CN110351271A - Network-combination yarn experimental system building method, system, device and storage medium - Google Patents
Network-combination yarn experimental system building method, system, device and storage medium Download PDFInfo
- Publication number
- CN110351271A CN110351271A CN201910615849.2A CN201910615849A CN110351271A CN 110351271 A CN110351271 A CN 110351271A CN 201910615849 A CN201910615849 A CN 201910615849A CN 110351271 A CN110351271 A CN 110351271A
- Authority
- CN
- China
- Prior art keywords
- network
- target
- mirror image
- attack plane
- combination yarn
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of network-combination yarn experimental system building methods, comprising: receives the template triggering command that the first custom system is sent;Target template is determined using template triggering command;Virtual hardware environment is created using the hardware configuration information in target template information;Attack plane mirror image and target drone mirror image are determined using the Mirror Info in target template information, and attack plane mirror image and target drone mirror image are installed in virtual hardware environment, obtain attack plane system and target machine system;Network topology is carried out to attack plane system and target machine system respectively using the network configuration parameters in target template information to be arranged to obtain network-combination yarn experimental system.All configuration operations can be automatically performed, and be not necessarily to user's manual configuration, make network-combination yarn experimental system builds simpler convenience, saves the plenty of time.The application also provides a kind of network-combination yarn experimental system and builds system, device and computer readable storage medium, and said effect equally may be implemented.
Description
Technical field
The present invention relates to network safety filed, more specifically to a kind of network-combination yarn experimental system building method,
System, device and computer readable storage medium.
Background technique
Network security needs student to take action on one's own on the basis of grasping principle as a very strong subject of practicality
Relevant attacking and defending knowledge could preferably be learnt and grasp by carrying out practical operation.Network-combination yarn experiment generally has certain harmfulness,
Irreversible damage can be caused to the hardware and software of computer.The funds and manpower of colleges and universities are generally relatively limited, so related
It tests the Physical Experiment environment that can generally build in independent network using hardware device or is unfolded in virtual machine, with
This is avoided damaging physical host.The former network equipment is expensive, efficiently general unbearable, and nowadays
Device upgrade regenerate it is very frequent, not in time update will soon be out of step with the times.The appearance of cloud computing technology, so that making
Network-combination yarn experimental system is established with cloud computing technology to be possibly realized, and can virtualize computing resource, Internet resources simultaneously and is deposited
Store up resource.Good impetus is played using the expansion that cloud computing technology tests network-combination yarn.
But when carrying out network-combination yarn experiment using cloud computing technology, network-combination yarn experimental situation is not accounted for
The problem of building needs each user to complete complicated configuration, deployment operation, cannot accomplish real according to different network-combination yarns
It tests, easily changes network topology environment.
Therefore, how network-combination yarn experimental situation is easily built, is those skilled in the art's problem to be solved.
Summary of the invention
The purpose of the present invention is to provide a kind of network-combination yarn experimental system building method, system, device and computers can
Storage medium is read, easily to build network-combination yarn experimental situation.
To achieve the above object, the embodiment of the invention provides following technical solutions:
A kind of network-combination yarn experimental system building method, comprising:
Receive the template triggering command of the first custom system transmission;
Target template is determined using the template triggering command;
Virtual hardware environment is created using the hardware configuration information in the target template information;
Attack plane mirror image and target drone mirror image are determined using the Mirror Info in the target template information, and in the void
The attack plane mirror image and the target drone mirror image are installed in quasi- hardware environment, obtain attack plane system and target machine system;
Using the network configuration parameters in the target template information respectively to the attack plane system and target machine system into
Row network topology is arranged to obtain network-combination yarn experimental system.
Optionally, the method also includes:
Receive the first operating system mirror image that second system is sent;
Receive the attack software tool for being installed on the first operating system mirror image that the second system is sent;
To attack software tool described in the first operating system mirror configuration, attack plane mirror image is obtained.
Optionally, the method also includes:
Receive the second operating system mirror image that second day system is sent;
Receive the vulnerability configuration information of the corresponding second operating system mirror image;
It is the second operating system mirror configuration loophole using the vulnerability configuration information, obtains target drone mirror image.
Optionally, the Mirror Info using in the target template information determines attack plane mirror image and target drone mirror image,
And the attack plane mirror image and the target drone mirror image are installed in the virtual hardware environment, obtain attack plane system and target drone
After system, further includes:
Floating IP address is distributed for the attack plane system and the target machine system.
Optionally, the method also includes:
The operating status of the attack plane system and the operating status of the target drone are monitored, and the operating status is anti-
It presents in the web interface of the correspondence second user system.
Optionally, the method also includes:
Record the operating system log and software tool log of the attack plane system;
Record the operating system log and software tool log of the target machine system;
Receive the download log request that first custom system is sent;
Corresponding operating system log and/or software tool log is requested to be back to described first the inquiry log
Custom system.
