Unlock instant, AI-driven research and patent intelligence for your innovation.

Network attack scene reproduction method and system, equipment and storage medium

A network attack and scene technology, applied in the field of network security, can solve the problems of unable to meet the requirements of key information infrastructure defense system testing and personnel ability training, and unable to realize network data flow output, so as to facilitate user operation and enhance user experience Effect

Inactive Publication Date: 2020-03-31
成都天和讯达科技有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] At present, there are existing network attack and defense training systems in the industry, such as the network security shooting range solution of Yongxin Zhicheng Company, which mainly provides targets for network attack training, panoramic sand table, topology scene construction, training evaluation, etc. The network traffic is mainly in Inside the shooting range platform, it is impossible to realize the output of network data traffic according to special needs; the existing network traffic construction system, such as Spirent’s Sprint Cyberflood solution, mainly realizes the output of known attack loads and background traffic, which cannot meet the requirements for key Requirements for information infrastructure defense system testing and personnel capability training

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack scene reproduction method and system, equipment and storage medium
  • Network attack scene reproduction method and system, equipment and storage medium
  • Network attack scene reproduction method and system, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] like figure 1 As shown, a method for reproducing a network attack scenario includes:

[0045] S101. Select network attack samples, scenario templates and senders, and import corresponding network attack samples and scenario templates;

[0046] S102, setting parameters of network attack samples and scene templates;

[0047] S103, apply for resources according to the set network attack samples and scene templates, rebuild the topological structure of the network attack samples, and simulate the topological nodes of the network attack samples;

[0048] S104. The sender receives network attack samples and background traffic, downloads the background traffic, and sends traffic data to the topological nodes of each network attack sample, and the scene reproduction data is displayed in real time.

[0049] In step S102, after the setting is completed, it is saved, and when it is reproduced next time, one can be selected from the saved set network attack samples and scene temp...

Embodiment 2

[0063] A network attack scene reproduction system, including a controller, a transmitter, and a data center; wherein, the data center is used to store network attack samples, background traffic, and scene templates;

[0064] The controller is used to select network attack samples, scenario templates and transmitters, import corresponding network attack samples and scenario templates from the data center; set parameters of network attack samples and scenario templates; apply for resources according to the set network attack samples and scenario templates, and rebuild The topological structure of the network attack sample simulates the topological nodes of the network attack sample; the transmitter is used to receive the network attack sample and background traffic issued by the controller, so as to download the background traffic from the data center, and send traffic data according to the control command of the controller Go to the topological nodes of each network attack sampl...

Embodiment 3

[0086] An apparatus comprising: one or more processors; memory for storing one or more programs which, when executed by the one or more processors, cause the One or more processors execute the method as described above.

[0087] A storage medium storing a computer program, which implements the method as described in Embodiment 1 above when the program is executed by a processor.

[0088] Figure 4 It is a schematic structural diagram of a device provided by an embodiment of the present invention.

[0089] like Figure 4 As shown, as another aspect, the present application also provides a device 500, including one or more central processing units (CPU) 501, which can be 508 programs loaded into random access memory (RAM) 503 to execute various appropriate actions and processes. In the RAM 503, various programs and data necessary for the operation of the device 500 are also stored. The CPU 501 , ROM 502 , and RAM 503 are connected to each other via a bus 504 . Also connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack scene reproduction method and system, equipment and a storage medium, and belongs to the technical field of network security. The method comprises the following steps: selecting a network attack sample, a scene template and a transmitter, and importing the corresponding network attack sample and scene template; setting parameters of a network attack sampleand a scene template; reconstructing a topological structure of the network attack sample according to the set network attack sample and the scene template application resource, and simulating a topological node of the network attack sample; and the transmitter receiving the network attack samples and the background traffic, issuing the network attack samples and the background traffic, and transmitting traffic data to the topology node of each network attack sample, and displaying scene reproduction data in real time. Aiming at the technical problem that the requirements for key information infrastructure defense system testing and personnel ability training cannot be met in the prior art, key information infrastructure network attack traffic scene reproduction can be realized, and an effective network security capability improvement support means is provided for related personnel.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a method, system, equipment and storage medium for reproducing a network attack scene. Background technique [0002] Key information infrastructure is defined as: information systems or industrial control systems that provide network information services to the public or support the operation of important industries such as energy, communications, finance, transportation, and public utilities; and once a network security incident occurs in these systems, it will affect important industries. Normal operation will cause serious losses to the country's politics, economy, science and technology, society, culture, national defense, environment, and people's lives and property. [0003] At present, cyberspace has become the fifth space in parallel with air, land, sea and space. Whether it is national security and interests, or military joint operations, it is increasin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L41/12H04L41/145H04L63/1458H04L67/02
Inventor 唐敏吴颖张戎
Owner 成都天和讯达科技有限公司