Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network shooting range security management and control system and method

A security management and control, shooting range technology, applied in the field of network security, can solve the problems of lack of scalability, inability to meet flexible management and control, and inability to achieve deep applications, so as to achieve in-depth management and control, meet flexible management and control, and achieve multi-level network security. The effect of access control

Active Publication Date: 2022-04-29
永信至诚科技集团股份有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In an existing network isolation solution for a network shooting range, the isolation and control of the network are realized by processing the monitored Address Resolution Protocol (ARP) packets, multicast or broadcast packets. However, due to the ARP The second layer wrapped in the TCP / IP protocol can only be used as the original method of network security access, with obvious defects, it cannot be applied to the environment of thousands / tens of thousands of virtual machines, it does not have good scalability, and it cannot Unable to achieve deep application
[0005] It can be seen that the existing technical solutions cannot meet the flexible management and control in the case of multi-resource access, cannot realize multi-level network security access management and control, and cannot realize high-level network security access management and control, that is, cannot guarantee large-scale resources and Access to complex networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network shooting range security management and control system and method
  • Network shooting range security management and control system and method
  • Network shooting range security management and control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0032] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network shooting range security management and control system, which comprises a plurality of physical node devices and virtual network bridges established on the physical node devices and used for performing access control in the same security domain, the virtual firewall built on the physical node equipment is used for performing access control in different security domains; and the virtual switch built on the physical node equipment is used for carrying out communication service between the physical node equipment and other physical node equipment. According to the invention, a security management and control mechanism with a network access layer, a convergence layer and a core layer is constructed through the established virtual network bridge, virtual switch and virtual firewall, multi-dimensional depth management and control of the network target range are realized, and convenience is provided for large-scale resource and complex network access. The invention further provides a network shooting range security control method.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a security management and control system and method for a network shooting range. Background technique [0002] Network shooting range is a technology or product that simulates and reproduces the network architecture, system equipment, business process operating status and operating environment in real cyberspace based on virtualization technology. Cyber ​​shooting ranges have become an essential cyberspace security core infrastructure for countries to conduct cyberspace security research, learning, testing, verification, and drills. All countries in the world attach great importance to the construction of cyber shooting ranges and regard it as an important means of supporting security capacity building. [0003] Network security is the basic capability of the cyber range platform. Business scenarios, basic applications, user behaviors, data collection and an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L12/46H04L49/10
CPCH04L63/0272H04L63/02H04L63/10H04L12/4641H04L12/462H04L49/10
Inventor 蔡晶晶陈俊张凯程磊
Owner 永信至诚科技集团股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products