CN101188493A - Teaching and testing device for network information security - Google Patents

Teaching and testing device for network information security Download PDF

Info

Publication number
CN101188493A
CN101188493A CNA2007100563139A CN200710056313A CN101188493A CN 101188493 A CN101188493 A CN 101188493A CN A2007100563139 A CNA2007100563139 A CN A2007100563139A CN 200710056313 A CN200710056313 A CN 200710056313A CN 101188493 A CN101188493 A CN 101188493A
Authority
CN
China
Prior art keywords
experiment
sharing module
network
safety means
main frame
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007100563139A
Other languages
Chinese (zh)
Other versions
CN101188493B (en
Inventor
张洪海
郭东伟
蒋一州
王陈章
尚中飞
曹岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGRUAN JIDA INFORMATION TECHNOLOGY Co Ltd JILIN
Original Assignee
ZHONGRUAN JIDA INFORMATION TECHNOLOGY Co Ltd JILIN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGRUAN JIDA INFORMATION TECHNOLOGY Co Ltd JILIN filed Critical ZHONGRUAN JIDA INFORMATION TECHNOLOGY Co Ltd JILIN
Priority to CN2007100563139A priority Critical patent/CN101188493B/en
Publication of CN101188493A publication Critical patent/CN101188493A/en
Application granted granted Critical
Publication of CN101188493B publication Critical patent/CN101188493B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention provides a network information security teaching test device which is composed of a software platform and a hardware system that comprises an center device, a batch control device and a security device; wherein, the center device is used for providing services for the communication of a management machine and the security device as well as a student machine; and for the construction of a network topological structure that can be built up with a variety of types for network physical connection, the security device connects with the sharing module of the batch control device, and has two work modes of a switch mode and a fireproof wall mode; the batch control device consists of six sharing modules, each of which includes five communication ports, and the port mark is from Port1 to Port5; the sharing module is provided with the function of data collection, and a lab host machine exchanges data via the sharing module. The network information security of the invention has comprehensive content, and the virtual machine technology is adopted in the lab to effectively control and simulate the real lab environment and to enable the students to learn the real knowledge about information security, and to reduce the maintenance work of the lab.

Description

Teaching and testing device for network information security
Technical field:
The invention provides a kind of teaching and testing device for network information security, be used for the teaching experiment system that colleges and universities' information security and relevant speciality are developed, belong to network information instructional technology field.
Background technology:
The network information security that the present invention relates to is one and is converged by all multi-subject knowledges such as computer, communication, microelectronics, mathematics and to form comprehensive ambit.Simultaneously, the network information security also is a complicated system engineering, and it relates to the various aspects such as laws and regulations, security management system of exploitation, information security of transmission, information system and business application system of structure, the network information of information capital construction, network and system.
At present, the network information security is also changed into the emphasis of the Web-based instruction just gradually in each big colleges and universities.But, also there is following problem in network information security education experiment: the scarcity of network information security teaching facilities, the network information security experimental situation of Pu Jiing not, lack concrete experiment instruction, there is not the complete education experiment system of a cover, cause the student to the practical application of learning network information security, theory disconnects mutually with reality, brings difficulty for student's learning network information security relevant knowledge.
Summary of the invention:
The invention provides a kind of teaching and testing device for network information security, be used for the teaching that colleges and universities' information security and relevant speciality are developed, this system can set up perfect information security Experiment Teaching System for colleges and universities.Make the student can deep enoughly understand the information security relevant knowledge, system grasps information security basic theory, safe practice inherent mechanism and implementation.
Technical solution of the present invention is as follows: be made up of hardware system and software platform that central apparatus, group control equipment, safety means constitute, central apparatus is 24 a mouthfuls/100M switch, group control equipment is made up of 65 mouthfuls/100M hubs, and the Master Control Center platform provides the foundation for building network configuration flexibly; Communicating by letter with safety means and student's machine for supervisor (main frame of operational system service software bag) provides service; Simultaneously, the Master Control Center platform also possesses data exchanging function, can carry out the control and the management of network configuration intelligently, realized that a kind of network physical connects and to have built polytype network topology structure (comprising real enterprise network infrastructure), and can between the networks of different type topological structure, carry out soft handover, can also expand accordingly experiment content and experiment number as required.
Safety means comprise 4 ports, and port-mark is Port1 to Port4, and wherein Port1-Port3 links to each other with group control equipment sharing module, and Port4 is connected on the Master Control Center platform.Safety means have two kinds of mode of operations: mode switcher and fire compartment wall pattern.When safety means were operated in mode switcher, its network role of bearing only was a switch, and the interior network configuration of experimental group this moment is the whole network environment, can carry out free communication between the experiment main frame; When safety means are operated in the fire compartment wall pattern, the network role that deletes that it is born is enterprise's perimeter firewall, and the interior network configuration of experimental group this moment is food industry network environment, the main frame that is connected with group control equipment sharing module 1 is the corporate intranet main frame, the rich machine that is connected with sharing module 2 is enterprise's DMz district main frame, the card machine that is connected with sharing module 3 is the outer net main frame, utilizes experiment main frame remote access safety means to realize the configuration of peace with strategy.Switching and management to the safety means mode of operation are finished by the system service software kit, need not the hardware plug, also need not restart the real-time switching that just can finish between two kinds of network configurations by safety means.
Group control equipment comprises 6 sharing module, and each sharing module comprises 5 communication port, and port-mark is Port1 to Port5.Sharing module possesses the function of data acquisition, and the experiment main frame carries out exchanges data by sharing module.
Software platform comprises system service software kit and network information security experiment porch, and student's machine is installed network information security experiment porch, supervisor installation system service software bag.
The system service software kit provides Web, FTP, DNS, DHCP and Email service, and safety means are carried out telemanagement.
The student carries out network information security experiment on network information security experiment porch, platform operates in the Window/Linux virtual machine.
The host role title is followed successively by host A, B, c, D, E and F in the experimental group, host A, B link to each other with Port1, the Port2 of sharing module T1 in the group control equipment respectively, main frame c, D link to each other with Port1, the Port2 of sharing module T2 in the group control equipment respectively, and main frame E, F link to each other with Port1, the Port2 of sharing module T3 in the group control equipment respectively; The Port3 of group control equipment sharing module T1 links to each other with the Port1 of safety means, and the Port3 of sharing module T2 links to each other with the P0rt2 of safety means, and the Port3 of sharing module T3 links to each other with the Port3 of safety means; The Port4 of safety means links to each other with the Master Control Center platform; Supervisor (the also main frame of operational system service software bag is installed) links to each other with the Master Control Center platform, is responsible for the experiment main frame various services are provided, and the mode of operation of safety means is managed (mode switcher or fire compartment wall pattern).
Experiment content comprises: cryptography experiment, cryptographic applications experiment, PKI application experiment, security audit experiment, unit attacking and defending experiment, network attacking and defending experiment, Host Security experiment, viral attacking and defending experiment, fire compartment wall experiment, intrusion detection experiment, far away, long-range back door implantation, IDS and firewall linkage, invasion moving net BBS and the DMZ district safety experiment of overflowing of vpn experiment, experiment content covers Windows and Linux two big mainstream operation systems.
Hardware platform is characterised in that: need not to change network physical and connect, realize that the multiple network topological structure automaticallyes switch, and makes up real enterprise network environment.
The course of work of teaching and testing device for network information security of the present invention is as follows:
At first, according to the connection mode of concrete central apparatus, group control equipment, safety means, a group control equipment connects 6 experiment main frames, and group control equipment links to each other with central apparatus by erection unit.Every experiment main frame has been installed teaching and testing device for network information security software systems-network information security experiment porch (operating in Windows and the Linux virtual machine), locatees concrete experiment content and experiment main frame institute's role in experiment by the control safety means.
Good effect of the present invention is: network information security content is comprehensive, theory and practice is laid equal stress on, contents such as basic theory and experimental principle have all been arranged for each experiment, make student's knowwhy that study is earlier closed before the experiment beginning, cooperate experimentation, make student's association's basic theories in the study practical operative ability.Adopt virtual machine technique in the experiment, effectively control and simulate true experimental situation, make the student can learn real information security knowledge, and reduce breadboard maintenance work; Native system with various software organic combinations to the unified platform, comprehensively surveillance, comprehensive process of presenting information safety in detail; Dangerous technology such as virus, leak, wooden horse are carried out the controllability transformation, increase the fail safe of laboratory machine, when making the student learn the information security principle, can not work the mischief system and host.
Description of drawings
Fig. 1 is an experimental provision hardware connection layout of the present invention;
Fig. 2 is operated in mode switcher figure for safety means;
Fig. 3 is operated in the enterprise firewall ideograph for safety means.
Embodiment
Embodiment 1
Hardware system
Group control equipment is made up of 65 mouthfuls/100M hubs.Central apparatus is 24 a mouthfuls/100M switch, and safety means are made up of public affairs control PC and the Endian Firewall release2 Linux operating system of increasing income.Wherein public control PC adopts Taiwan SYS-7464VEA mainboard, built-in 1 Intel Mobile PIII 650MHz CPU, 4 plates carry 10Base/100Base TX network interface card and 2 USB2.0 interfaces, this granddad is controlled PC and is adopted 256M DDR333 notebook type internal memory and 80G easily to open up hard disk
Network information security teaching experiment system is an experimental group with per 6 people, and distributes safety means and 3 hubs, and a group control equipment can be supported two experimental group at most.
As shown in Figure 1: the experimental provision hardware connection mode is connected to example with 1 group control equipment, 1 safety means (1 experimental group) with central apparatus, and the host role title is followed successively by student's machine A, B, C, D, E and F in the experimental group.Student's machine A, B link to each other with Port1, the Port2 of group control equipment hub 2 respectively; Student's machine C, D link to each other with Port1, the Port2 of group control equipment hub 5 respectively; Student's machine E, F link to each other with Port1, the Port2 of group control equipment hub 6 respectively.The Port3 of group control equipment hub 2 links to each other with the Port1 of safety means; The Port3 of group control equipment hub 5 links to each other with the Port2 of safety means; The Port3 of group control equipment hub 6 links to each other with the Port3 of safety means.The Port4 of safety means links to each other with central apparatus.
Experiment management machine (the also main frame of operational system service software bag is installed) links to each other with central apparatus.Group control equipment is the underlying hardware device of realizing between student's machine, communicating by letter between student's machine and supervisor, student's machine and safety means, is the elementary cell of experiment expansion.
Group control equipment can well be realized the grouping in twos of experimenter in the experimental group, be that student's machine A, B are an experiment group, C, D are an experiment group, E, F are an experiment group, get final product mutual communication between experiment group, also can isolate (preventing that the local network flow from propagating into other experiment group) mutually.In addition, group control equipment also has dynamic buffer distribution, balance network load function.
Central apparatus is an important hardware unit of realizing that supervisor and safety means, experimental group are communicated by letter with experimental group.Supervisor carries out schema management by central apparatus to the safety means of each experimental group, whole Experimental Network is carried out topological structure switch, three kinds of service: DNS, DHCP and Email service that student's machine obtains indirectly by central apparatus that supervisor provides.
Safety means are important hardware units of realizing the multiple network topological structure, are the elementary cells that experiment is expanded.Safety means possess two kinds of mode of operations: switch mode and enterprise firewall pattern.Can switch in real time the mode of operation of safety means by supervisor according to the experiment needs, and this real-time switching need not hardware device is carried out cold and hot plug, need not hardware device is restarted, need not operating system is restarted, and has accomplished that truly a kind of network physical connects realization multiple network topological structure: switch network architecture and enterprise network infrastructure.
As shown in Figure 2, when safety means were operated in switch mode, kernel program can be bridged to its 4 network interfaces in the self-defined bridge, and 4 members (i.e. 4 network interfaces) in this bridge have just realized mutual switched communication.And the network function that safety means had of this moment only is the exchanges data communication that realizes between 4 network interfaces of base, and its network role is a switch, and Port4 is cascaded to the exchanges data communication that has then realized on the central apparatus between experimental group.Whole topology of networks is switch network architecture (network topology structure one).
