Testing method, device, equipment and storage medium based on attack traffic

A technology for attacking traffic and test methods, applied in the field of testing, can solve problems such as inaccurate test results and low data processing efficiency, and achieve the effects of enriching and diversifying tests, improving test accuracy, and improving data processing efficiency

Active Publication Date: 2021-06-29
北京网测科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a test method, device, equipment and storage medium based on attack traffic to solve the problems of low data processing efficiency and inaccurate test results existing in the existing test process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Testing method, device, equipment and storage medium based on attack traffic
  • Testing method, device, equipment and storage medium based on attack traffic
  • Testing method, device, equipment and storage medium based on attack traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0075] With the rapid development of information technology and the continuous emergence of the Internet, mobile terminals, and instant messaging, network security threats have surged. In recent years, problems such as data leakage and cloud platform security risks have become increasingly serious, and cybersecurity challenges related to emerging technologies such as blockchain and Inter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a test method, device, device and storage medium based on attack traffic. The test equipment loaded with the DPDK program obtains the original attack traffic packet and modifies the original attack traffic packet based on the construction jumper to generate at least one The attack traffic packet to be tested is sent to the device under test by sending at least one test data packet corresponding to each attack traffic packet to be tested, and receiving at least one feedback data packet returned by the device under test, and finally according to the transmission of at least one test data packet information and the reception information of at least one feedback data packet to determine the test result of the device under test. In this technical solution, the processing is based on the test equipment loaded with the DPDK program, which improves the data processing efficiency, and realizes the personalized customization of the attack traffic information to be tested by building a jumper, enriching the diversification of the attack traffic test, improving test accuracy.

Description

technical field [0001] The present application relates to the technical field of testing, and in particular to a testing method, device, equipment and storage medium based on attack traffic. Background technique [0002] With the rapid development of information technology, various new technologies, new formats, and new applications are constantly emerging, and network security threats have surged. Issues such as data leakage and cloud platform security risks are becoming more and more severe, and cybersecurity challenges related to emerging technologies such as blockchain and Internet of Vehicles are also increasing. Faced with the strong demand for network security products, services, and solutions in key industries such as industry, finance, and energy, and emerging industries such as e-commerce and smart cities, how to determine the performance and security protection capabilities of network security products such as network security companies and Internet companies is v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/55
CPCG06F21/55H04L63/1408H04L63/1416H04L63/1433
Inventor 李海峰
Owner 北京网测科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products