Optionally, the method also includes:
The network-combination yarn that is used to delete that first custom system or the second user system are sent is received to test
The instruction of system;
Delete the attack plane system and the target machine system;
Discharge the virtual hardware environment.
To achieve the above object, the application also provides a kind of network-combination yarn experimental system and builds system, comprising:
Template triggering command receiving module, for receiving the template triggering command of the first custom system transmission;
Target template determining module, for determining target template using the template triggering command;
Virtual hardware environment module, it is virtual hard for being created using the hardware configuration information in the target template information
Part environment;
System creation module, for determining attack plane mirror image and target using the Mirror Info in the target template information
Machine mirror image, and the attack plane mirror image and the target drone mirror image are installed in the virtual hardware environment, obtain attack plane system
With target machine system;
Network settings module, for utilizing the network configuration parameters in the target template information respectively to the attack
Machine system and target machine system carry out network topology and are arranged to obtain network-combination yarn experimental system.
To achieve the above object, the application also provides a kind of network-combination yarn experimental system and builds device, comprising:
Memory, for storing computer program;
Processor realizes that the network-combination yarn experimental system as described in any one is built when for executing the computer program
The step of method.
To achieve the above object, the application also provides a kind of computer readable storage medium, the computer-readable storage
It is stored with computer program on medium, the network-combination yarn as described in any one is realized when the computer program is executed by processor
The step of experimental system building method.
By above scheme it is found that a kind of network-combination yarn experimental system building method provided by the invention, comprising: receive
The template triggering command that first custom system is sent;Target template is determined using the template triggering command;Utilize the target
Hardware configuration information in Template Information creates virtual hardware environment;It is true using the Mirror Info in the target template information
Determine attack plane mirror image and target drone mirror image, and the attack plane mirror image and the target drone mirror are installed in the virtual hardware environment
Picture obtains attack plane system and target machine system;It is attacked respectively to described using the network configuration parameters in the target template information
It hits machine system and target machine system carries out network topology and is arranged to obtain network-combination yarn experimental system.
It can be seen that a kind of network-combination yarn time-delay system building method provided by the present application, is receiving the first user system
It unites after the template triggering command sent, determines target template, and network is automatically performed according to the configuration information in target template and is attacked
Anti- experimental system is built, i.e., all configuration operations can be automatically performed, and is not necessarily to user's manual configuration, is kept network-combination yarn real
Check system builds simpler convenience, saves the plenty of time.The application also provides a kind of network-combination yarn experimental system and builds
System, device and computer readable storage medium, equally may be implemented said effect.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will to embodiment or
Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only
Some embodiments of the present invention, for those of ordinary skill in the art, without creative efforts, also
Other drawings may be obtained according to these drawings without any creative labor.
Fig. 1 is a kind of network-combination yarn experimental system building method flow chart disclosed by the embodiments of the present invention;
Fig. 2 is a kind of specific network-combination yarn experimental system building method flow chart disclosed by the embodiments of the present invention;
Fig. 3 is a kind of specific network-combination yarn experimental system building method flow chart disclosed by the embodiments of the present invention;
Fig. 4 is a kind of network-combination yarn experimental system structural schematic diagram disclosed by the embodiments of the present invention;
Fig. 5 is that a kind of network-combination yarn experimental system disclosed by the embodiments of the present invention builds system structure diagram;
Fig. 6 is that a kind of network-combination yarn experimental system disclosed by the embodiments of the present invention builds apparatus structure schematic diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its
His embodiment, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a kind of network-combination yarn experimental system building method, system, devices and computer-readable
Storage medium, easily to build network-combination yarn experimental situation.
Referring to Fig. 1, a kind of network-combination yarn experimental system building method provided in an embodiment of the present invention is specifically included:
S101 receives the template triggering command that the first custom system is sent.
This programme is applied to the control server of cloud platform, and control server is to control other calculating in this programme
The server of server, calculation server are then the server of practical piggyback attack machine system and target machine system.
Control server can provide web interface for custom system, and custom system accesses the interface web by network, thus
Realize the operation to control server.
Firstly, control server receives the template triggering command that the first custom system is sent.It should be noted that here
The first custom system be usually to need to build the custom system of network-combination yarn experimental system, generally User system.The
One custom system can want the experimental system built by web interface selection, to exist according to user according to experiment needs
Selection in web interface generates corresponding template triggering command.
S102 determines target template using the template triggering command.
It should be noted that triggering command is the selection determination according to user to template, it therefore, can be according to triggering
Instruct the target template for determining user's selection.
S103 creates virtual hardware environment using the hardware configuration information in the target template information.
It include relevant parameter needed for network-combination yarn experimental system, e.g., virtual hardware configuration parameter, mirror in Template Information
As parameter, network settings parameter etc..
Create virtual hardware environment first with Template Information terminal volume hardware configuration information, due to attack plane system and
Target machine system is virtual machine, and the operation of virtual machine needs the support of virtual hardware environment, therefore, in this programme first
It needs to be that attack plane system and target machine system create virtual hardware environment using the hardware configuration information in target template information.
