CN110351271A - Network-combination yarn experimental system building method, system, device and storage medium - Google Patents

Network-combination yarn experimental system building method, system, device and storage medium Download PDF

Info

Publication number
CN110351271A
CN110351271A CN201910615849.2A CN201910615849A CN110351271A CN 110351271 A CN110351271 A CN 110351271A CN 201910615849 A CN201910615849 A CN 201910615849A CN 110351271 A CN110351271 A CN 110351271A
Authority
CN
China
Prior art keywords
network
target
mirror image
attack plane
combination yarn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910615849.2A
Other languages
Chinese (zh)
Inventor
朱子龙
张立臣
叶典
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201910615849.2A priority Critical patent/CN110351271A/en
Publication of CN110351271A publication Critical patent/CN110351271A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of network-combination yarn experimental system building methods, comprising: receives the template triggering command that the first custom system is sent;Target template is determined using template triggering command;Virtual hardware environment is created using the hardware configuration information in target template information;Attack plane mirror image and target drone mirror image are determined using the Mirror Info in target template information, and attack plane mirror image and target drone mirror image are installed in virtual hardware environment, obtain attack plane system and target machine system;Network topology is carried out to attack plane system and target machine system respectively using the network configuration parameters in target template information to be arranged to obtain network-combination yarn experimental system.All configuration operations can be automatically performed, and be not necessarily to user's manual configuration, make network-combination yarn experimental system builds simpler convenience, saves the plenty of time.The application also provides a kind of network-combination yarn experimental system and builds system, device and computer readable storage medium, and said effect equally may be implemented.

