CN111343158A - Network shooting range platform based on virtualization technology - Google Patents

Network shooting range platform based on virtualization technology Download PDF

Info

Publication number
CN111343158A
CN111343158A CN202010087983.2A CN202010087983A CN111343158A CN 111343158 A CN111343158 A CN 111343158A CN 202010087983 A CN202010087983 A CN 202010087983A CN 111343158 A CN111343158 A CN 111343158A
Authority
CN
China
Prior art keywords
attack
environment
network
simulation subsystem
subsystem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010087983.2A
Other languages
Chinese (zh)
Other versions
CN111343158B (en
Inventor
傅涛
郑轶
王力
王路路
周围
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bozhi Safety Technology Co ltd
Original Assignee
Bozhi Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bozhi Safety Technology Co ltd filed Critical Bozhi Safety Technology Co ltd
Priority to CN202010087983.2A priority Critical patent/CN111343158B/en
Publication of CN111343158A publication Critical patent/CN111343158A/en
Application granted granted Critical
Publication of CN111343158B publication Critical patent/CN111343158B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a network shooting range platform based on virtualization technology, which belongs to the field of network security and comprises an attack and defense control subsystem, an attack simulation subsystem and an environment simulation subsystem. The environment simulation subsystem provides a simulated network environment platform, and the attack simulation subsystem is distributed and deployed with various network attack tool sets and can simulate and initiate various different network attack behaviors to the environment simulation subsystem; the attack and defense commanding and controlling subsystem realizes management scheduling and resource allocation of the network attack task, evaluates the overall situation of the network attack and the battlefield attack and defense result and presents the evaluation result in a visual mode.

