Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-view network attack and defense simulation system

A multi-view, network technology, applied in the field of network security, can solve the problem of difficult to recognize the whole picture of network attack and defense process

Active Publication Date: 2021-02-26
NAT UNIV OF DEFENSE TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If only from the perspective of attack, static description, it is difficult to understand the whole picture of the network attack and defense process, and the established model is also difficult to directly conduct network attack and defense deduction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-view network attack and defense simulation system
  • Multi-view network attack and defense simulation system
  • Multi-view network attack and defense simulation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0026] In one embodiment, such as figure 1 As shown, a multi-view network attack and defense simulation system is provided, including the following steps:

[0027] The network information environment module 102 is configured to configure hardware information and software information, and establish a network information system model through the hardware information and software information.

[0028] The background traffic module 104 is configured to simulate user behavior information in the network environment to obtain a background traffic model.

[0029] The attack and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a multi-view network attack and defense simulation system. The system includes: a network information environment module for configuring hardware information and software information, and establishing a network information system model through the hardware information and software information; a background traffic module for simulating user behavior information in the network environment to obtain Background traffic model; attack and defense module, used to establish network threat model according to network threat behavior and network defense model according to network defense behavior; simulation module, used to establish network information system model, background traffic model, network threat model and network defense model, Build an adaptive network attack and defense model; obtain pre-set network attack and defense simulation data, input the network attack and defense simulation data into the network attack and defense adaptive model, and output network attack and defense element data. Using this method can easily realize network attack and defense deduction.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a multi-view network attack and defense simulation system. Background technique [0002] Network attack and defense modeling can be applied to many fields such as network defense gap cognition, system security engineering, and network attack and defense simulation. [0003] To best understand the security of networked information systems, network defenders often use offensive testing techniques and assessments. These types of cybersecurity assessments come in many forms, from penetration testing to full-scale red teams and even adversary simulation exercises. Cyber ​​offensive testing can provide defenders with an attacker's perspective on network operational weaknesses, with clear benefits for defenders. , but these tests are becoming more and more expensive, time-consuming and limited by the tester's skill level, practical use may be difficult. Simulation e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/145H04L63/20
Inventor 朱承王文浩朱先强王云飞
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products