Description

Network-combination yarn experimental system building method, system, device and storage medium
Technical field
The present invention relates to network safety filed, more specifically to a kind of network-combination yarn experimental system building method, System, device and computer readable storage medium.
Background technique
Network security needs student to take action on one's own on the basis of grasping principle as a very strong subject of practicality Relevant attacking and defending knowledge could preferably be learnt and grasp by carrying out practical operation.Network-combination yarn experiment generally has certain harmfulness, Irreversible damage can be caused to the hardware and software of computer.The funds and manpower of colleges and universities are generally relatively limited, so related It tests the Physical Experiment environment that can generally build in independent network using hardware device or is unfolded in virtual machine, with This is avoided damaging physical host.The former network equipment is expensive, efficiently general unbearable, and nowadays Device upgrade regenerate it is very frequent, not in time update will soon be out of step with the times.The appearance of cloud computing technology, so that making Network-combination yarn experimental system is established with cloud computing technology to be possibly realized, and can virtualize computing resource, Internet resources simultaneously and is deposited Store up resource.Good impetus is played using the expansion that cloud computing technology tests network-combination yarn.
But when carrying out network-combination yarn experiment using cloud computing technology, network-combination yarn experimental situation is not accounted for The problem of building needs each user to complete complicated configuration, deployment operation, cannot accomplish real according to different network-combination yarns It tests, easily changes network topology environment.
Therefore, how network-combination yarn experimental situation is easily built, is those skilled in the art's problem to be solved.
Summary of the invention
The purpose of the present invention is to provide a kind of network-combination yarn experimental system building method, system, device and computers can Storage medium is read, easily to build network-combination yarn experimental situation.
To achieve the above object, the embodiment of the invention provides following technical solutions:
A kind of network-combination yarn experimental system building method, comprising:
Receive the template triggering command of the first custom system transmission;
Target template is determined using the template triggering command;
Virtual hardware environment is created using the hardware configuration information in the target template information;
Attack plane mirror image and target drone mirror image are determined using the Mirror Info in the target template information, and in the void The attack plane mirror image and the target drone mirror image are installed in quasi- hardware environment, obtain attack plane system and target machine system;
Using the network configuration parameters in the target template information respectively to the attack plane system and target machine system into Row network topology is arranged to obtain network-combination yarn experimental system.
Optionally, the method also includes:
Receive the first operating system mirror image that second system is sent;
Receive the attack software tool for being installed on the first operating system mirror image that the second system is sent;
To attack software tool described in the first operating system mirror configuration, attack plane mirror image is obtained.
Optionally, the method also includes:
Receive the second operating system mirror image that second day system is sent;
Receive the vulnerability configuration information of the corresponding second operating system mirror image;
It is the second operating system mirror configuration loophole using the vulnerability configuration information, obtains target drone mirror image.
Optionally, the Mirror Info using in the target template information determines attack plane mirror image and target drone mirror image, And the attack plane mirror image and the target drone mirror image are installed in the virtual hardware environment, obtain attack plane system and target drone After system, further includes:
Floating IP address is distributed for the attack plane system and the target machine system.
Optionally, the method also includes:
The operating status of the attack plane system and the operating status of the target drone are monitored, and the operating status is anti- It presents in the web interface of the correspondence second user system.
Optionally, the method also includes:
Record the operating system log and software tool log of the attack plane system;
Record the operating system log and software tool log of the target machine system;
Receive the download log request that first custom system is sent;
Corresponding operating system log and/or software tool log is requested to be back to described first the inquiry log Custom system.
Optionally, the method also includes:
The network-combination yarn that is used to delete that first custom system or the second user system are sent is received to test The instruction of system;
Delete the attack plane system and the target machine system;
Discharge the virtual hardware environment.
To achieve the above object, the application also provides a kind of network-combination yarn experimental system and builds system, comprising:
Template triggering command receiving module, for receiving the template triggering command of the first custom system transmission;
Target template determining module, for determining target template using the template triggering command;
Virtual hardware environment module, it is virtual hard for being created using the hardware configuration information in the target template information Part environment;
System creation module, for determining attack plane mirror image and target using the Mirror Info in the target template information Machine mirror image, and the attack plane mirror image and the target drone mirror image are installed in the virtual hardware environment, obtain attack plane system With target machine system;
Network settings module, for utilizing the network configuration parameters in the target template information respectively to the attack Machine system and target machine system carry out network topology and are arranged to obtain network-combination yarn experimental system.
To achieve the above object, the application also provides a kind of network-combination yarn experimental system and builds device, comprising:
Memory, for storing computer program;
Processor realizes that the network-combination yarn experimental system as described in any one is built when for executing the computer program The step of method.
To achieve the above object, the application also provides a kind of computer readable storage medium, the computer-readable storage It is stored with computer program on medium, the network-combination yarn as described in any one is realized when the computer program is executed by processor The step of experimental system building method.
By above scheme it is found that a kind of network-combination yarn experimental system building method provided by the invention, comprising: receive The template triggering command that first custom system is sent;Target template is determined using the template triggering command;Utilize the target Hardware configuration information in Template Information creates virtual hardware environment;It is true using the Mirror Info in the target template information Determine attack plane mirror image and target drone mirror image, and the attack plane mirror image and the target drone mirror are installed in the virtual hardware environment Picture obtains attack plane system and target machine system;It is attacked respectively to described using the network configuration parameters in the target template information It hits machine system and target machine system carries out network topology and is arranged to obtain network-combination yarn experimental system.
It can be seen that a kind of network-combination yarn time-delay system building method provided by the present application, is receiving the first user system It unites after the template triggering command sent, determines target template, and network is automatically performed according to the configuration information in target template and is attacked Anti- experimental system is built, i.e., all configuration operations can be automatically performed, and is not necessarily to user's manual configuration, is kept network-combination yarn real Check system builds simpler convenience, saves the plenty of time.The application also provides a kind of network-combination yarn experimental system and builds System, device and computer readable storage medium, equally may be implemented said effect.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only Some embodiments of the present invention, for those of ordinary skill in the art, without creative efforts, also Other drawings may be obtained according to these drawings without any creative labor.
Fig. 1 is a kind of network-combination yarn experimental system building method flow chart disclosed by the embodiments of the present invention;
Fig. 2 is a kind of specific network-combination yarn experimental system building method flow chart disclosed by the embodiments of the present invention;
Fig. 3 is a kind of specific network-combination yarn experimental system building method flow chart disclosed by the embodiments of the present invention;
Fig. 4 is a kind of network-combination yarn experimental system structural schematic diagram disclosed by the embodiments of the present invention;
Fig. 5 is that a kind of network-combination yarn experimental system disclosed by the embodiments of the present invention builds system structure diagram;