Hardware configuration information can specifically include the parameters such as CPU number, memory size, storage size.
S104 determines attack plane mirror image and target drone mirror image using the Mirror Info in the target template information, and in institute
It states and the attack plane mirror image and the target drone mirror image is installed in virtual hardware environment, obtain attack plane system and target machine system.
The i.e. mountable corresponding mirror image after the completion of virtual hardware environment is built.It is determined first in target template information
Mirror Info determines corresponding attack plane mirror image and target drone mirror image according to Mirror Info, and in corresponding virtual hardware environment
It is installed, obtains attack plane system and target machine system.
It should be noted that mirror image is by second user system in advance in the mirror image of cloud platform creation, including attack plane mirror
Picture and target drone mirror image, second user system are Administrator system, usually teacher users system.
In a specific embodiment, the method also includes:
Receive the first operating system mirror image that second system is sent;
Receive the attack software tool for being installed on the first operating system mirror image that the second system is sent;
To attack software tool described in the first operating system mirror configuration, attack plane mirror image is obtained.
In the present solution, second user system upload attack plane mirror image first needed for operating system mirror image, such as Linux
Ubuntu operating system mirror image, Windows operating system mirror image in operating system etc..
Further, the attack plane software tool that second user system is the first operating system mirror configuration is received, that is, is made
The software tool needed is made for attack plane, be can be obtained and is attacked after configuration attack plane software tool in the first operating system mirror image
Hit machine mirror image.
In another particular embodiment of the invention, the method also includes:
Receive the second operating system mirror image that second day system is sent;
Receive the vulnerability configuration information of the corresponding second operating system mirror image;
It is the second operating system mirror configuration loophole using the vulnerability configuration information, obtains target drone mirror image.
In the present solution, the second operating system mirror image of user's upload is received, such as the Ubuntu in (SuSE) Linux OS
Operating system mirror image, Windows operating system mirror image etc..
It should be noted that vulnerability configuration information can make target drone the configuration information of security breaches occur, in order to attack
Machine is hit to launch a offensive to it.To the second operating system mirror configuration loophole, so that target drone mirror image can be obtained.
In a specific embodiment, the Mirror Info using in the target template information determines attack
Machine mirror image and target drone mirror image, and the attack plane mirror image and the target drone mirror image are installed in the virtual hardware environment, it obtains
After attack plane system and target machine system, further includes:
Floating IP address is distributed for the attack plane system and the target machine system.
It should be noted that due to user using attack plane system or target machine system be usually pass through external network i.e. because
Special net carries out, in practice for a cloud platform IP address only one, virtual machine in cloud platform has many again,
Therefore different virtual machine is communicated for convenience, passing through network management module in this programme is to need to carry out outer net visit
The user asked provides the Floating IP address of virtual machine.
S105, using the network configuration parameters in the target template information respectively to the attack plane system and target drone
System carries out network topology and is arranged to obtain network-combination yarn experimental system.
Attack plane system and target machine system complete network topology structure needed for after creating also needing that experimental system is arranged,
It also is that network configuration is arranged in attack plane system and target machine system.
There are the network configuration parameters of corresponding attacking system and the network configuration ginseng of corresponding target machine system in target template information
Number.
It obtains these network configuration parameters and calls corresponding network configuration interface, complete to attack plane system and target drone system
The network configuration of system.
Network configuration parameters can specifically include IP address, subnet mask, default gateway, dns server etc..
After completing network settings, attack plane system and target machine system can become the virtual machine system of intercommunication, and both sides can be with
It is communicated according to network configuration, network-combination yarn experimental system is completed to build, and user can pass through the side of transmission teleinstruction
Formula operates attack plane system and target machine system, completes network-combination yarn experiment.
In a specific embodiment, the method also includes:
The operating status of the attack plane system and the operating status of the target drone are monitored, and the operating status is anti-
It presents in the web interface of the correspondence second user system.
After attack plane system and target machine system come into operation, the operating status and target drone of attack plane system can be monitored
The operating status of system, and operating status is fed back to the web interface of second user system, keep administrator timely
The first custom system of understanding experimental conditions.
It can be seen that a kind of network-combination yarn time-delay system building method provided by the present application, is receiving the first user system
It unites after the template triggering command sent, determines target template, and network is automatically performed according to the configuration information in target template and is attacked
Anti- experimental system is built, i.e., all configuration operations can be automatically performed, and is not necessarily to user's manual configuration, is kept network-combination yarn real
Check system builds simpler convenience, saves the plenty of time.
A kind of specific network-combination yarn experimental system building method provided by the embodiments of the present application is introduced below,
A kind of specific network-combination yarn experimental system building method described below is made further on the basis of the above embodiments
Expand and illustrate, other step contents can be cross-referenced with above-described embodiment.
Referring to fig. 2, the embodiment of the present application is on the basis of the above embodiments, further includes:
S201 records the operating system log and software tool log of the attack plane system.
S202 records the operating system log and software tool log of the target machine system.
