Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack simulation method and system, storage medium and electronic equipment

A technology of simulating equipment and simulating methods, applied in the transmission system, electrical components, etc., can solve the problems that the response speed cannot be solved well, the load of the web server and the transmission distance cannot carry the number of users, etc., and achieve good results

Active Publication Date: 2021-09-28
丁牛信息安全科技(江苏)有限公司 +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Under the rapid development of the Internet, people have higher and higher requirements for Internet service quality and access speed, but the load and transmission distance of the Web server cannot carry a huge number of users, and the response speed is still not well resolved. Therefore, caching technology come out

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack simulation method and system, storage medium and electronic equipment
  • Attack simulation method and system, storage medium and electronic equipment
  • Attack simulation method and system, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0050] Such as figure 1 As shown, the present invention provides an attack simulation method, which is applied to an attack simulation system, and the attack simulation system includes: a Web server, a CDN server, an attack simulation device, and an access simulation device;

[0051] The web server is connected to the CDN server, and both the attack simulation device and the access simulation device are connected to the CDN server;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack simulation method and system, a storage medium and electronic equipment, which are applied to the attack simulation system, an attack simulation request is constructed through the attack simulation equipment and is sent to a CDN server, the attack simulation request is a request for a first resource stored in a Web server and not stored in the CDN server, the attack simulation request meets the request format requirement of the CDN server and does not meet the request format requirement of the Web server; the CDN server sends the attack simulation request to a Web server; the Web server returns an error response for the simulation attack request to the CDN server; the CDN server locally caches the error response as a response for the first resource; and when the CDN server receives a first resource acquisition request sent by the access simulation equipment, the CDN server returns a locally cached error response to the access simulation equipment, so that the access simulation equipment cannot acquire the first resource.

Description

technical field [0001] The invention relates to the field of computer security, in particular to an attack simulation method, system, storage medium and electronic equipment. Background technique [0002] Under the rapid development of the Internet, people have higher and higher requirements for Internet service quality and access speed, but the load and transmission distance of the Web server cannot carry a huge number of users, and the response speed is still not well resolved. Therefore, caching technology It came out. Most of the content uploaded and transmitted on the Internet is repeated Web / FTP data. The CDN server handles most web page objects (Web page objects), such as html, htm, php and other page files, gif, tif, png, bmp and other pictures and videos These files do not need to retransmit the file entity from the original website, and can directly obtain the cached copy in the CDN server, which relieves the pressure on the Web server. [0003] However, in recen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1466
Inventor 王忠儒宋首友王忠杰
Owner 丁牛信息安全科技(江苏)有限公司