Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Serial threat access management and control system and method

A control system and evaluation system technology, which is applied in the transmission system, digital transmission system, data exchange network, etc., can solve the problem of high false negative rate and false negative rate in attack recognition, unfavorable test and evaluation technology promotion, and large amount of attack tool data, etc. problems, to achieve the effect of strong data packets and processing power

Active Publication Date: 2021-06-01
中国人民解放军92493部队参谋部
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Network security test assessment is not only based on non-destructive assessment of security compliance, but also covers fierce intrusive penetration testing, etc. During the implementation process, it is inevitable to cause a certain degree of damage to the evaluated information system, some damage It is even irreversible, which is not conducive to the promotion of test evaluation technology
In network offensive and defensive confrontation activities, it is very difficult to strictly limit the use of designated technical means by both offensive and defensive parties. On the one hand, the data volume of attack tools is large, and there are high requirements for the delay of traffic entering the network under test. On the other hand, the attack data Once encapsulated into a data packet, it is difficult to be restored efficiently, resulting in a relatively high rate of false positives and false negatives in attack recognition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Serial threat access management and control system and method
  • Serial threat access management and control system and method
  • Serial threat access management and control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0027] like figure 1 As shown, it is a schematic structural diagram of the threat access management and control system of the present invention, including an application identification module 31, a label pressing module 32, a label processing module 33, a data processing module 34, a status monitoring module 35, an auxiliary decision module 36, and an initialization module 37 , a data sensor 38 and a display module 39 are serially inserted into the link between the test evaluation system 1 and the network under test 4 . The specific function process of the threat access management and control system is as follows: the attack host in the test and evaluation system 1 uses attack tools to generate attack data, and according to the pre-set white list of attack tools, after being identified by the application identification module 31, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a serial threat access management and control system and method, and the system comprises an application identification module and the like which are serially connected to a link between a test evaluation system and a tested network. An attack host in the test evaluation system generates attack data, according to a preset white list, the attack data which is identified by an application identification module and meets the white list condition can be packaged into a data packet through TCP / IP service, then a preset label is pressed into the data packet through a label press-fitting module, and the data packet enters the threat access management and control system through a gateway. And the label processing module identifies, processes and recycles the label, transmits an attack data packet to the data processing module, forwards the attack data packet and then enters a tested network for penetration test, and test data generated by the test can be directly returned to the test evaluation system through the gateway to form a service closed loop. A test evaluation means strictly controlled from a test source is adopted, the network state threat access management and control system at the beginning of evaluation is a unique, safe and controllable access channel between the test evaluation system and a tested network, and the safety of software and hardware environments of the tested network system in the test evaluation process is ensured on the basis of solving real-time data transmission.

Description

technical field [0001] The present invention relates to the field of cyberspace security, in particular to a serialized network threat access management and control system and method, and more specifically, to a network threat access management and control system for network security testing and evaluation and network virtualization shooting ranges. Background technique [0002] Faced with an increasingly complex network security environment and a wide variety of attack threats, more and more organizations and institutions realize that it is unrealistic to design an absolutely secure network system, and relying on a single defense method to respond passively after an attack occurs Unable to solve the security problem, the information system network needs to conduct an objective and comprehensive evaluation of its own security and flexibility. Under this demand situation, the test and evaluation research on network security has gradually become a research hotspot in the field ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L63/1416H04L43/0805H04L43/045
Inventor 吴磊涛刘继光姜山金振中杨豪璞佟立飞陈峰丁力军柳中华沈斌丁桐
Owner 中国人民解放军92493部队参谋部
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products