Unlock instant, AI-driven research and patent intelligence for your innovation.

Network attack and defense deduction platform based on simulation experiment design

A simulation experiment and network technology, applied in the direction of program control design, data exchange network, calculation, etc., can solve the problems of expensive testing, time-consuming, difficult actual use, etc., and achieve the effect of easy expansion and high cohesion of system functions

Active Publication Date: 2021-01-15
NAT UNIV OF DEFENSE TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These types of cybersecurity assessments come in many forms, from penetration testing to full-scale red teams and even adversary simulation exercises. Cyber ​​offensive testing can provide defenders with an attacker's perspective on network operational weaknesses, with clear benefits for defenders. , but these tests are expensive, time-consuming and limited by the technical level of the testers, making it difficult to use them in practice

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack and defense deduction platform based on simulation experiment design
  • Network attack and defense deduction platform based on simulation experiment design
  • Network attack and defense deduction platform based on simulation experiment design

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0025] In one embodiment, such as figure 1 As shown, a network attack and defense deduction platform based on simulation experiment design is provided, including:

[0026] Model editing module 102, used for visually editing the required physical model of network attack and defense simulation;

[0027] The model assembly module 104 is used for componentizing the solid model, and combining the componentized solid models to generate a solid template running in a simulation environment;

[0028] Offensive and defensive model library 106, used to store entity models and entit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a network attack and defense deduction platform based on simulation experiment design. The network attack and defense deduction platform includes: a model editing module is used to edit the required physical model of the network attack and defense simulation in a visual manner; the model assembly module combines the componentized physical models to generate a physical template that operates in a simulation environment; experimental design The module is used to extract the uncertain factors in the network attack and defense from the entity template library as the experimental factors; the operation module is used to construct the attack and defense scenarios according to the simulation experiment examples, and call the entity model and the entity template from the attack and defense template library to construct the simulation scenario; In the simulation scenario, the simulation kernel scheduling model is driven according to the attack and defense scenario, and the analysis module is used to analyze the simulation interaction data through statistical methods to obtain the attack and defense elements that play a key role in network security. The network attack test can be realized by adopting the method.

Description

technical field [0001] This application relates to the technical field of network security simulation, in particular to a network attack and defense deduction platform based on simulation experiment design. Background technique [0002] With the wide application of network technology, network security problems are emerging one after another. Compared with the attacker, it only needs to break through a certain link in the entire network at a certain period of time to achieve the attack purpose. The defender needs to maintain the security of all links in the network around the clock. Therefore, the defender is often in a passive position, which poses a major challenge to the maintenance of network security. To best assess the security of the networked information systems that need to be protected, network defenders often use offensive testing techniques and assessments. These types of cybersecurity assessments come in many forms, from penetration testing to full-scale red tea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24G06F9/445G06F8/34G06F8/35G06Q10/06
CPCG06F8/34G06F8/35G06F9/44526G06Q10/06393H04L41/145H04L63/20
Inventor 王文浩朱承朱先强王云飞
Owner NAT UNIV OF DEFENSE TECH