Fig. 6 is that a kind of network-combination yarn experimental system disclosed by the embodiments of the present invention builds apparatus structure schematic diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its His embodiment, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a kind of network-combination yarn experimental system building method, system, devices and computer-readable Storage medium, easily to build network-combination yarn experimental situation.
Referring to Fig. 1, a kind of network-combination yarn experimental system building method provided in an embodiment of the present invention is specifically included:
S101 receives the template triggering command that the first custom system is sent.
This programme is applied to the control server of cloud platform, and control server is to control other calculating in this programme The server of server, calculation server are then the server of practical piggyback attack machine system and target machine system.
Control server can provide web interface for custom system, and custom system accesses the interface web by network, thus Realize the operation to control server.
Firstly, control server receives the template triggering command that the first custom system is sent.It should be noted that here The first custom system be usually to need to build the custom system of network-combination yarn experimental system, generally User system.The One custom system can want the experimental system built by web interface selection, to exist according to user according to experiment needs Selection in web interface generates corresponding template triggering command.
S102 determines target template using the template triggering command.
It should be noted that triggering command is the selection determination according to user to template, it therefore, can be according to triggering Instruct the target template for determining user's selection.
S103 creates virtual hardware environment using the hardware configuration information in the target template information.
It include relevant parameter needed for network-combination yarn experimental system, e.g., virtual hardware configuration parameter, mirror in Template Information As parameter, network settings parameter etc..
Create virtual hardware environment first with Template Information terminal volume hardware configuration information, due to attack plane system and Target machine system is virtual machine, and the operation of virtual machine needs the support of virtual hardware environment, therefore, in this programme first It needs to be that attack plane system and target machine system create virtual hardware environment using the hardware configuration information in target template information.
Hardware configuration information can specifically include the parameters such as CPU number, memory size, storage size.
S104 determines attack plane mirror image and target drone mirror image using the Mirror Info in the target template information, and in institute It states and the attack plane mirror image and the target drone mirror image is installed in virtual hardware environment, obtain attack plane system and target machine system.
The i.e. mountable corresponding mirror image after the completion of virtual hardware environment is built.It is determined first in target template information Mirror Info determines corresponding attack plane mirror image and target drone mirror image according to Mirror Info, and in corresponding virtual hardware environment It is installed, obtains attack plane system and target machine system.
It should be noted that mirror image is by second user system in advance in the mirror image of cloud platform creation, including attack plane mirror Picture and target drone mirror image, second user system are Administrator system, usually teacher users system.
In a specific embodiment, the method also includes:
Receive the first operating system mirror image that second system is sent;
Receive the attack software tool for being installed on the first operating system mirror image that the second system is sent;
To attack software tool described in the first operating system mirror configuration, attack plane mirror image is obtained.
In the present solution, second user system upload attack plane mirror image first needed for operating system mirror image, such as Linux Ubuntu operating system mirror image, Windows operating system mirror image in operating system etc..
Further, the attack plane software tool that second user system is the first operating system mirror configuration is received, that is, is made The software tool needed is made for attack plane, be can be obtained and is attacked after configuration attack plane software tool in the first operating system mirror image Hit machine mirror image.
In another particular embodiment of the invention, the method also includes:
Receive the second operating system mirror image that second day system is sent;
Receive the vulnerability configuration information of the corresponding second operating system mirror image;
It is the second operating system mirror configuration loophole using the vulnerability configuration information, obtains target drone mirror image.
In the present solution, the second operating system mirror image of user's upload is received, such as the Ubuntu in (SuSE) Linux OS Operating system mirror image, Windows operating system mirror image etc..
It should be noted that vulnerability configuration information can make target drone the configuration information of security breaches occur, in order to attack Machine is hit to launch a offensive to it.To the second operating system mirror configuration loophole, so that target drone mirror image can be obtained.
In a specific embodiment, the Mirror Info using in the target template information determines attack Machine mirror image and target drone mirror image, and the attack plane mirror image and the target drone mirror image are installed in the virtual hardware environment, it obtains After attack plane system and target machine system, further includes:
Floating IP address is distributed for the attack plane system and the target machine system.
It should be noted that due to user using attack plane system or target machine system be usually pass through external network i.e. because Special net carries out, in practice for a cloud platform IP address only one, virtual machine in cloud platform has many again, Therefore different virtual machine is communicated for convenience, passing through network management module in this programme is to need to carry out outer net visit The user asked provides the Floating IP address of virtual machine.
S105, using the network configuration parameters in the target template information respectively to the attack plane system and target drone System carries out network topology and is arranged to obtain network-combination yarn experimental system.
Attack plane system and target machine system complete network topology structure needed for after creating also needing that experimental system is arranged, It also is that network configuration is arranged in attack plane system and target machine system.
There are the network configuration parameters of corresponding attacking system and the network configuration ginseng of corresponding target machine system in target template information Number.
It obtains these network configuration parameters and calls corresponding network configuration interface, complete to attack plane system and target drone system The network configuration of system.
Network configuration parameters can specifically include IP address, subnet mask, default gateway, dns server etc..
After completing network settings, attack plane system and target machine system can become the virtual machine system of intercommunication, and both sides can be with It is communicated according to network configuration, network-combination yarn experimental system is completed to build, and user can pass through the side of transmission teleinstruction Formula operates attack plane system and target machine system, completes network-combination yarn experiment.
In a specific embodiment, the method also includes:
The operating status of the attack plane system and the operating status of the target drone are monitored, and the operating status is anti- It presents in the web interface of the correspondence second user system.
After attack plane system and target machine system come into operation, the operating status and target drone of attack plane system can be monitored The operating status of system, and operating status is fed back to the web interface of second user system, keep administrator timely The first custom system of understanding experimental conditions.
It can be seen that a kind of network-combination yarn time-delay system building method provided by the present application, is receiving the first user system It unites after the template triggering command sent, determines target template, and network is automatically performed according to the configuration information in target template and is attacked Anti- experimental system is built, i.e., all configuration operations can be automatically performed, and is not necessarily to user's manual configuration, is kept network-combination yarn real Check system builds simpler convenience, saves the plenty of time.
A kind of specific network-combination yarn experimental system building method provided by the embodiments of the present application is introduced below, A kind of specific network-combination yarn experimental system building method described below is made further on the basis of the above embodiments Expand and illustrate, other step contents can be cross-referenced with above-described embodiment.
Referring to fig. 2, the embodiment of the present application is on the basis of the above embodiments, further includes:
S201 records the operating system log and software tool log of the attack plane system.