It should be noted that during the experiment, attack plane system and target machine system can generate operating system log,
Software tool in system can also generate log, obtain these logs in order to facilitate user, by attack plane system in this programme
Operating system log and software tool log with target machine system are recorded.
S203 receives the download log request that first custom system is sent.
When user needs to download correlation log, downloading day can be sent to cloud platform to request, selects required day
Will.
The inquiry log is requested corresponding operating system log and/or software tool log to be back to described by S204
First custom system.
According to request content, corresponding log is back to the first custom system, arrives different attacks respectively without user
Search download log in machine system or target machine system, the easy operation of user.
A kind of specific network-combination yarn experimental system building method provided by the embodiments of the present application is introduced below,
A kind of specific network-combination yarn experimental system building method described below is made further on the basis of the above embodiments
Expand and illustrate, other step contents can be cross-referenced with above-described embodiment.
Referring to Fig. 3, the embodiment of the present application is on the basis of the above embodiments, further includes:
What S301, reception first custom system or the second user system were sent attacks for deleting the network
The instruction of anti-experimental system.
It should be noted that can also realize that a key deletes the behaviour of experimental situation by cloud platform when user completes to test
Make, cloud platform receives the deletion instruction that the first custom system or second user system are sent first.
S302 deletes the attack plane system and the target machine system.
After receiving deletion instruction, corresponding attack plane system and target machine system are deleted first.
S303 discharges the virtual hardware environment.
After deleting attack plane system and target machine system, it is also necessary to virtual hardware environment is discharged, so that virtual hardware environment
It can be re-used again.
A kind of specific network-combination yarn experimental system building method provided by the embodiments of the present application is introduced below,
A kind of specific network-combination yarn experimental system building method described below can be cross-referenced with any of the above-described embodiment.
Referring to fig. 4, in the present embodiment, hardware device include gateway, interchanger, router, control node server,
Calculate node server, internal network, external network.
On control node server and calculate node server has two to throw the net card respectively, is connected by interchanger, two throw the net
Card be separately connected internal network and external network, be mounted on two-server Ubuntu operating system, ApacheTomcat,
MySQL and OpenStack, wherein deploys web interface module on control node server, authentication module, cloud orchestration module,
Network management module, performance monitoring module deploy computing module, mirror image management module, network pipe on calculate node server
Manage module.
Wherein, web interface module, for providing web interface, to be accessed by the user;
Authentication module, for authenticating the custom system currently logged in as the first custom system or second user system, and
Assign custom system corresponding permission;
Cloud orchestration module generates corresponding template for receiving the configuration information of second user system upload;
Network management module, for network configuration to be arranged according to the network configuration information in template;
Performance monitoring module, for monitoring the performance data of attack plane system and target machine system;
Computing module provides the virtual hard of different size for being managed work to attack plane system or target machine system
Part environment, such as CPU number, memory size, disk size are arranged not according to different delay requirements and operating system demand
Same virtual hardware environment is called for cloud orchestration module;
Mirror image management module, mirror image and software tool for being uploaded according to second user generate attack plane mirror image text
Part and target drone image file.
Internal network is by server and group of switches at internal network is mainly used for the communication between virtual machine, that is, calculates
Server, control server, attack plane system, the communication between target machine system, are managed virtual machine, attacking and defending experimental ring
The network topology environment configurations in border, the storage work of whole system also depend on internal network progress, and secure group rule is run on
Internal network, be responsible for management intranet network network protocol and port, between internal network and external network using router into
Row connection.It is practical since user is usually to be carried out by external network, that is, internet using attack plane system or target machine system
On for a cloud platform IP address only one, the virtual machine in cloud platform has many again, therefore right for convenience
Different virtual machine is communicated, by network management module to need the user for carrying out extranet access to provide void in this programme
Floating IP address, is recovered in the resource pool of Floating IP address by the Floating IP address of quasi- machine using after finishing.
After platform initialization, corresponding calculating, storage, Internet resources are provided, administrator needs to safeguard these moneys
Source is scheduled these resources by cloud orchestration module, is supplied to user's use.
Second user system maintenance mirror image management module, by the Windows made and (SuSE) Linux OS mirror image text
Part is uploaded to calculate node server, is that the cloud mirrored host computer on attack plane configures corresponding attack software tool, forms attack plane
Cloud mirrored host computer is that the cloud mirrored host computer of target drone configures corresponding loophole, forms target drone cloud mirrored host computer.
The type of second user system maintenance cloud host provides for different operating system image files and experiment demand
The configuration of different configuration of cloud Host Type, i.e. virtual hardware environment, configuration here refer mainly to CPU number, and memory size is deposited
Size is stored up, accomplishes more reasonable resource allocation.
Second user system maintenance cloud orchestration module, the network topology tested for heterogeneous networks attacking and defending and system requirements,
Write corresponding experiment pattern.
In the parameter field of template, definition needs the title of cloud host to be used, the title of safe group policy and to be made
The public network title used.
