Network security deduction method, device and equipment and storage medium

A technology for network security and network simulation, which is applied in the fields of equipment and storage media, network security deduction methods, and devices, and can solve the problems of inability to simulate the performance of new cyberspace equipment, inability to preview emergency response, and excessive influence of communication protocol rules.

Active Publication Date: 2020-12-11
软通智慧信息技术有限公司
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the virtual network topology environment cannot be mapped one-to-one with the real network system. Customized and modular components cannot simulate the performance of new network space equipment, and there is no link to the real information system host device attributes. The communication protocol rules have too much influence
Therefore, the accuracy of existing network security deduction methods is limited, and it is impossible to preview the emergency response after the real network is threatened.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security deduction method, device and equipment and storage medium
  • Network security deduction method, device and equipment and storage medium
  • Network security deduction method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] figure 1 It is a flow chart of a network security deduction method provided by Embodiment 1 of the present invention, and this embodiment is applicable to the situation of performing deduction on cyberspace security. The network security deduction method provided in this embodiment can be executed by the network security deduction device provided in the embodiment of the present invention, and the device can be realized by means of software and / or hardware, and integrated into the computer equipment executing the method.

[0032] see figure 1 , the method of this embodiment includes but not limited to the following steps:

[0033] S101. Determine a network to be simulated according to an information system and a data interaction service.

[0034] Wherein, the network to be simulated may be a network that matches the network environment of the real business system that needs to be simulated.

[0035] In the Internet era, especially in the smart city information system...

Embodiment 2

[0048] figure 2 It is a flowchart of a network security deduction method provided by Embodiment 2 of the present invention. The embodiments of the present invention are optimized on the basis of the foregoing embodiments. Optionally, this embodiment explains in detail the process after accessing the hardware-in-the-loop simulation system.

[0049] see figure 2 , the method of this embodiment includes but not limited to the following steps:

[0050] S201. Determine a network to be simulated according to an information system and a data interaction service.

[0051] S202, linking the network elements based on the network to be simulated, and accessing the hardware-in-the-loop simulation system.

[0052] Optionally, the accessing the hardware-in-the-loop simulation system may specifically include: simulating the physical properties of at least one network element by accessing a virtual machine; accessing at least one physical device, and the at least one physical device is ...

Embodiment 3

[0063] Figure 3A It is a flow chart of a network security deduction method provided by Embodiment 3 of the present invention. The embodiments of the present invention are optimized on the basis of the foregoing embodiments. Optionally, this embodiment explains in detail the process of simulating network attack events according to a preset virtual network attack model, performing network security deduction, and obtaining evaluation results.

[0064] refer to Figure 3A , the method of this embodiment includes but not limited to the following steps:

[0065] S301. Determine the network to be simulated according to the information system and the data interaction service.

[0066] S302, linking the network elements based on the network to be simulated, and accessing the hardware-in-the-loop simulation system.

[0067] S303. Define the number of attacking hosts, attacking locations, and attacked hosts corresponding to the preset virtual network attack model.

[0068] S304, se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a network security deduction method and device, equipment and a storage medium. The method comprises the steps of determining a to-be-simulated network according to an information system and a data interaction service; linking a network element based on the to-be-simulated network, and accessing a semi-physical simulation system; setting attributes of a node, a communication link and a network corresponding to the to-be-simulated network in the obtained semi-physical simulation system to obtain a network simulation topology; and on the network simulation topology, simulating a network attack event according to a preset virtual network attack model, performing network security deduction, and obtaining an evaluation result. According to the technicalscheme provided by the embodiment of the invention, by accessing the semi-physical simulation system, the introduction of physical equipment into the network simulation topology is realized, the network environment of a real service system can be simulated more accurately, and the accuracy of the network security deduction process is improved.

Description

technical field [0001] Embodiments of the present invention relate to network information security technology, and in particular to a network security deduction method, device, equipment, and storage medium. Background technique [0002] With the development of computer and network technology, cyberspace has gradually evolved into an objective field similar to the real existence of land, sea, air, and sky. Through the generation, storage, modification, and exchange of data, the physical system is realized Manipulate and influence human cognition and social activities. While cyberspace is getting more and more attention, the security threats and challenges it faces are also increasing day by day. The middle emerges endlessly. Therefore, network security is especially important. [0003] Existing network security deduction methods mainly rely on professional tools to build a virtual network topology environment, set communication protocol rules for hosts, servers, routers a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/20H04L41/12H04L41/145
Inventor 张艳玲柏翔雒冬梅宋朝宁
Owner 软通智慧信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products