S202 records the operating system log and software tool log of the target machine system.
It should be noted that during the experiment, attack plane system and target machine system can generate operating system log, Software tool in system can also generate log, obtain these logs in order to facilitate user, by attack plane system in this programme Operating system log and software tool log with target machine system are recorded.
S203 receives the download log request that first custom system is sent.
When user needs to download correlation log, downloading day can be sent to cloud platform to request, selects required day Will.
The inquiry log is requested corresponding operating system log and/or software tool log to be back to described by S204 First custom system.
According to request content, corresponding log is back to the first custom system, arrives different attacks respectively without user Search download log in machine system or target machine system, the easy operation of user.
A kind of specific network-combination yarn experimental system building method provided by the embodiments of the present application is introduced below, A kind of specific network-combination yarn experimental system building method described below is made further on the basis of the above embodiments Expand and illustrate, other step contents can be cross-referenced with above-described embodiment.
Referring to Fig. 3, the embodiment of the present application is on the basis of the above embodiments, further includes:
What S301, reception first custom system or the second user system were sent attacks for deleting the network The instruction of anti-experimental system.
It should be noted that can also realize that a key deletes the behaviour of experimental situation by cloud platform when user completes to test Make, cloud platform receives the deletion instruction that the first custom system or second user system are sent first.
S302 deletes the attack plane system and the target machine system.
After receiving deletion instruction, corresponding attack plane system and target machine system are deleted first.
S303 discharges the virtual hardware environment.
After deleting attack plane system and target machine system, it is also necessary to virtual hardware environment is discharged, so that virtual hardware environment It can be re-used again.
A kind of specific network-combination yarn experimental system building method provided by the embodiments of the present application is introduced below, A kind of specific network-combination yarn experimental system building method described below can be cross-referenced with any of the above-described embodiment.
Referring to fig. 4, in the present embodiment, hardware device include gateway, interchanger, router, control node server, Calculate node server, internal network, external network.
On control node server and calculate node server has two to throw the net card respectively, is connected by interchanger, two throw the net Card be separately connected internal network and external network, be mounted on two-server Ubuntu operating system, ApacheTomcat, MySQL and OpenStack, wherein deploys web interface module on control node server, authentication module, cloud orchestration module, Network management module, performance monitoring module deploy computing module, mirror image management module, network pipe on calculate node server Manage module.
Wherein, web interface module, for providing web interface, to be accessed by the user;
Authentication module, for authenticating the custom system currently logged in as the first custom system or second user system, and Assign custom system corresponding permission;
Cloud orchestration module generates corresponding template for receiving the configuration information of second user system upload;
Network management module, for network configuration to be arranged according to the network configuration information in template;
Performance monitoring module, for monitoring the performance data of attack plane system and target machine system;
Computing module provides the virtual hard of different size for being managed work to attack plane system or target machine system Part environment, such as CPU number, memory size, disk size are arranged not according to different delay requirements and operating system demand Same virtual hardware environment is called for cloud orchestration module;
Mirror image management module, mirror image and software tool for being uploaded according to second user generate attack plane mirror image text Part and target drone image file.
Internal network is by server and group of switches at internal network is mainly used for the communication between virtual machine, that is, calculates Server, control server, attack plane system, the communication between target machine system, are managed virtual machine, attacking and defending experimental ring The network topology environment configurations in border, the storage work of whole system also depend on internal network progress, and secure group rule is run on Internal network, be responsible for management intranet network network protocol and port, between internal network and external network using router into Row connection.It is practical since user is usually to be carried out by external network, that is, internet using attack plane system or target machine system On for a cloud platform IP address only one, the virtual machine in cloud platform has many again, therefore right for convenience Different virtual machine is communicated, by network management module to need the user for carrying out extranet access to provide void in this programme Floating IP address, is recovered in the resource pool of Floating IP address by the Floating IP address of quasi- machine using after finishing.
After platform initialization, corresponding calculating, storage, Internet resources are provided, administrator needs to safeguard these moneys Source is scheduled these resources by cloud orchestration module, is supplied to user's use.
Second user system maintenance mirror image management module, by the Windows made and (SuSE) Linux OS mirror image text Part is uploaded to calculate node server, is that the cloud mirrored host computer on attack plane configures corresponding attack software tool, forms attack plane Cloud mirrored host computer is that the cloud mirrored host computer of target drone configures corresponding loophole, forms target drone cloud mirrored host computer.
The type of second user system maintenance cloud host provides for different operating system image files and experiment demand The configuration of different configuration of cloud Host Type, i.e. virtual hardware environment, configuration here refer mainly to CPU number, and memory size is deposited Size is stored up, accomplishes more reasonable resource allocation.
Second user system maintenance cloud orchestration module, the network topology tested for heterogeneous networks attacking and defending and system requirements, Write corresponding experiment pattern.
In the parameter field of template, definition needs the title of cloud host to be used, the title of safe group policy and to be made The public network title used.
The private network to be used in resources field, definition experiment, subnet, network segment, the gateway of private network, routing The Floating IP address that device, the interface of router and port, cloud host and cloud host are distributed, defines Internet resources first, then defines The network equipment, the type for finally defining cloud host, the mirror image used and the Internet resources of connection.
Local net network user logs in the system using correct username and password;Internet user can pass through VPN Technology logs in the system using correct username and password.
After first custom system logs in the system, the target template for the network-combination yarn experiment for needing to carry out is found, operation should Target template, the experimental situation of the automatically dispose experiment, referred to as one " stack ".
First custom system can be checked the topological structure of patterned " stack ", be checked in " stack " and attacked by web interface It hits machine and operating system, IP address, subnet mask, default gateway and dns server that target drone example is used, checks attack plane With the Floating IP address of target drone.
" stack " of each generation obtains Floating IP address from Floating IP address resource pool automatically, the network-combination yarn experiment of " stack " deployment Environment carries out flow isolation using subnet.
First custom system logs on to virtual target drone by the Floating IP address of target drone, it is ensured that target drone has security breaches, meets The condition attacked.
First custom system logs on to virtual attack plane by the Floating IP address on attack plane, it is ensured that the attack that target drone needs is soft Part has been mounted to position, being capable of offensive attack.
First custom system logs on to the attack plane system and target drone of (SuSE) Linux OS using XShell and Floating IP address System is operated using order line, or logs on to attacking for Windows operating system using remote desktop software and Floating IP address Machine system and target machine system are hit, is operated using graphic interface.
After network user login to the cloud host on attack plane, according to laboratory manual, using corresponding attack tool and attack Software is hit to launch a offensive to target drone.
Performance monitoring module passes through the performance for analyzing network packet and cloud host in each " stack ", to second Custom system feeds back each network user's experiment progress situation, at the same record and save in each " stack " attack plane cloud host and The operating system log and associated software tool log of target drone cloud host.
