Method and device for maximizing attack flow in shooting range environment based on ks detection

A technology for attacking traffic and environment, applied in the field of network security, it can solve the problems of inability to adjust the attack traffic, form an avalanche effect, and the attack node cannot perceive the load status of the target node, and achieve the effect of maximizing the training effect.

Active Publication Date: 2020-12-29
南京赛宁信息技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The existing network shooting range traffic attack methods have the following deficiencies: 1. The attack node cannot perceive the load status of the target node, resulting in the traffic of the target node cannot be filled, which affects the final verification effect of the shooting range; 2. When the target node traffic is overloaded, its The response speed will be slower, because the total IO resources are limited, so this type of node will slow down the traffic sending frequency of the attacking node; the lowering of the attacking node's sending frequency will affect its traffic sending efficiency to other attacked nodes in the shooting range, which in turn will cause the entire shooting range The attack traffic is unbalanced, forming an avalanche effect and reducing the experimental effect of the shooting range; 3. The attack node can only send traffic to the target node according to the simple traffic behavior preset in the control node (such as 100 times per minute), and cannot dynamically according to the actual load of the target Adjust the attack traffic; the preset traffic is more empirical data, which is not completely consistent with the actual traffic receiving ability of the target node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for maximizing attack flow in shooting range environment based on ks detection
  • Method and device for maximizing attack flow in shooting range environment based on ks detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0030] The attack flow maximization scheme using KS detection in the embodiment of the present invention is based on the following facts: 1. The machine load is closely related to the program currently running on the machine, but the response time in a certain environment conforms to a specific distribution; 2. In the real shooting range environment The load of the machine will not change rapidly, that is, the real response time distribution of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for maximizing attack traffic in a shooting range environment based on KS detection. The method counts the response time of each attack traffic and calculates two response times in a specified time window and its nearest sub-time window respectively. distribution, and judge whether it is the same distribution. For the situation that does not belong to the same distribution, first try to increase the attack traffic to determine the direction of traffic adjustment, and then increase or decrease the attack traffic to the target node to make the two response time distributions belong to the same distribution. distribution to maximize attack traffic. Compared with the prior art, the present invention uses the KS detection algorithm to evaluate the load of the target node, and dynamically adjusts the flow rate of the target node, so that the entire shooting range will not cause flow imbalance due to a node overload, or the flow is too small to affect the overall training and verification of the shooting range Effect.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a method and device for maximizing attack traffic in a shooting range environment based on KS (Kolmogorov-Smirnov) detection. Background technique [0002] The network shooting range is a test platform that simulates the real cyberspace offensive and defensive combat environment through virtualization technology, and can support combat capability research and weapon equipment verification. In order to achieve the above purpose, in the actual training or verification process, it is necessary to apply attack traffic to the target node under study (i.e., the target machine) to simulate various complex scenarios in the real environment. The size of the attack traffic and the robustness of the research results Proportional to sex. [0003] The deployment of the network shooting range is as follows: figure 1 As shown, it is mainly composed of target nodes, attack nodes, co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/18
CPCH04L67/1008H04L67/1012H04L67/1029H04L63/1416G06F17/18H04L67/1001
Inventor 殷庆荣谢峥高庆官唐海均王国伟
Owner 南京赛宁信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products