack-defense platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution, and provides detailed implementation and specific operation process, but the protection scope of the present invention is not limited to the present invention. Example.

[0046] Such as figure 1 As shown, a data layer system of an information security attack and defense platform is mainly composed of several resource library modules. The resource library module includes a tool library module, a scene configuration library module, a courseware library module, a security information library module, a log library module, An attack behavior library module and a platform library module; the data layer system is also provided with a unified data linkage interface and a data transmission module, both of which are connected to each resource library module; the unified data linkage interface is an externa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data layer system of an information security attack-defense platform; the data layer system comprises a tool library module, a scenario configuration library module, a courseware library module, a security intelligence library module, a log library module, an attack behavior library module and a platform library module. Through independent operations of the seven resource library modules, linkage among the modules, and the linkage of the modules with external data, the integral, efficient, uniform and standard data layer system is provided for the information security attack-defense platform in a manner that a virtual device is combined with a physical device, helping the information security attack-defense platform to effectively realize a network security assessment, an attack-defense confrontation, a new product inspection examination, as well as a series of assessments and evaluations on a network architecture, a design process, a host security, a data security and the like.

Description

technical field [0001] The invention relates to the technical field of computer network information security, in particular to a data layer system of an information security attack and defense platform, which is used to provide resources for the information security attack and defense platform. Background technique [0002] The biggest threat to the computer network in today's society is the opponent's attack and computer crime. One is active attack, which selectively destroys the validity and integrity of information in various ways; the other is passive attack, which intercepts, steals, and deciphers information without affecting the normal operation of the network. Important confidential information, resulting in the leakage of confidential data. [0003] The power system is a complex network system. Its safe and reliable operation can not only guarantee the normal operation and power supply of the power system, avoid major losses caused by potential safety hazards, but ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/62
Inventor 龙震岳魏理豪钱扬邹洪艾解清李伟清黄巨涛杨汉彬王骧龙
Owner GUANGDONG POWER GRID CO LTD INFORMATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products