After first custom system completes experiment, downloading correlation log report is analyzed experimental result, is deleted by a key Entire experimental situation is deleted in the operation of " stack ", and the computing resource and storage resource that release cloud host occupies provide Floating IP address Resource pool is put back in source, if you need to carry out other experiments, the corresponding template file of choice experiment, a key rapid deployment experimental situation, life At one new " stack ".
If the first custom system is not completed to test, file an application, retains entire " stack " to administrator, it is subsequent at any time Unfinished experiment is carried out to connect cloud host.
Cloud platform described in present embodiment and cloud orchestration technology provide calculating, storage and network by way of template The step of source carries out United Dispatching and deployment, simplifies deployment experimental situation, realizes the key to network-combination yarn experimental situation And rapid deployment, and authenticity, the isolation of experiment can be taken into account well.Therefore, use cloud platform and cloud orchestration technology can be with It allows administrator to facilitate management system, user is allowed to focus more on experiment itself rather than environment deployment.
A kind of network-combination yarn experimental system system of building provided by the embodiments of the present application is introduced below, is hereafter retouched A kind of network-combination yarn experimental system stated builds system can be cross-referenced with any of the above-described embodiment.
Referring to Fig. 5, a kind of network-combination yarn experimental system system of building provided by the embodiments of the present application is specifically included:
Template triggering command receiving module 401, for receiving the template triggering command of the first custom system transmission;
Target template determining module 402, for determining target template using the template triggering command;
Virtual hardware environment module 403, it is virtual for being created using the hardware configuration information in the target template information Hardware environment;
System creation module 404, for using the Mirror Info in the target template information determine attack plane mirror image with Target drone mirror image, and the attack plane mirror image and the target drone mirror image are installed in the virtual hardware environment, obtain attack plane system System and target machine system;
Network settings module 405, for being attacked respectively to described using the network configuration parameters in the target template information It hits machine system and target machine system carries out network topology and is arranged to obtain network-combination yarn experimental system.
Optionally, the system also includes:
First operating system mirror image receiving module, for receiving the first operating system mirror image of second system transmission;
Software tool receiving module is attacked, is for receiving first operation that is installed on that the second system is sent The attack software tool of system mirror image;
Software tool configuration module is attacked, for attack software tool described in the first operating system mirror configuration, Obtain attack plane mirror image.
Optionally, the system also includes:
Second operating system mirror image receiving module, for receiving the second operating system mirror image of second day system transmission;
Vulnerability configuration information configuration module, for receiving the vulnerability configuration information of the corresponding second operating system mirror image;
Loophole configuration module, for being the second operating system mirror configuration loophole using the vulnerability configuration information, Obtain target drone mirror image.
Optionally, the system also includes:
Floating IP address distribution module, for distributing floating IP address for the attack plane system and the target machine system.
Optionally, the system also includes:
Monitoring running state module, for monitoring the operating status of the attack plane system and the operation shape of the target drone State, and the operating status is fed back in the web interface of the correspondence second user system.
Optionally, the system also includes:
Attack plane logger module, for recording operating system log and the software tool day of the attack plane system Will;
Target drone logging modle, for recording the operating system log and software tool log of the target machine system;
Request receiving module is downloaded in log, the download log request sent for receiving first custom system;
Log sending module, for the inquiry log to be requested corresponding operating system log and/or software tool day Will is back to first custom system.
Optionally, the system also includes:
Command reception module, for receiving that first custom system or the second user system send for deleting Except the instruction of the network-combination yarn experimental system;
Removing module, for deleting the attack plane system and the target machine system;
Release module, for discharging the virtual hardware environment.
The network-combination yarn experimental system of the present embodiment is built system and is built for realizing network-combination yarn experimental system above-mentioned Method, therefore network-combination yarn experimental system builds the visible network-combination yarn experiment system hereinbefore of the specific embodiment in system It unites the embodiment part of building method, for example, network-combination yarn experimental system builds system 401, target template determining module 402, Virtual hardware environment module 403, system creation module 404, network settings module 405 are respectively used to realize above-mentioned network-combination yarn Step S101, S102, S103, S104, S105 in experimental system building method, so, specific embodiment is referred to phase The description for the various pieces embodiment answered, details are not described herein.
Device is built to a kind of network-combination yarn experimental system provided in an embodiment of the present invention below to be introduced, and is hereafter retouched A kind of network-combination yarn experimental system stated builds device can be cross-referenced with any of the above-described embodiment.
Referring to Fig. 6, a kind of network-combination yarn experimental system provided in an embodiment of the present invention builds device, specifically includes:
Memory 100, for storing computer program;
Processor 200 realizes any of the above-described network-combination yarn experimental system side of building when for executing the computer program The step of method.
Specifically, memory 100 includes non-volatile memory medium, built-in storage.Non-volatile memory medium storage There are operating system and computer-readable instruction, which is operating system and computer in non-volatile memory medium The operation of readable instruction provides environment.Processor 200 builds device for network-combination yarn experimental system and provides calculating and control energy Network-combination yarn experimental system building method described in any of the above-described embodiment may be implemented in power.
Further, the network-combination yarn experimental system in the present embodiment builds device, can also include:
Input interface 300, for obtaining the computer program of extraneous importing, and the computer program that will acquire saves Extremely in the memory 100, it can be also used for the various instructions and parameter that obtain extraneous terminal device transmission, and be transmitted to place It manages in device 200, so that processor 200 is handled accordingly using above-mentioned various instructions and parametric evolving.It is described in the present embodiment Input interface 300 can specifically include but be not limited to USB interface, serial line interface, speech input interface, fingerprint input interface, hard Disk reads interface etc..
Output interface 400, the various data for generating processor 200 are exported to coupled terminal device, with Other terminal devices convenient for being connected with output interface 400 can get the various data of the generation of processor 200.This implementation In example, the output interface 400 can specifically include but be not limited to USB interface, serial line interface etc..
Communication unit 500, for completing the communication of current device and other equipment.
Keyboard 600, the various parameters data or instruction inputted and tapping keycap in real time for obtaining user.
Display 700 carries out real-time display for the relevant information to network-combination yarn experimental system build process, so as to Current network attacking and defending experimental system is understood in time in user builds situation.
Mouse 800 can be used for assisting user input data and simplify the operation of user.
The present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the computer Step provided by above-described embodiment may be implemented when program is executed by processor.The storage medium may include: USB flash disk, movement Hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), the various media that can store program code such as magnetic or disk.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with its The difference of his embodiment, the same or similar parts in each embodiment may refer to each other.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, defined herein General Principle can realize in other embodiments without departing from the spirit or scope of the present invention.Therefore, originally Invention is not intended to be limited to the embodiments shown herein, and is to fit to special with principles disclosed herein and novelty The consistent widest scope of point.

