Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security test analysis system

A security testing and analysis system technology, which is applied in the field of network security testing and analysis systems, can solve problems such as poor scalability, high processing overhead, and long development cycle of proprietary chips, and achieve the effect of meeting development needs and ensuring reliability

Pending Publication Date: 2022-02-25
成都卓源网络科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The software simulation solution has flexible flow processing and high scalability, but the processing overhead is high, and it is powerless for high-speed network traffic
There are also manufacturers that use proprietary chips to process streams, such as proprietary ASIC chips, network processors NP, FPGAs, etc. Since proprietary hardware is used to process streams, the processing performance is much higher than that of software solutions, but the development cycle of proprietary chips Long time and high cost, especially the chip has solidified logic, which is suitable for a single scenario with a clear processing flow, and it has poor scalability for security scenarios that change from time to time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security test analysis system
  • Network security test analysis system
  • Network security test analysis system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] refer to figure 1 As shown, the present invention discloses a network security test and analysis system, including a configuration management layer, a traffic preprocessing layer, a traffic virtual machine layer, a traffic protocol stack layer and a driver layer arranged in sequence from top to bottom;

[0033] The configuration management layer is used to format the user's configuration management requirements for the system and traffic into a configuration file and save it in the configuration management database for parsing and execution by the lower layers;

[0034] The first layer is defined as the configuration management layer. This layer includes network topology settings, application type selection, traffic mixing settings, security attack script selection, security attack parameter configuration, system environment settings, user settings and other system configuration management. The configuration management layer is mainly responsible for formatting the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security test analysis system. The system comprises a configuration management layer, a traffic preprocessing layer, a traffic virtual machine layer, a traffic protocol stack layer and a driving layer which are sequentially arranged from top to bottom, the configuration management layer is used for formatting configuration management requirements of a user on a system and flow into configuration files and storing the configuration files in a configuration management database for a lower layer to analyze and execute; the traffic preprocessing layer is used for traffic data preprocessing, statistical data processing and test management; the traffic virtual machine layer is used for scheduling and executing concurrency of a traffic virtual machine; the traffic protocol stack layer is used for TCP / IP protocol stack state management in a traffic generation process; and the driving layer is used for inputting and outputting network packets and solving IO of high-speed network packets of the network card.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a network security test and analysis system. Background technique [0002] The realization of attack simulation, especially the realization of high performance, depends on powerful computing power and large enough memory space on the one hand, and depends on the bandwidth that the data path can support on the other hand. If any aspect becomes a bottleneck, it will affect the performance of the system. [0003] The core of attack simulation is to generate network security traffic. In the current industry and academia, there are mainly two solutions for generating network traffic: software simulation and proprietary hardware. The software simulation solution has flexible flow processing and high scalability, but has a large processing overhead and cannot do anything for high-speed network traffic. There are also manufacturers that use proprietary chips to proc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/20
Inventor 许智君黄昊杨鑫
Owner 成都卓源网络科技有限公司