The private network to be used in resources field, definition experiment, subnet, network segment, the gateway of private network, routing
The Floating IP address that device, the interface of router and port, cloud host and cloud host are distributed, defines Internet resources first, then defines
The network equipment, the type for finally defining cloud host, the mirror image used and the Internet resources of connection.
Local net network user logs in the system using correct username and password;Internet user can pass through VPN
Technology logs in the system using correct username and password.
After first custom system logs in the system, the target template for the network-combination yarn experiment for needing to carry out is found, operation should
Target template, the experimental situation of the automatically dispose experiment, referred to as one " stack ".
First custom system can be checked the topological structure of patterned " stack ", be checked in " stack " and attacked by web interface
It hits machine and operating system, IP address, subnet mask, default gateway and dns server that target drone example is used, checks attack plane
With the Floating IP address of target drone.
" stack " of each generation obtains Floating IP address from Floating IP address resource pool automatically, the network-combination yarn experiment of " stack " deployment
Environment carries out flow isolation using subnet.
First custom system logs on to virtual target drone by the Floating IP address of target drone, it is ensured that target drone has security breaches, meets
The condition attacked.
First custom system logs on to virtual attack plane by the Floating IP address on attack plane, it is ensured that the attack that target drone needs is soft
Part has been mounted to position, being capable of offensive attack.
First custom system logs on to the attack plane system and target drone of (SuSE) Linux OS using XShell and Floating IP address
System is operated using order line, or logs on to attacking for Windows operating system using remote desktop software and Floating IP address
Machine system and target machine system are hit, is operated using graphic interface.
After network user login to the cloud host on attack plane, according to laboratory manual, using corresponding attack tool and attack
Software is hit to launch a offensive to target drone.
Performance monitoring module passes through the performance for analyzing network packet and cloud host in each " stack ", to second
Custom system feeds back each network user's experiment progress situation, at the same record and save in each " stack " attack plane cloud host and
The operating system log and associated software tool log of target drone cloud host.
After first custom system completes experiment, downloading correlation log report is analyzed experimental result, is deleted by a key
Entire experimental situation is deleted in the operation of " stack ", and the computing resource and storage resource that release cloud host occupies provide Floating IP address
Resource pool is put back in source, if you need to carry out other experiments, the corresponding template file of choice experiment, a key rapid deployment experimental situation, life
At one new " stack ".
If the first custom system is not completed to test, file an application, retains entire " stack " to administrator, it is subsequent at any time
Unfinished experiment is carried out to connect cloud host.
Cloud platform described in present embodiment and cloud orchestration technology provide calculating, storage and network by way of template
The step of source carries out United Dispatching and deployment, simplifies deployment experimental situation, realizes the key to network-combination yarn experimental situation
And rapid deployment, and authenticity, the isolation of experiment can be taken into account well.Therefore, use cloud platform and cloud orchestration technology can be with
It allows administrator to facilitate management system, user is allowed to focus more on experiment itself rather than environment deployment.
A kind of network-combination yarn experimental system system of building provided by the embodiments of the present application is introduced below, is hereafter retouched
A kind of network-combination yarn experimental system stated builds system can be cross-referenced with any of the above-described embodiment.
Referring to Fig. 5, a kind of network-combination yarn experimental system system of building provided by the embodiments of the present application is specifically included:
Template triggering command receiving module 401, for receiving the template triggering command of the first custom system transmission;
Target template determining module 402, for determining target template using the template triggering command;
Virtual hardware environment module 403, it is virtual for being created using the hardware configuration information in the target template information
Hardware environment;
System creation module 404, for using the Mirror Info in the target template information determine attack plane mirror image with
Target drone mirror image, and the attack plane mirror image and the target drone mirror image are installed in the virtual hardware environment, obtain attack plane system
System and target machine system;
Network settings module 405, for being attacked respectively to described using the network configuration parameters in the target template information
It hits machine system and target machine system carries out network topology and is arranged to obtain network-combination yarn experimental system.
Optionally, the system also includes:
First operating system mirror image receiving module, for receiving the first operating system mirror image of second system transmission;
Software tool receiving module is attacked, is for receiving first operation that is installed on that the second system is sent
The attack software tool of system mirror image;
Software tool configuration module is attacked, for attack software tool described in the first operating system mirror configuration,
Obtain attack plane mirror image.
Optionally, the system also includes:
Second operating system mirror image receiving module, for receiving the second operating system mirror image of second day system transmission;
Vulnerability configuration information configuration module, for receiving the vulnerability configuration information of the corresponding second operating system mirror image;
Loophole configuration module, for being the second operating system mirror configuration loophole using the vulnerability configuration information,
Obtain target drone mirror image.
Optionally, the system also includes:
Floating IP address distribution module, for distributing floating IP address for the attack plane system and the target machine system.
Optionally, the system also includes:
Monitoring running state module, for monitoring the operating status of the attack plane system and the operation shape of the target drone
State, and the operating status is fed back in the web interface of the correspondence second user system.
