Network attack and defense virtual simulation and security evaluation method and system based on virtualization technology

A virtualization technology and security evaluation technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as inability to evaluate network security, expensive physical simulation platforms, and simulation systems that cannot be visualized in real time. Utilization rate, the effect of avoiding repeated investment in construction

Inactive Publication Date: 2019-08-06
XIDIAN UNIV +1
View PDF7 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is: for the above-mentioned existing network attack and defense simulation system can only simulate network protocol defects and the physical simulation platform is expensive, and the established simulation system cannot visualize the attack process in real time, and cannot perform security on the simulated network. Insufficient evaluation, a network attack and defense virtual simulation and security evaluation system based on virtualization technology is proposed to realize the simulation of network attack and defense, and support users to use the system remotely, and at the same time monitor the security parameters of the virtual target machine in real time. show out

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack and defense virtual simulation and security evaluation method and system based on virtualization technology
  • Network attack and defense virtual simulation and security evaluation method and system based on virtualization technology
  • Network attack and defense virtual simulation and security evaluation method and system based on virtualization technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Attached below figure 1 And attached figure 2 Specific implementations of the present invention are described so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0035]The network attack and defense virtual simulation and security assessment system based on virtualization technology includes: user management module, system control module, visual display module, security assessment module, network attack and defense resource library module. The user management module is responsible for authenticating and managing user identities. This module manages account information in the system, including user names, initial passwords, user groups, and possible types of network attack and defense operations. The administrator account can also maintain the virtual machine image of the system, maintain and add network attack and defense in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack and defense virtual simulation and security evaluation method and system based on a virtualization technology. The method comprises: (1) a visual display module sending a received instruction for creating a network topological graph to a system control module, creating virtual network equipment, and a network attack and defense resource library module configuring the virtual equipment according to a performed experiment category; 2) the system control module creating a network topological structure according to the instruction of creating the network topological graph; 3) after the network attack starts, the visual display module capturing the position of the data packet sent by the virtual attacker, and dynamically displaying the position of the current attack; the system control module capturing a communication network data packet between the virtual attack machine and the virtual target machine; and 4) a security evaluation module being usedfor acquiring real-time security parameters of the virtual target drone during network attack and defense simulation, displaying the real-time security parameters in real time through a visual displaymodule, and evaluating the security of the virtual target drone.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a method and system for network attack and protection virtual simulation and security evaluation based on virtualization technology. Background technique [0002] With the continuous development and application of network technology, people rely more and more on the network. At the same time, network attacks and security incidents continue to occur. The emergence of computer crimes, hacker attacks, harmful viruses and other problems have serious consequences for social stability and national security. The importance of network security has become increasingly prominent. The particularity and destructiveness of network attack and defense technology itself make it difficult to complete its study and research in a real network environment. [0003] At present, there are mainly three solutions for the existing network attack and defense simulation technology. The first i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06H04L29/08
CPCH04L41/145H04L41/22H04L63/1441H04L67/02
Inventor 谢卫强张玉清
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products