Claims (10)

1. a kind of network-combination yarn experimental system building method characterized by comprising
Receive the template triggering command of the first custom system transmission;
Target template is determined using the template triggering command;
Virtual hardware environment is created using the hardware configuration information in the target template information;
Attack plane mirror image and target drone mirror image are determined using the Mirror Info in the target template information, and in the virtual hardware The attack plane mirror image and the target drone mirror image are installed in environment, obtain attack plane system and target machine system;
Net is carried out to the attack plane system and target machine system respectively using the network configuration parameters in the target template information Network topology is arranged to obtain network-combination yarn experimental system.
2. the method according to claim 1, wherein the method also includes:
Receive the first operating system mirror image that second system is sent;
Receive the attack software tool for being installed on the first operating system mirror image that the second system is sent;
To attack software tool described in the first operating system mirror configuration, attack plane mirror image is obtained.
3. the method according to claim 1, wherein the method also includes:
Receive the second operating system mirror image that second day system is sent;
Receive the vulnerability configuration information of the corresponding second operating system mirror image;
It is the second operating system mirror configuration loophole using the vulnerability configuration information, obtains target drone mirror image.
4. the method according to claim 1, wherein the Mirror Info using in the target template information It determines attack plane mirror image and target drone mirror image, and the attack plane mirror image and the target drone mirror is installed in the virtual hardware environment Picture, after obtaining attack plane system and target machine system, further includes:
Floating IP address is distributed for the attack plane system and the target machine system.
5. the method according to claim 1, wherein the method also includes:
The operating status of the attack plane system and the operating status of the target drone are monitored, and the operating status is fed back in right Answer the web interface of the second user system.
6. the method according to claim 1, wherein the method also includes:
Record the operating system log and software tool log of the attack plane system;
Record the operating system log and software tool log of the target machine system;
Receive the download log request that first custom system is sent;
Corresponding operating system log and/or software tool log is requested to be back to the first user system the inquiry log System.
7. according to claim 1 to method described in 6 any one, which is characterized in that the method also includes:
Receive that first custom system or the second user system send for deleting the network-combination yarn experimental system Instruction;
Delete the attack plane system and the target machine system;
Discharge the virtual hardware environment.
8. a kind of network-combination yarn experimental system builds system characterized by comprising
Template triggering command receiving module, for receiving the template triggering command of the first custom system transmission;
Target template determining module, for determining target template using the template triggering command;
Virtual hardware environment module, for creating virtual hardware ring using the hardware configuration information in the target template information Border;
System creation module, for determining attack plane mirror image and target drone mirror using the Mirror Info in the target template information Picture, and the attack plane mirror image and the target drone mirror image are installed in the virtual hardware environment, obtain attack plane system and target Machine system;
Network settings module, for utilizing the network configuration parameters in the target template information respectively to the attack plane system Network topology is carried out with target machine system to be arranged to obtain network-combination yarn experimental system.
9. a kind of network-combination yarn experimental system builds device characterized by comprising
Memory, for storing computer program;
Processor realizes the network-combination yarn experiment system as described in any one of claim 1 to 7 when for executing the computer program The step of system building method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the network-combination yarn experimental system as described in any one of claim 1 to 7 when the computer program is executed by processor The step of building method.
CN201910615849.2A 2019-07-09 2019-07-09 Network-combination yarn experimental system building method, system, device and storage medium Pending CN110351271A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910615849.2A CN110351271A (en) 2019-07-09 2019-07-09 Network-combination yarn experimental system building method, system, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910615849.2A CN110351271A (en) 2019-07-09 2019-07-09 Network-combination yarn experimental system building method, system, device and storage medium

