A network security simulation system

A simulation system and network security technology, applied in the field of network security, can solve the problems of limited attack simulation scenarios, troublesome configuration changes, time-consuming and labor-consuming, etc., and achieve the effect of flexible and diverse network adjustment, fast construction, and improved protection effect

Active Publication Date: 2021-10-01
中国航天系统科学与工程研究院
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most of the security testing and experimental environments at home and abroad are manually built, which is time-consuming and labor-intensive, and configuration changes are troublesome; the attack drill technology is relatively developed, but the attack tool has a single function and can only carry out certain types of attacks, and there is no integrated attack Tools; attack drills with similar functions. Shooting range products are mainly for competition and teaching, not engineering application products, with limited attack simulation scenarios and lack of data management functions; attack drills are limited to security attacks in specific network scenarios Testing lacks the adjustment function of defensive measures; cannot record and manage offensive and defensive data, cannot establish a security rule knowledge base based on offensive and defensive big data, and cannot form expert knowledge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network security simulation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Such as figure 1 As shown, the present invention proposes a network security simulation system, including a network attack simulation subsystem, a risk simulation subsystem and a security defense simulation subsystem.

[0037] Risk simulation subsystem: Build a risk simulation environment, including network topology and network systems with vulnerabilities (such as various common operating systems, databases, and WEB systems).

[0038] Specific steps are as follows:

[0039] Using virtualization technology, build different types of network system templates with loopholes; design network topology according to the actual network environment; select the corresponding network system template according to the network topology, generate network system nodes, and form a risk simulation environment.

[0040] Network attack simulation subsystem: Provide a variety of attack tools and attack parameters, according to the attack tools and attack parameters selected by the user, rea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network security simulation system, which comprises a network attack simulation subsystem, a risk simulation subsystem and a security defense simulation subsystem. The risk simulation subsystem is used to build the risk simulation environment. The network attack simulation subsystem provides a variety of attack tools and attack parameters to realize the attack on the target object selected by the user in the risk simulation environment, and records the attack process and attack results. The security defense simulation subsystem judges whether it is necessary to adjust the security defense strategy of the target object according to the attack result, and gives a certain security defense strategy for the situation that needs to be adjusted. The invention integrates multiple attack tools, has a security rule knowledge base, can simulate multiple attack scenarios, and can adjust security defense strategies.

Description

technical field [0001] The invention relates to a network security simulation system, which belongs to the field of network security. Background technique [0002] The network security simulation environment construction method automatically constructs and tests the network environment, establishes a security risk simulation basic environment, constructs a corresponding attack model based on the network attack attack input, attack process and external environment analysis, and conducts network attack simulation; researches network system defense models and Methods: Analyze system defense node deployment and defense strength, obtain network performance data and security protection equipment performance data on the basis of automatic / semi-automatic attack simulation, and obtain attack simulation execution information through multiple comparative experiments. [0003] At present, most of the security testing and experimental environments at home and abroad are manually built, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/145H04L63/1416H04L63/1433H04L63/1441H04L63/20
Inventor 马锐葛慧顾升高孙四明马献志靳骁马宇威
Owner 中国航天系统科学与工程研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products