When safety means are operated in the enterprise firewall pattern, kernel program can be bridged to Port1, Port2t and Port3 respectively in 3 different bridges, communication between them is subjected to the constraint of firewall policy, it is intrafascicular approximately that Port4 then has neither part nor lot in firewall policy, have only safety means are provided with suitable perimeter firewall strategy, can realize the limited data communication between Port1, Port2 and Port3.The network function that safety means had of this moment then is enterprise's perimeter firewall function, and its network role is an enterprise firewall.Network topology structure in the experimental group is enterprise network infrastructure (network topology structure two), and is separate between experimental group.
As shown in Figure 3, the network area that is connected with Port1 is called Intranet (Green Zone), and host A, B are positioned at Intranet; The network area that is connected with Port2 is called DMZ (orange district), and host C, D are positioned at the DMZ district; The network area that is connected with Port3 is called outer net (red sector), and main frame E, F are positioned at outer net.Have only by intranet host and can the enterprise firewall strategy of safety means be provided with.
No matter which kind of pattern safety means are operated in, and Port4 is connected with central apparatus all the time, have only by Port4 and can realize the management of supervisor to safety means.
Network topology structure one has realized 6 any switched communications of main frame in the experimental group, utilizes this network configuration can carry out experiments such as cryptography, main frame attacking and defending; Second network topology structure has realized a real enterprise network environment, utilizes this structure can carry out experiments such as VPN, DMZ district safety.
2, software systems
Software systems are teaching and testing device for network information security software, comprise network information security experiment porch and system service software kit.On network information security experiment porch, carry out network information security experiment; The system service software kit provides DNS, DHCP and Email service for the experiment main frame, and safety means are carried out telemanagement; Virtual machine technique is introduced on teaching and testing device for network information security innovation ground, and effectively the control system state embodies real network environment and shielding castle environmental difference.
On network information security experiment content, related to many aspects such as cryptography, Host Security, network attacking and defending and security audit, cover Windows and Linux two big mainstream operation systems simultaneously.In addition, also for teachers ' teaching and the student operation that experimentizes provides experimental teaching material, the teacher can take as an elective course the experiment that teaching material is listed according to the actual situation of giving lessons, also can the new experiment of information security teaching experiment platform customization Network Based.
Embodiment 2
With the experiment of a study asymmetric cryptographic algorithm (RSA cryptographic algorithms), further specify the operation principle of this device below.
Before experimentizing, the related subject that teaching material carries out or experiment porch provides is carried out the study of pre-knowledge by experiment.Two experiment main frames (experiment role respectively be defined as host A and host B) the common cooperation of this requirement of experiment under same sharing module finished.Host A, B all start the network information security experiment porch in the Windows virtual machine, and open network information security tool box, enter [RSA cryptographic algorithms] interface by instrument guide; That host A generates in the PKI tab is public, private key (can observe the RSA public affairs in the demonstration district, private key generates and add, decrypting process), at the private key of encrypting tab utilization generation one section plaintext is carried out the rsa encryption operation, and the RSA ciphertext that generates is exported in the share directory; Host B imports the RSA ciphertext in the share directory, utilizes PKI that it is carried out the RSA deciphering, (can demonstrate by deciphering and observe decrypting process) during plaintext promptly is presented at and expressly distinguishes.Finished the process of file encryption, Network Transmission and a file decryption thus, experimentation more closing to reality is used.
Embodiment 3:
Suppose that two strange land main frames will will carry out safe and reliable message transmission in network, mode transfer files in network that they combine with asymmetric-key encryption by symmetric key encryption.
Be received as example with host A transmission, host B, carry out implementation:
Host A generates the RSA public private key pair, and PKI is informed host B, and private key oneself keeps; Equally, host B generation RSA PKI key is right, and just PKI is informed host A, and private key oneself keeps; Host A enters network information security experiment porch, opens the tool box, selects " encrypting and decrypting " instrument.Utilize PKI tab in the RSA cryptographic algorithms generate public, private key is right, then PKI is sent to host B, private key oneself reservation with the form of mail; Host A utilizes the encryption tab in the des encryption algorithm to generate session key k, will utilize key k that text m is encrypted, and generates ciphertext c; Host A is calculated informative abstract a by the MD5 hash function from text m information, and with the RSA private key of oneself informative abstract a is encrypted, and obtains the data word name s of host A; Host A obtains rk with the public key encryption session key k of host B; Host A will send to host B by the message packet that ciphertext c, digital signature s and encrypted session key rk form; After host B is received message packet, with the private key of oneself encrypted session key rk is deciphered earlier, obtain session key k; Host B to ciphertext c deciphering, obtains information original text m with session key k; Host B is deciphered digital signature s with the PKI of host A, obtains at the informative abstract ba of host A to text; Host B compares with the informative abstract that obtains from the message packet deciphering and with ba, if the two identical file that then shows was not distorted in transmission course, the original text m that deciphers from message packet is sent by host A.

