Multi-view network attack and defense simulation system

A network and network information technology, applied in the field of network security, can solve problems such as the difficulty of knowing the whole process of network attack and defense

Active Publication Date: 2020-12-18
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If only from the perspective of attack, static description, it is difficult to understand the whole picture of the network at

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-view network attack and defense simulation system
  • Multi-view network attack and defense simulation system
  • Multi-view network attack and defense simulation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0026] In one embodiment, such as figure 1 As shown, a multi-view network attack and defense simulation system is provided, including the following steps:

[0027] The network information environment module 102 is configured to configure hardware information and software information, and establish a network information system model through the hardware information and software information.

[0028] The background traffic module 104 is configured to simulate user behavior information in the network environment to obtain a background traffic model.

[0029] The attack and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multi-view network attack and defense simulation system. The system comprises: a network information environment module used for configuring hardware information and software information and establishing a network information system model through the hardware information and the software information; a background flow module which is used for simulating behavior information of a user in the network environment to obtain a background flow model; an attack and defense module which is used for establishing a network threat model according to the network threat behaviorand establishing a network defense model according to the network defense behavior; a simulation module which is used for constructing a network attack and defense adaptive model according to the network information system model, the background flow model, the network threat model and the network defense model, acquiring preset network attack and defense simulation data, inputting the network attack and defense simulation data into the network attack and defense adaptive model, and outputting network attack and defense element data. By adopting the method, network attack and defense deductioncan be easily realized.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a multi-view network attack and defense simulation system. Background technique [0002] Network attack and defense modeling can be applied to many fields such as network defense gap cognition, system security engineering, and network attack and defense simulation. [0003] To best understand the security of networked information systems, network defenders often use offensive testing techniques and assessments. These types of cybersecurity assessments come in many forms, from penetration testing to full-scale red teams and even adversary simulation exercises. Cyber ​​offensive testing can provide defenders with an attacker's perspective on network operational weaknesses, with clear benefits for defenders. , but these tests are becoming more and more expensive, time-consuming and limited by the tester's skill level, practical use may be difficult. Simulation e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/145H04L63/20
Inventor 朱承王文浩朱先强王云飞
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products