Publications (1)

Publication Number Publication Date
CN110351271A true CN110351271A (en) 2019-10-18

Family

ID=68178642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910615849.2A Pending CN110351271A (en) 2019-07-09 2019-07-09 Network-combination yarn experimental system building method, system, device and storage medium

Country Status (1)

Country Link
CN (1) CN110351271A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111726421A (en) * 2020-07-01 2020-09-29 哈尔滨工业大学(威海) Method and device for realizing interconnection of network target range and industrial control equipment
CN111786832A (en) * 2020-07-01 2020-10-16 哈尔滨工业大学(威海) Method and device for interconnecting attack and defense platform and various industrial control scenes
CN111897624A (en) * 2020-06-23 2020-11-06 华宇恒拓(天津)科技有限公司 Method for building information security network attack and defense experiment platform
CN112447076A (en) * 2020-11-05 2021-03-05 贵州数安汇大数据产业发展有限公司 Real-network attack and defense drilling system with controllable risk
CN113162954A (en) * 2021-06-23 2021-07-23 西南石油大学 Target drone creating method and network attack and defense training system
CN114257506A (en) * 2021-12-21 2022-03-29 北京知道未来信息技术有限公司 Network target range construction method and device, back-end server and readable storage medium
CN114726757A (en) * 2022-03-24 2022-07-08 深圳市领创星通科技有限公司 Equipment networking test method and device, computer equipment and storage medium
CN115334698A (en) * 2022-07-20 2022-11-11 烽台科技(北京)有限公司 Construction method, device, terminal and medium for 5G safety network of target range target
CN117331758A (en) * 2023-11-29 2024-01-02 博智安全科技股份有限公司 Verification method and device for target virtual machine mirror image, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701777A (en) * 2013-12-11 2014-04-02 长春理工大学 Remote network attack and defense virtual simulation system based on virtualization and cloud technology
US9311160B2 (en) * 2011-11-10 2016-04-12 Verizon Patent And Licensing Inc. Elastic cloud networking

