Unlock instant, AI-driven research and patent intelligence for your innovation.

Network topology automatic generation method and system

A network topology and automatic generation technology, applied in the field of network security, can solve the problems that affect the effect of shooting range attack scene construction, low efficiency, poor accuracy, etc., to achieve the effect of ensuring the construction effect, high efficiency, and good accuracy

Active Publication Date: 2021-04-06
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a network topology automatic generation method and system, which can solve the problem that the existing network topology acquisition method has low efficiency and poor accuracy, thereby affecting the construction effect of the shooting range attack scene

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network topology automatic generation method and system
  • Network topology automatic generation method and system
  • Network topology automatic generation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention is described in detail below in conjunction with examples, but the present invention is not limited to these examples.

[0022] The embodiment of the present invention provides a method for automatically generating network topology, such as figure 1 As shown, the method includes:

[0023] Step 11, receiving the network address range input by the client.

[0024] Step 12, acquiring network devices and their fingerprint information within the network address range.

[0025] This step belongs to the process of asset discovery. Specifically, according to the network address segment entered by the user, all network devices and their fingerprint information within the network address range are obtained through asset scanning technology. The fingerprint information includes IP address, MAC address, device type, operating system, but not limited to this information.

[0026] Step 13. According to the network device and its fingerprint information and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network topology automatic generation method and system, belongs to the technical field of network security, and can solve the problem that an existing network topology structure acquisition mode is relatively low in efficiency and relatively poor in accuracy, so that the building effect of a target range attack scene is influenced. The method comprises the following steps: receiving a network address range input by a user side; acquiring network equipment and fingerprint information thereof within the range of the network address; performing secondary detection on the network equipment according to the network equipment, the fingerprint information of the network equipment and network equipment information in a system asset library to obtain adjacent equipment information of the network equipment; and generating a network topology according to the information of the network equipment and the adjacent equipment. The method and the system are used for generating the network topology.

Description

technical field [0001] The invention relates to a method and system for automatically generating network topology, belonging to the technical field of network security. Background technique [0002] With the rapid development of network technology, it has brought great convenience to society and human life, and created a lot of wealth. At the same time, network attacks are becoming more and more frequent. A large number of criminals and hostile forces use the network to seize ill-gotten gains, wanton destruction and illegal activities, causing great troubles to our lives. In order to cope with this severe situation, at present, the network field has been raised to the strategic height of network warfare. More and more organizations and companies are setting up cyber shooting ranges to cultivate cyber security talents through the practice of shooting ranges. [0003] In the prior art, when building a shooting range attack scene, it is usually necessary to first obtain the n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/751H04L12/24H04L45/02
CPCH04L45/02H04L41/12
Inventor 傅涛王力郑轶邓勇
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD