Network security emulation system and its emulation method

An analog system and network security technology, applied in the transmission system, digital transmission system, data exchange network, etc., can solve the problem that network simulation software cannot simulate and simulate targeted network security issues, so as to improve scalability and use convenient effect

Inactive Publication Date: 2006-07-19
KUNSHAN RUIXIANG XUNTONG COMM TECHCO
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the deficiency that network simulation software cannot perform targeted simulation of network security issues, and provide a network security simulation system and its simulation method to realize network security simulation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security emulation system and its emulation method
  • Network security emulation system and its emulation method
  • Network security emulation system and its emulation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] 1. System structure

[0050] refer to figure 1 , the logical structure of the network security simulation system of the present invention is composed of four parts, the virtual network module, the attack and defense dynamic link library, the system control module, and the presentation module, which cooperate with each other to form a logical structure of the network security simulation system. in:

[0051] The virtual network module is the platform and basic environment for network security simulation, and the network security simulation is carried out in the virtual network. A virtual network includes a real stand-alone environment and a virtual network environment. A real stand-alone environment refers to a stand-alone environment located in an actual physical network, where the actual network may be a local area network, a wide area network, or the Internet. A virtual network environment refers to a simulated network environment on a single host.

[0052]Offensiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network safe simulation system and relative imitation method. The logical function of said network safe simulation system comprises: a virtual network module, a attack-defend dynamic chain connection base, a system control module, and a display module, while said logical functions are displayed by the control layer, virtual network device layer, public interface layer, middle layer and bottom function base. The virtual network device can simulate the host machine, router, firewall, network card, concentrator, and network wire on the single machine to connect each virtual network device to form the virtual network. The process that using said virtual network to process the safe simulation comprises: first, setting the user program; distributing system parameter document; coding the system; imitated operating the coded system in the operating system; at last collecting the simulated data according to which makes the network safety analyst. The invention has easy operation and extended availability, which can be used as network safety research simulation environment and imitation platform.

Description

technical field [0001] The invention relates to network and information security, in particular to a network security simulation system and a simulation method thereof, which can be used for technical research and simulation in the field of computer network and network security. Background technique [0002] With the continuous development of network technology itself and the technology applied to the network, network attack and defense both ebb and flow and promote each other, and due to the continuous increase of network scale and the increasingly complex network architecture, network security issues have become more prominent. For a period of time, the research and application of network security issues have mainly focused on defense technologies. In order to know ourselves and the enemy, we should also study network attack technologies in depth and understand the principles of various network attack technologies. Generally speaking, the two should be combined and placed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26G06F17/50
Inventor 马建峰杨力杨延庆张光吴险红徐永强方波
Owner KUNSHAN RUIXIANG XUNTONG COMM TECHCO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products