Optionally, the system also includes:
Attack plane logger module, for recording operating system log and the software tool day of the attack plane system
Will;
Target drone logging modle, for recording the operating system log and software tool log of the target machine system;
Request receiving module is downloaded in log, the download log request sent for receiving first custom system;
Log sending module, for the inquiry log to be requested corresponding operating system log and/or software tool day
Will is back to first custom system.
Optionally, the system also includes:
Command reception module, for receiving that first custom system or the second user system send for deleting
Except the instruction of the network-combination yarn experimental system;
Removing module, for deleting the attack plane system and the target machine system;
Release module, for discharging the virtual hardware environment.
The network-combination yarn experimental system of the present embodiment is built system and is built for realizing network-combination yarn experimental system above-mentioned
Method, therefore network-combination yarn experimental system builds the visible network-combination yarn experiment system hereinbefore of the specific embodiment in system
It unites the embodiment part of building method, for example, network-combination yarn experimental system builds system 401, target template determining module 402,
Virtual hardware environment module 403, system creation module 404, network settings module 405 are respectively used to realize above-mentioned network-combination yarn
Step S101, S102, S103, S104, S105 in experimental system building method, so, specific embodiment is referred to phase
The description for the various pieces embodiment answered, details are not described herein.
Device is built to a kind of network-combination yarn experimental system provided in an embodiment of the present invention below to be introduced, and is hereafter retouched
A kind of network-combination yarn experimental system stated builds device can be cross-referenced with any of the above-described embodiment.
Referring to Fig. 6, a kind of network-combination yarn experimental system provided in an embodiment of the present invention builds device, specifically includes:
Memory 100, for storing computer program;
Processor 200 realizes any of the above-described network-combination yarn experimental system side of building when for executing the computer program
The step of method.
Specifically, memory 100 includes non-volatile memory medium, built-in storage.Non-volatile memory medium storage
There are operating system and computer-readable instruction, which is operating system and computer in non-volatile memory medium
The operation of readable instruction provides environment.Processor 200 builds device for network-combination yarn experimental system and provides calculating and control energy
Network-combination yarn experimental system building method described in any of the above-described embodiment may be implemented in power.
Further, the network-combination yarn experimental system in the present embodiment builds device, can also include:
Input interface 300, for obtaining the computer program of extraneous importing, and the computer program that will acquire saves
Extremely in the memory 100, it can be also used for the various instructions and parameter that obtain extraneous terminal device transmission, and be transmitted to place
It manages in device 200, so that processor 200 is handled accordingly using above-mentioned various instructions and parametric evolving.It is described in the present embodiment
Input interface 300 can specifically include but be not limited to USB interface, serial line interface, speech input interface, fingerprint input interface, hard
Disk reads interface etc..
Output interface 400, the various data for generating processor 200 are exported to coupled terminal device, with
Other terminal devices convenient for being connected with output interface 400 can get the various data of the generation of processor 200.This implementation
In example, the output interface 400 can specifically include but be not limited to USB interface, serial line interface etc..
Communication unit 500, for completing the communication of current device and other equipment.
Keyboard 600, the various parameters data or instruction inputted and tapping keycap in real time for obtaining user.
Display 700 carries out real-time display for the relevant information to network-combination yarn experimental system build process, so as to
Current network attacking and defending experimental system is understood in time in user builds situation.
Mouse 800 can be used for assisting user input data and simplify the operation of user.
The present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the computer
Step provided by above-described embodiment may be implemented when program is executed by processor.The storage medium may include: USB flash disk, movement
Hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory,
RAM), the various media that can store program code such as magnetic or disk.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with its
The difference of his embodiment, the same or similar parts in each embodiment may refer to each other.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be readily apparent to those skilled in the art, defined herein
General Principle can realize in other embodiments without departing from the spirit or scope of the present invention.Therefore, originally
Invention is not intended to be limited to the embodiments shown herein, and is to fit to special with principles disclosed herein and novelty
The consistent widest scope of point.
Claims (10)
1. a kind of network-combination yarn experimental system building method characterized by comprising
Receive the template triggering command of the first custom system transmission;
Target template is determined using the template triggering command;
Virtual hardware environment is created using the hardware configuration information in the target template information;
Attack plane mirror image and target drone mirror image are determined using the Mirror Info in the target template information, and in the virtual hardware
The attack plane mirror image and the target drone mirror image are installed in environment, obtain attack plane system and target machine system;
Net is carried out to the attack plane system and target machine system respectively using the network configuration parameters in the target template information
Network topology is arranged to obtain network-combination yarn experimental system.
2. the method according to claim 1, wherein the method also includes:
Receive the first operating system mirror image that second system is sent;
Receive the attack software tool for being installed on the first operating system mirror image that the second system is sent;
To attack software tool described in the first operating system mirror configuration, attack plane mirror image is obtained.
3. the method according to claim 1, wherein the method also includes:
Receive the second operating system mirror image that second day system is sent;
Receive the vulnerability configuration information of the corresponding second operating system mirror image;
It is the second operating system mirror configuration loophole using the vulnerability configuration information, obtains target drone mirror image.