Claims (3)

1. teaching and testing device for network information security is characterized in that: forms by hardware system and software platform that central apparatus, group control equipment, safety means constitute,
Central apparatus is 24 a mouthfuls/100M switch, is used for supervisor and communicates by letter with safety means and student's machine service is provided; Be used for the network physical connection and can build polytype network topology structure, and can between the networks of different type topological structure, carry out soft handover, can also expand accordingly experiment content and experiment number;
Safety means comprise 4 ports, and port-mark is Port1 to Port4, and wherein Port1-Port3 links to each other with group control equipment sharing module, and Port4 is connected on the Master Control Center platform; Have two kinds of mode of operations of mode switcher and fire compartment wall pattern;
When mode switcher, the network configuration in the experimental group is the whole network environment, can carry out free communication between the experiment main frame;
When the fire compartment wall pattern, network configuration in the experimental group is the enterprise network environment, the main frame that is connected with group control equipment sharing module 1 is the corporate intranet main frame, the main frame that is connected with sharing module 2 is enterprise's DMZ district main frame, the main frame that is connected with sharing module 3 is the outer net main frame, utilizes experiment main frame remote access safety means to realize the configuration of security strategy;
Group control equipment comprises 6 sharing module, and each sharing module comprises 5 communication port, and port-mark is Port1 to Port5; Sharing module possesses the function of data acquisition, and the experiment main frame carries out exchanges data by sharing module;
Software platform comprises system service software kit and network information security experiment porch, and student's machine is installed network information security experiment porch, supervisor installation system service software bag.
The system service software kit provides Web, FTP, DNS, DHCP and Email service, and safety means are carried out telemanagement.
The student carries out network information security experiment on network information security experiment porch, platform operates in the Window/Linux virtual machine.
2. experimental provision according to claim 1, it is characterized in that: the host role title is followed successively by host A, B, C, D, E and F in the experimental group, host A, B link to each other with Port1, the Port2 of sharing module T1 in the group control equipment respectively, host C, D link to each other with Port1, the Port2 of sharing module T2 in the group control equipment respectively, and main frame E, F link to each other with Port1, the Port2 of sharing module T3 in the group control equipment respectively; The Port3 of group control equipment sharing module T1 links to each other with the Port1 of safety means, and the Port3 of sharing module T2 links to each other with the P0rt2 of safety means, and the Port3 of sharing module T3 links to each other with the Port3 of safety means; The Port4 of safety means links to each other with the Master Control Center platform; Supervisor links to each other with the Master Control Center platform, is responsible for the experiment main frame various services are provided, and the mode of operation of safety means is managed.
3. experimental provision according to claim 1, it is characterized in that experiment content comprises: cryptography experiment, cryptographic applications experiment, PKI application experiment, security audit experiment, unit attacking and defending experiment, network attacking and defending experiment, Host Security experiment, viral attacking and defending experiment, fire compartment wall experiment, intrusion detection experiment, far away, long-range back door implantation, IDS and firewall linkage, invasion moving net BBS and the DMZ district safety experiment of overflowing of vpn experiment, experiment content covers Windows and Linux two big mainstream operation systems.
CN2007100563139A 2007-11-14 2007-11-14 Teaching and testing device for network information security Expired - Fee Related CN101188493B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100563139A CN101188493B (en) 2007-11-14 2007-11-14 Teaching and testing device for network information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100563139A CN101188493B (en) 2007-11-14 2007-11-14 Teaching and testing device for network information security

Publications (2)

Publication Number Publication Date
CN101188493A true CN101188493A (en) 2008-05-28
CN101188493B CN101188493B (en) 2011-11-09

Family

ID=39480698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100563139A Expired - Fee Related CN101188493B (en) 2007-11-14 2007-11-14 Teaching and testing device for network information security

Country Status (1)

Country Link
CN (1) CN101188493B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102027484A (en) * 2008-07-29 2011-04-20 惠普发展公司,有限责任合伙企业 System and method for a virtualization infrastructure management environment
CN103795735A (en) * 2014-03-07 2014-05-14 深圳市迈科龙电子有限公司 Safety device, server and server information safety achieving method
CN105024990A (en) * 2015-03-30 2015-11-04 清华大学 Deployment method and device for network security attack and defense exercise environment
CN103731270B (en) * 2013-12-25 2017-02-08 华南理工大学 Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
CN108958947A (en) * 2018-09-17 2018-12-07 北京市计算中心 A kind of big data all-in-one machine and its application method
CN109815703A (en) * 2018-12-29 2019-05-28 360企业安全技术(珠海)有限公司 The demenstration method and server, terminal, system of computer virus operation
CN112333025A (en) * 2020-11-19 2021-02-05 中国人民解放军国防科技大学 Network security simulation training method, device and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100496038C (en) * 2005-11-03 2009-06-03 上海交通大学 Method for implementing experimental system of firewall under multiple user's remote concurrency control in large scale
CN100487757C (en) * 2007-04-20 2009-05-13 吉林中软吉大信息技术有限公司 Experimental device for IPv6 network protocol simulation teaching

