Attack prevention practice method and device

A technology of attacking aircraft and attackers, applied in the network field, can solve the problems of inability to evaluate and improve the protection system, and not showing the protection effect

Inactive Publication Date: 2017-12-15
北京椰子树信息技术有限公司
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the offensive and defensive drills, only the attack is emphasized, and the protection effect is not shown, which makes it impossible for users to evaluate and improve the protection system based on the protection effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack prevention practice method and device
  • Attack prevention practice method and device
  • Attack prevention practice method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] figure 1 A step flow chart of an embodiment of an attack prevention drill method provided for the invention.

[0045] Such as figure 1 As shown, the attack protection exercise method provided in this embodiment is applied to a network attack and defense laboratory, specifically, it is applied to a scene controller of an attack and defense exercise system in a network attack and defense laboratory, and is used to display firewalls or IPS in a simulated attack and defense exercise. For the protection effect, in this embodiment, cracking dvwa xss on owasp bwa is taken as an example. The attack protection drill method includes the following steps:

[0046] S101: Produce a configuration template according to the user's request.

[0047] When an offensive and defensive rehearsal is required, the user can send a corresponding offensive and defensive request to the scene controller. At this time, the scene controller produces a corresponding configuration template according to the req...

Embodiment 2

[0062] figure 2 A step flow chart of another embodiment of an attack prevention drill method provided for the invention.

[0063] Such as figure 2 As shown, the attack protection exercise method provided in this embodiment is applied to a network attack and defense laboratory, specifically, it is applied to a scene controller of an attack and defense exercise system in a network attack and defense laboratory, and is used to display firewalls or IPS in a simulated attack and defense exercise. For the protection effect, in this embodiment, cracking dvwa xss on owasp bwa is taken as an example. The attack protection drill method includes the following steps:

[0064] S201: Produce a configuration template according to the user's request.

[0065] When an offensive and defensive rehearsal is required, the user can send a corresponding offensive and defensive request to the scene controller. At this time, the scene controller produces a corresponding configuration template according to ...

Embodiment 3

[0082] image 3 A structural block diagram of an embodiment of an attack protection drill device provided for the invention.

[0083] Such as image 3 As shown, the attack protection exercise device provided in this embodiment is applied to a network attack and defense laboratory, specifically, it is applied to a scene controller of an offense and defense exercise system in a network attack and defense laboratory, and is used to display firewalls or IPS in a simulated attack and defense exercise. For the protection effect, in this embodiment, cracking dvwa xss on owasp bwa is taken as an example. The attack protection drill device includes a template generation module 10, a virtualization control module 20, a network generation module 30, a network association module 40, and a virtual machine display module 50.

[0084] The template generation module is used to produce configuration templates according to user requests.

[0085] When an offensive and defensive rehearsal is required, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack prevention practice method and an attack prevention practice device. The method and the device are applied to a scene controller of an attack prevention practice system. the method specifically comprises the steps of generating a configuration template in response to an attack prevention request of a user, wherein the configuration template comprises an attacker clone parent, a target clone parent and a firewall clone parent; sending the configuration template to a virtualized management platform of the attack prevention practice system, and controlling the virtualized management platform to clone virtual machines and a virtual firewall according to the configuration template, wherein the virtual machines comprise a virtual attacker and a virtual target; generating two virtual networks including an attacker network and a target network; associating the virtual networks with the virtual machines and the virtual fire wall; displaying the virtual machines and the virtual firewall, and providing an attack access for a user, wherein a log of the virtual firewall is used for recording attack effect of attacks initiated by the user and prevention effect. The user can acquire the prevention effect of the firewall by checking the log report.

Description

Technical field [0001] This application relates to the field of network technology, and more specifically, to an attack protection drill method and device. Background technique [0002] The network attack and defense laboratory is a laboratory equipped with the software and hardware facilities required for network attack and defense. The hardware facilities include computer hosts, servers, routers and connecting devices. The software includes server management software, operating systems, firewalls, etc., mainly used To simulate network attacks is to prevent, so that users can verify the security of the attacked system based on the attack. [0003] The network attack and defense laboratory will use patches to protect the attacked system, and then use firewalls or IPS and other systems for protection. However, during the offensive and defensive exercises, only the attack was emphasized, and the protection effect was not displayed, which caused users to be unable to evaluate and imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/20
Inventor 蒋俏峰
Owner 北京椰子树信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products