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9311160B2 (en) * 2011-11-10 2016-04-12 Verizon Patent And Licensing Inc. Elastic cloud networking
CN103701777A (en) * 2013-12-11 2014-04-02 长春理工大学 Remote network attack and defense virtual simulation system based on virtualization and cloud technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴怡晨等: "面向网络空间的攻防靶场设计", 《通信技术》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111897624A (en) * 2020-06-23 2020-11-06 华宇恒拓(天津)科技有限公司 Method for building information security network attack and defense experiment platform
CN111786832B (en) * 2020-07-01 2022-06-07 哈尔滨工业大学(威海) Method and device for interconnecting attack and defense platform and various industrial control scenes
CN111786832A (en) * 2020-07-01 2020-10-16 哈尔滨工业大学(威海) Method and device for interconnecting attack and defense platform and various industrial control scenes
CN111726421A (en) * 2020-07-01 2020-09-29 哈尔滨工业大学(威海) Method and device for realizing interconnection of network target range and industrial control equipment
CN111726421B (en) * 2020-07-01 2022-06-07 哈尔滨工业大学(威海) Method and device for realizing interconnection of network target range and industrial control equipment
CN112447076A (en) * 2020-11-05 2021-03-05 贵州数安汇大数据产业发展有限公司 Real-network attack and defense drilling system with controllable risk
CN113162954A (en) * 2021-06-23 2021-07-23 西南石油大学 Target drone creating method and network attack and defense training system
CN113162954B (en) * 2021-06-23 2021-09-03 西南石油大学 Target drone creating method and network attack and defense training system
CN114257506A (en) * 2021-12-21 2022-03-29 北京知道未来信息技术有限公司 Network target range construction method and device, back-end server and readable storage medium
CN114257506B (en) * 2021-12-21 2024-04-02 北京知道未来信息技术有限公司 Network target range construction method and device, back-end server and readable storage medium
CN114726757A (en) * 2022-03-24 2022-07-08 深圳市领创星通科技有限公司 Equipment networking test method and device, computer equipment and storage medium
CN114726757B (en) * 2022-03-24 2024-05-03 深圳市领创星通科技有限公司 Equipment networking test method, device, computer equipment and storage medium
CN115334698A (en) * 2022-07-20 2022-11-11 烽台科技(北京)有限公司 Construction method, device, terminal and medium for 5G safety network of target range target
CN115334698B (en) * 2022-07-20 2023-05-23 烽台科技(北京)有限公司 Construction method, device, terminal and medium of target 5G safety network of target range
CN117331758A (en) * 2023-11-29 2024-01-02 博智安全科技股份有限公司 Verification method and device for target virtual machine mirror image, electronic equipment and storage medium
CN117331758B (en) * 2023-11-29 2024-02-23 博智安全科技股份有限公司 Verification method and device for target virtual machine mirror image, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110351271A (en) Network-combination yarn experimental system building method, system, device and storage medium
JP6474926B1 (en) Field device management method and apparatus based on cloud server
CN109254831B (en) Virtual machine network security management method based on cloud management platform
CN103701777B (en) Based on virtualization and the telecommunication network attacking and defending dummy emulation system of cloud
CN104221325B (en) For the system and method for the security configuration that mirror image is virtualized in network environment
US9648040B1 (en) Authorization check using a web service request
JP2014506045A (en) Network stimulation engine
CN111049686B (en) Safety protection virtual laboratory of power monitoring system and construction method thereof
CN105610675B (en) A kind of creation method and device of virtual vpn gateway
US9021008B1 (en) Managing targeted scripts
CN106650425B (en) A kind of control method and device of security sandbox
CN108028827A (en) The management method and device of certificate in network function virtualization architecture
CN106031128A (en) Providing mobile device management functionalities
JP2015231138A (en) Cyber attack practice system, practice environment providing method, and, practice environment providing program
Eskridge et al. VINE: a cyber emulation environment for MTD experimentation
CN110851827A (en) Service customizable high-interaction honeypot realized based on container technology and use method
CN108605264A (en) Network management
US20220159062A1 (en) Setting apparatus, communication system, setting method, and program
CN112003964B (en) Multi-architecture-based IP address allocation method, device and medium
CN102694667A (en) Method supporting user autonomous deployment of network and system thereof
CN105120010B (en) A kind of virtual machine Anti-theft method under cloud environment
CN107733717A (en) A kind of network collocating method of cloud platform movable type O&M
CN103220235B (en) The management method of the distributed virtual switch and relevant apparatus and system
Alvarenga et al. RIO: A denial of service experimentation platform in a Future Internet Testbed
Raychev et al. Development and Integration of Educational Software Defined Networking Platform in Computer Networking Classes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191018

RJ01 Rejection of invention patent application after publication