Network attack scene reproduction method and system, equipment and storage medium
A network attack and scene technology, applied in the field of network security, can solve the problems of unable to meet the requirements of key information infrastructure defense system testing and personnel ability training, and unable to realize network data flow output, so as to facilitate user operation and enhance user experience Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] like figure 1 As shown, a method for reproducing a network attack scenario includes:
[0045] S101. Select network attack samples, scenario templates and senders, and import corresponding network attack samples and scenario templates;
[0046] S102, setting parameters of network attack samples and scene templates;
[0047] S103, apply for resources according to the set network attack samples and scene templates, rebuild the topological structure of the network attack samples, and simulate the topological nodes of the network attack samples;
[0048] S104. The sender receives network attack samples and background traffic, downloads the background traffic, and sends traffic data to the topological nodes of each network attack sample, and the scene reproduction data is displayed in real time.
[0049] In step S102, after the setting is completed, it is saved, and when it is reproduced next time, one can be selected from the saved set network attack samples and scene temp...
Embodiment 2
[0063] A network attack scene reproduction system, including a controller, a transmitter, and a data center; wherein, the data center is used to store network attack samples, background traffic, and scene templates;
[0064] The controller is used to select network attack samples, scenario templates and transmitters, import corresponding network attack samples and scenario templates from the data center; set parameters of network attack samples and scenario templates; apply for resources according to the set network attack samples and scenario templates, and rebuild The topological structure of the network attack sample simulates the topological nodes of the network attack sample; the transmitter is used to receive the network attack sample and background traffic issued by the controller, so as to download the background traffic from the data center, and send traffic data according to the control command of the controller Go to the topological nodes of each network attack sampl...
Embodiment 3
[0086] An apparatus comprising: one or more processors; memory for storing one or more programs which, when executed by the one or more processors, cause the One or more processors execute the method as described above.
[0087] A storage medium storing a computer program, which implements the method as described in Embodiment 1 above when the program is executed by a processor.
[0088] Figure 4 It is a schematic structural diagram of a device provided by an embodiment of the present invention.
[0089] like Figure 4 As shown, as another aspect, the present application also provides a device 500, including one or more central processing units (CPU) 501, which can be 508 programs loaded into random access memory (RAM) 503 to execute various appropriate actions and processes. In the RAM 503, various programs and data necessary for the operation of the device 500 are also stored. The CPU 501 , ROM 502 , and RAM 503 are connected to each other via a bus 504 . Also connect...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


