Network security simulation system

A simulation system and network security technology, applied in the field of network security, can solve the problems of limited attack simulation scenarios, single function of attack tools, time-consuming and labor-intensive, etc., to achieve flexible and diverse network adjustment, overcome physical servers, and improve the effect of protection.

Active Publication Date: 2019-02-19
中国航天系统科学与工程研究院
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most of the security testing and experimental environments at home and abroad are manually built, which is time-consuming and labor-intensive, and configuration changes are troublesome; the attack drill technology is relatively developed, but the attack tool has a single function and can only carry out certain types of attacks, and there is no integrated attack Tools; attack drills with similar functions. Shooting range products are mainly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security simulation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Such as figure 1 As shown, the present invention proposes a network security simulation system, including a network attack simulation subsystem, a risk simulation subsystem and a security defense simulation subsystem.

[0037] Risk simulation subsystem: Build a risk simulation environment, including network topology and network systems with vulnerabilities (such as various common operating systems, databases, and WEB systems).

[0038] Specific steps are as follows:

[0039] Using virtualization technology, build different types of network system templates with loopholes; design network topology according to the actual network environment; select the corresponding network system template according to the network topology, generate network system nodes, and form a risk simulation environment.

[0040] Network attack simulation subsystem: Provide a variety of attack tools and attack parameters, according to the attack tools and attack parameters selected by the user, rea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security simulation system. The network security system comprises a network attack simulation subsystem, a risk simulation subsystem and a security defense simulationsubsystem, wherein the risk simulation subsystem is used for building a risk simulation environment; the network attack simulation subsystem is used for providing a plurality of attack tools and attack parameters to attack a target object selected by a user in a risk simulation environment, and record an attack process and an attack result; and the security defense simulation subsystem is used for judging whether a security defense strategy of the target object needs to be adjusted or not according to the attack result, and giving a determined security defense strategy if adjustment is needed. The network security simulation system integrates a plurality of attack tools, has a security rule knowledge base, and can simulate a plurality of attack scenes and adjust the security defense strategy.

Description

technical field [0001] The invention relates to a network security simulation system, which belongs to the field of network security. Background technique [0002] The network security simulation environment construction method automatically constructs and tests the network environment, establishes a security risk simulation basic environment, constructs a corresponding attack model based on the network attack attack input, attack process and external environment analysis, and conducts network attack simulation; researches network system defense models and Methods: Analyze system defense node deployment and defense strength, obtain network performance data and security protection equipment performance data on the basis of automatic / semi-automatic attack simulation, and obtain attack simulation execution information through multiple comparative experiments. [0003] At present, most of the security testing and experimental environments at home and abroad are manually built, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/145H04L63/1416H04L63/1433H04L63/1441H04L63/20
Inventor 马锐葛慧顾升高孙四明马献志靳骁马宇威
Owner 中国航天系统科学与工程研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products