4. the method according to claim 1, wherein the Mirror Info using in the target template information
It determines attack plane mirror image and target drone mirror image, and the attack plane mirror image and the target drone mirror is installed in the virtual hardware environment
Picture, after obtaining attack plane system and target machine system, further includes:
Floating IP address is distributed for the attack plane system and the target machine system.
5. the method according to claim 1, wherein the method also includes:
The operating status of the attack plane system and the operating status of the target drone are monitored, and the operating status is fed back in right
Answer the web interface of the second user system.
6. the method according to claim 1, wherein the method also includes:
Record the operating system log and software tool log of the attack plane system;
Record the operating system log and software tool log of the target machine system;
Receive the download log request that first custom system is sent;
Corresponding operating system log and/or software tool log is requested to be back to the first user system the inquiry log
System.
7. according to claim 1 to method described in 6 any one, which is characterized in that the method also includes:
Receive that first custom system or the second user system send for deleting the network-combination yarn experimental system
Instruction;
Delete the attack plane system and the target machine system;
Discharge the virtual hardware environment.
8. a kind of network-combination yarn experimental system builds system characterized by comprising
Template triggering command receiving module, for receiving the template triggering command of the first custom system transmission;
Target template determining module, for determining target template using the template triggering command;
Virtual hardware environment module, for creating virtual hardware ring using the hardware configuration information in the target template information
Border;
System creation module, for determining attack plane mirror image and target drone mirror using the Mirror Info in the target template information
Picture, and the attack plane mirror image and the target drone mirror image are installed in the virtual hardware environment, obtain attack plane system and target
Machine system;
Network settings module, for utilizing the network configuration parameters in the target template information respectively to the attack plane system
Network topology is carried out with target machine system to be arranged to obtain network-combination yarn experimental system.
9. a kind of network-combination yarn experimental system builds device characterized by comprising
Memory, for storing computer program;
Processor realizes the network-combination yarn experiment system as described in any one of claim 1 to 7 when for executing the computer program
The step of system building method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes the network-combination yarn experimental system as described in any one of claim 1 to 7 when the computer program is executed by processor
The step of building method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910615849.2A CN110351271A (en) | 2019-07-09 | 2019-07-09 | Network-combination yarn experimental system building method, system, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910615849.2A CN110351271A (en) | 2019-07-09 | 2019-07-09 | Network-combination yarn experimental system building method, system, device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110351271A true CN110351271A (en) | 2019-10-18 |
Family
ID=68178642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910615849.2A Pending CN110351271A (en) | 2019-07-09 | 2019-07-09 | Network-combination yarn experimental system building method, system, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110351271A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111726421A (en) * | 2020-07-01 | 2020-09-29 | 哈尔滨工业大学(威海) | Method and device for realizing interconnection of network target range and industrial control equipment |
CN111786832A (en) * | 2020-07-01 | 2020-10-16 | 哈尔滨工业大学(威海) | Method and device for interconnecting attack and defense platform and various industrial control scenes |
CN111897624A (en) * | 2020-06-23 | 2020-11-06 | 华宇恒拓(天津)科技有限公司 | Method for building information security network attack and defense experiment platform |
CN112447076A (en) * | 2020-11-05 | 2021-03-05 | 贵州数安汇大数据产业发展有限公司 | Real-network attack and defense drilling system with controllable risk |
CN113162954A (en) * | 2021-06-23 | 2021-07-23 | 西南石油大学 | Target drone creating method and network attack and defense training system |
CN114257506A (en) * | 2021-12-21 | 2022-03-29 | 北京知道未来信息技术有限公司 | Network target range construction method and device, back-end server and readable storage medium |
CN114726757A (en) * | 2022-03-24 | 2022-07-08 | 深圳市领创星通科技有限公司 | Equipment networking test method and device, computer equipment and storage medium |
CN115334698A (en) * | 2022-07-20 | 2022-11-11 | 烽台科技(北京)有限公司 | Construction method, device, terminal and medium for 5G safety network of target range target |
CN117331758A (en) * | 2023-11-29 | 2024-01-02 | 博智安全科技股份有限公司 | Verification method and device for target virtual machine mirror image, electronic equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103701777A (en) * | 2013-12-11 | 2014-04-02 | 长春理工大学 | Remote network attack and defense virtual simulation system based on virtualization and cloud technology |
US9311160B2 (en) * | 2011-11-10 | 2016-04-12 | Verizon Patent And Licensing Inc. | Elastic cloud networking |