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102027484A (en) * 2008-07-29 2011-04-20 惠普发展公司,有限责任合伙企业 System and method for a virtualization infrastructure management environment
CN102027484B (en) * 2008-07-29 2014-12-17 惠普发展公司,有限责任合伙企业 System and method for a virtualization infrastructure management environment
CN103731270B (en) * 2013-12-25 2017-02-08 华南理工大学 Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
CN103795735A (en) * 2014-03-07 2014-05-14 深圳市迈科龙电子有限公司 Safety device, server and server information safety achieving method
WO2015131412A1 (en) * 2014-03-07 2015-09-11 深圳市迈科龙电子有限公司 Security device, server and method for achieving information security of server
CN103795735B (en) * 2014-03-07 2017-11-07 深圳市迈科龙电子有限公司 Safety means, server and server info safety implementation method
CN105024990A (en) * 2015-03-30 2015-11-04 清华大学 Deployment method and device for network security attack and defense exercise environment
CN108958947A (en) * 2018-09-17 2018-12-07 北京市计算中心 A kind of big data all-in-one machine and its application method
CN109815703A (en) * 2018-12-29 2019-05-28 360企业安全技术(珠海)有限公司 The demenstration method and server, terminal, system of computer virus operation
CN112333025A (en) * 2020-11-19 2021-02-05 中国人民解放军国防科技大学 Network security simulation training method, device and system

Also Published As

Publication number Publication date
CN101188493B (en) 2011-11-09

Similar Documents

Publication Publication Date Title
CN101188493B (en) Teaching and testing device for network information security
Sitnikova et al. The power of hands-on exercises in SCADA cyber security education
Konstantinou Cyber-physical systems security education through hands-on lab exercises
Tao et al. Experience and lessons in building an ics security testbed
Lupton et al. Analysis and prevention of security vulnerabilities in a smart city
Morelli et al. An open and flexible cybersecurity training laboratory in IT/OT infrastructures
Rahouti et al. Leveraging a cloud‐based testbed and software‐defined networking for cybersecurity and networking education
Adamovic et al. An interactive and collaborative approach to teaching cryptology
Podsadnikov et al. The methods and approaches to computer networks simulation using virtual network infrastructure
Murphy PhD et al. Building a virtual cybersecurity collaborative learning laboratory (vccll)
Ristov et al. Successful integration of practical Cisco CCNA in the Computer Networks Design course
Kamsamrong et al. State of the Art, Trends and Skill-gaps in Cybersecurity in Smart Grids
Hao The Exploration and Research of the Network Security Offense and Defense Laboratory Cooperated by Schools and Enterprises under the Background of New Engineeringu
Li Blur the boundary between the virtual and the real
Lieskovan et al. Cyber range scenario for smart grid security training
Trabelsi Teaching network covert channels using a hands-on approach
Tharot et al. Industrial Cybersecurity Game-Scenarios Based on the MITRE ATT&CK Framework
Hara Cyber range CYBERIUM for training security meisters to deal with cyber attacks
Yu et al. Failure case study: An instructive method for teaching computer network engineering
Wei et al. The research of integrated information security education experimental platform
Yuan et al. Designing, Developing, and Evaluating a Cloud-Based Laboratory for Online STEM IT Students
Jakab et al. Virtual lab in a distributed international environment-svc edinet
Frączek et al. Technological Trends in NATO ICT Systems Development Since 2019
Xiangcai et al. Analysis and Research on the Application of Network Technology in Colleges and Universities
Li et al. Project-Based Cyber Security Course Teaching Based on Digital Training Platform

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB03 Change of inventor or designer information

Inventor after: Zhang Honghai

Inventor after: Guo Dongwei

Inventor after: Jiang Yichuan

Inventor after: Wang Chenzhang

Inventor after: Shang Zhongfei

Inventor after: Cao Yan

Inventor before: Zhang Honghai

Inventor before: Guo Dongwei

Inventor before: Jiang Yizhou

Inventor before: Wang Chenzhang

Inventor before: Shang Zhongfei

Inventor before: Cao Yan

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: ZHANG HONGHAI GUO DONGWEI JIANG YIZHOU WANG CHENZHANG SHANG ZHONGFEI CAO YAN TO: ZHANG HONGHAI GUO DONGWEI JIANG YICHUAN WANG CHENZHANG SHANG ZHONGFEI CAO YAN

C14 Grant of patent or utility model
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Teaching and testing device for network information security

Effective date of registration: 20160218

Granted publication date: 20111109

Pledgee: Bank of Communications Ltd Jilin branch

Pledgor: Zhongruan Jida Information Technology Co., Ltd., Jilin

Registration number: 2016220000001

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111109

Termination date: 20171114