Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for automatically generating network topology

A network topology and automatic generation technology, applied in the field of network security, can solve the problems of poor accuracy, low efficiency, affecting the construction effect of shooting range attack scenes, etc., and achieve the effect of good accuracy, high efficiency, and guaranteed construction effect.

Active Publication Date: 2021-12-14
JIANGSU BOZHI SOFTWARE TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a network topology automatic generation method and system, which can solve the problem that the existing network topology acquisition method has low efficiency and poor accuracy, thereby affecting the construction effect of the shooting range attack scene

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for automatically generating network topology
  • A method and system for automatically generating network topology
  • A method and system for automatically generating network topology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention is described in detail below in conjunction with examples, but the present invention is not limited to these examples.

[0020] The embodiment of the present invention provides a method for automatically generating network topology, such as figure 1 As shown, the method includes:

[0021] Step 11, receiving the network address range input by the client.

[0022] Step 12, acquiring network devices and their fingerprint information within the network address range.

[0023] This step belongs to the process of asset discovery. Specifically, according to the network address segment entered by the user, all network devices and their fingerprint information within the network address range are obtained through asset scanning technology. The fingerprint information includes IP address, MAC address, device type, operating system, but not limited to this information.

[0024] Step 13. According to the network device and its fingerprint information and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network topology automatic generation method and system, which belong to the technical field of network security and can solve the problem that the existing network topology acquisition method has low efficiency and poor accuracy, thereby affecting the construction effect of shooting range attack scenes. The method includes: receiving a network address range input by a user terminal; obtaining network devices within the network address range and their fingerprint information; and performing a secondary operation on the network devices according to the network devices and their fingerprint information and the network device information in the system asset library. Probe to obtain the information of the adjacent equipment of the network equipment; generate the network topology according to the information of the network equipment and the adjacent equipment. The invention is used for the generation of network topology.

Description

technical field [0001] The invention relates to a method and system for automatically generating network topology, belonging to the technical field of network security. Background technique [0002] With the rapid development of network technology, it has brought great convenience to society and human life, and created a lot of wealth. At the same time, network attacks are becoming more and more frequent. A large number of criminals and hostile forces use the network to seize ill-gotten gains, wanton destruction and illegal activities, causing great troubles to our lives. In order to cope with this severe situation, at present, the network field has been raised to the strategic height of network warfare. More and more organizations and companies are setting up cyber shooting ranges to cultivate cyber security talents through the practice of shooting ranges. [0003] In the prior art, when building a shooting range attack scene, it is usually necessary to first obtain the n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/751H04L12/24H04L45/02
CPCH04L45/02H04L41/12
Inventor 傅涛王力郑轶邓勇
Owner JIANGSU BOZHI SOFTWARE TECH CO LTD