-
2019
- 2019-07-09 CN CN201910615849.2A patent/CN110351271A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9311160B2 (en) * | 2011-11-10 | 2016-04-12 | Verizon Patent And Licensing Inc. | Elastic cloud networking |
CN103701777A (en) * | 2013-12-11 | 2014-04-02 | 长春理工大学 | Remote network attack and defense virtual simulation system based on virtualization and cloud technology |
Non-Patent Citations (1)
Title |
---|
吴怡晨等: "面向网络空间的攻防靶场设计", 《通信技术》 * |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111897624A (en) * | 2020-06-23 | 2020-11-06 | 华宇恒拓(天津)科技有限公司 | Method for building information security network attack and defense experiment platform |
CN111786832B (en) * | 2020-07-01 | 2022-06-07 | 哈尔滨工业大学(威海) | Method and device for interconnecting attack and defense platform and various industrial control scenes |
CN111786832A (en) * | 2020-07-01 | 2020-10-16 | 哈尔滨工业大学(威海) | Method and device for interconnecting attack and defense platform and various industrial control scenes |
CN111726421A (en) * | 2020-07-01 | 2020-09-29 | 哈尔滨工业大学(威海) | Method and device for realizing interconnection of network target range and industrial control equipment |
CN111726421B (en) * | 2020-07-01 | 2022-06-07 | 哈尔滨工业大学(威海) | Method and device for realizing interconnection of network target range and industrial control equipment |
CN112447076A (en) * | 2020-11-05 | 2021-03-05 | 贵州数安汇大数据产业发展有限公司 | Real-network attack and defense drilling system with controllable risk |
CN113162954A (en) * | 2021-06-23 | 2021-07-23 | 西南石油大学 | Target drone creating method and network attack and defense training system |
CN113162954B (en) * | 2021-06-23 | 2021-09-03 | 西南石油大学 | Target drone creating method and network attack and defense training system |
CN114257506A (en) * | 2021-12-21 | 2022-03-29 | 北京知道未来信息技术有限公司 | Network target range construction method and device, back-end server and readable storage medium |
CN114257506B (en) * | 2021-12-21 | 2024-04-02 | 北京知道未来信息技术有限公司 | Network target range construction method and device, back-end server and readable storage medium |
CN114726757A (en) * | 2022-03-24 | 2022-07-08 | 深圳市领创星通科技有限公司 | Equipment networking test method and device, computer equipment and storage medium |
CN114726757B (en) * | 2022-03-24 | 2024-05-03 | 深圳市领创星通科技有限公司 | Equipment networking test method, device, computer equipment and storage medium |
CN115334698A (en) * | 2022-07-20 | 2022-11-11 | 烽台科技(北京)有限公司 | Construction method, device, terminal and medium for 5G safety network of target range target |
CN115334698B (en) * | 2022-07-20 | 2023-05-23 | 烽台科技(北京)有限公司 | Construction method, device, terminal and medium of target 5G safety network of target range |
CN117331758A (en) * | 2023-11-29 | 2024-01-02 | 博智安全科技股份有限公司 | Verification method and device for target virtual machine mirror image, electronic equipment and storage medium |
CN117331758B (en) * | 2023-11-29 | 2024-02-23 | 博智安全科技股份有限公司 | Verification method and device for target virtual machine mirror image, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110351271A (en) | Network-combination yarn experimental system building method, system, device and storage medium | |
JP6474926B1 (en) | Field device management method and apparatus based on cloud server | |
CN109254831B (en) | Virtual machine network security management method based on cloud management platform | |
CN103701777B (en) | Based on virtualization and the telecommunication network attacking and defending dummy emulation system of cloud | |
CN104221325B (en) | For the system and method for the security configuration that mirror image is virtualized in network environment | |
US9648040B1 (en) | Authorization check using a web service request | |
JP2014506045A (en) | Network stimulation engine | |
CN111049686B (en) | Safety protection virtual laboratory of power monitoring system and construction method thereof | |
CN105610675B (en) | A kind of creation method and device of virtual vpn gateway | |
US9021008B1 (en) | Managing targeted scripts | |
CN106650425B (en) | A kind of control method and device of security sandbox | |
CN108028827A (en) | The management method and device of certificate in network function virtualization architecture | |
CN106031128A (en) | Providing mobile device management functionalities | |
JP2015231138A (en) | Cyber attack practice system, practice environment providing method, and, practice environment providing program | |
Eskridge et al. | VINE: a cyber emulation environment for MTD experimentation | |
CN110851827A (en) | Service customizable high-interaction honeypot realized based on container technology and use method | |
CN108605264A (en) | Network management | |
US20220159062A1 (en) | Setting apparatus, communication system, setting method, and program | |
CN112003964B (en) | Multi-architecture-based IP address allocation method, device and medium | |
CN102694667A (en) | Method supporting user autonomous deployment of network and system thereof | |
CN105120010B (en) | A kind of virtual machine Anti-theft method under cloud environment | |
CN107733717A (en) | A kind of network collocating method of cloud platform movable type O&M | |
CN103220235B (en) | The management method of the distributed virtual switch and relevant apparatus and system | |
Alvarenga et al. | RIO: A denial of service experimentation platform in a Future Internet Testbed | |
Raychev et al. | Development and Integration of Educational Software Defined Networking Platform in Computer Networking Classes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191018 |
|
RJ01 | Rejection of invention patent application after publication |