Description

Network shooting range platform based on virtualization technology
Technical Field
The invention relates to the field of network security, in particular to a network shooting range platform based on a virtualization technology.
Background
In recent years, network shooting range attack and defense war is increasingly prevalent, and a large number of network attack and defense researchers urgently need to improve penetration and protection capability through network attack and defense actual war. At present, the network target range in China is small in scale, mainly aims at a certain professional field, and is not suitable for systematic network space security drilling and evaluation.
Network battle target Range (cyberware Range), as network battles increasingly receive the importance of military in various countries, professional laboratories for network attack and defense tactical drilling begin to appear.
The network battle target field is characterized in that a real Racing network space attack and defense battle environment is simulated by combining a virtual environment and real equipment, and a Racing battle capacity research and Racing weapon equipment verification test platform can be supported.
The network battle target range provides a simulation environment for the country to construct a real network attack and defense battle, and tests are carried out aiming at electronic battle means such as hostile electronics, network attack and the like.
The network battle target range establishes a special test platform for the country to verify the information safety system, and shares research data with related departments, thereby improving the national information safety level.
At present, the scale of the network target range in China aims at a certain professional field, and the scene is single.
Disclosure of Invention
1. Technical problem to be solved
Aiming at the problems in the prior art, the invention aims to provide a network shooting range platform based on a virtualization technology, which can change resource equipment into a resource pool by a virtualization means and perform unified management and scheduling on the resource pool so as to realize flexible deployment of service resources aiming at the problem of single scene.
2. Technical scheme
In order to solve the above problems, the present invention adopts the following technical solutions.
A network target range platform based on virtualization technology comprises an attack and defense control subsystem, wherein the attack and defense control subsystem comprises a visualization module, a system parameter configuration module, a service environment control module, a user management module, a task management module, a resource management module, a data acquisition module, a data analysis module, a situation perception module and an effect evaluation module, and further comprises an attack simulation subsystem, the attack simulation subsystem comprises a scanning detection tool, a vulnerability utilization tool, a remote control defense tool, a DOS attack tool, a vulnerability discovery tool, an intranet penetration tool, a password cracking tool and a tool kit, the tool kit comprises an on-line evidence obtaining and a secret weapon, a virtualization simulation support module and an environment simulation subsystem are arranged in the attack simulation subsystem, and the attack simulation subsystem and the environment simulation subsystem are interacted through network attack and defense data streams, the environmental simulation subsystem comprises an internet target range environment, an industrial control network target range environment and an internet of things target range environment, and further comprises honeypot equipment, the honeypot equipment comprises a host honeypot and an application honeypot, a virtualization simulation support module is also arranged in the environmental simulation subsystem, the attack simulation subsystem is connected with a data acquisition module through a probe, and the environmental simulation subsystem is also connected with the data acquisition module through the probe.
Further, the internet shooting range environment comprises a portal, social media and an e-commerce platform.
Furthermore, the industrial control network target range environment comprises an experiment platform, a mobile target range and private network simulation.
Furthermore, the target range environment of the Internet of things comprises video monitoring, intelligent transportation and an access control network.
3. Advantageous effects
Compared with the prior art, the invention has the advantages that:
(1) the network environment can be dynamically constructed, and the scene types are rich.
(2) Provides an environment close to actual combat network attack and defense training.
(3) The network fighting method enables the students to be skilled in mastering the network fighting means and improves the network special fighting capacity of the students.
Drawings
FIG. 1 is a schematic diagram of the platform of the present invention;
Detailed Description
The drawings in the embodiments of the invention will be combined; the technical scheme in the embodiment of the invention is clearly and completely described; obviously; the described embodiments are only some of the embodiments of the invention; but not all embodiments, are based on the embodiments of the invention; all other embodiments obtained by a person skilled in the art without making any inventive step; all fall within the scope of protection of the present invention.
In the description of the present invention, it should be noted that the terms "upper", "lower", "inner", "outer", "top/bottom", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of description and simplification of description, but do not indicate or imply that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and thus should not be construed as limiting the present invention. Furthermore, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "disposed," "sleeved/connected," "connected," and the like are to be construed broadly, e.g., "connected," which may be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1:
referring to fig. 1, a network shooting range platform based on virtualization technology comprises an attack and defense control subsystem, wherein the attack and defense control subsystem comprises a visualization module, a system parameter configuration module, a service environment control module, a user management module, a task management module, a resource management module, a data acquisition module, a data analysis module, a situation perception module and an effect evaluation module, and further comprises an attack simulation subsystem, the attack simulation subsystem comprises a scanning detection tool, a vulnerability utilization tool, a remote control watching tool, a DOS attack tool, a vulnerability mining tool, an intranet penetration tool, a password cracking tool and a tool kit, the tool kit comprises an on-line evidence obtaining and an encrypted weapon, and a virtualization simulation support module is arranged in the attack simulation subsystem.
The system comprises an attack simulation subsystem and an environment simulation subsystem, wherein the attack simulation subsystem and the environment simulation subsystem are interacted through network attack and defense data streams, and the environment simulation subsystem comprises an internet shooting range environment, an industrial control network shooting range environment and an internet of things shooting range environment. The internet shooting range environment comprises a portal website, social media and an e-commerce platform, the industrial control network shooting range environment comprises an experiment platform, a mobile shooting range and a private network simulation, and the internet of things shooting range environment comprises video monitoring, intelligent transportation and an access control network.
The environmental simulation subsystem further comprises honeypot equipment, the honeypot equipment comprises a host honeypot and an application honeypot, a virtualization simulation supporting module is also arranged in the environmental simulation subsystem, the attack simulation subsystem is connected with a data acquisition module through a probe, and the environmental simulation subsystem is also connected with the data acquisition module through the probe.
(1) The environment simulation subsystem: based on the virtualization simulation support module, an attack and defense confrontation network scene is dynamically constructed, and the method comprises the deployment of confrontation virtual hardware environments such as host computer computing resources, network bandwidth resources, storage resources and security equipment resources, and also comprises the dynamic construction of software environments such as an operating system, system bugs, attack tools and application programs.
(2) The attack simulation subsystem: based on the virtualization simulation support module, various network attack tools are simulated, and various different network attack behaviors are simulated and initiated.
(3) Attack and defense finger control subsystem: the network attack management and scheduling and resource allocation are realized, and meanwhile, the attack and defense commanding and controlling subsystem integrates the analysis functions of situation awareness and attack and defense evaluation, evaluates the overall situation of the network attack and the attack and defense result of the battlefield and presents the evaluation in a visual mode.
The process comprises the following steps:
the attack simulation subsystem and the environment simulation subsystem are interacted through data streams, so that attack and defense drilling application is realized; meanwhile, in the process of attack and defense drilling, the system realizes the collection of log data through the probe equipment and the analysis and visual presentation of the data in the attack and defense commanding subsystem, on the other hand, the attack and defense commanding subsystem realizes the allocation of attack and defense tasks, the configuration of environment, the management of resources and the setting of system parameters, and the attack simulation subsystem directly receives the attack tasks issued by the attack and defense commanding subsystem and carries out network attack on the environment simulation subsystem.
The invention provides a network shooting range platform based on a virtualization technology, which comprises an environment simulation subsystem, an attack simulation subsystem and an attack and defense control subsystem. The environment simulation subsystem provides a simulated network environment platform, and the attack simulation subsystem is distributed and deployed with various network attack tool sets and can simulate and initiate various different network attack behaviors to the environment simulation subsystem; the attack and defense commanding and controlling subsystem realizes management scheduling and resource allocation of the network attack task, evaluates the overall situation of the network attack and the battlefield attack and defense result and presents the evaluation result in a visual mode.
The above; but are merely preferred embodiments of the invention; the scope of the invention is not limited thereto; any person skilled in the art is within the technical scope of the present disclosure; the technical scheme and the improved concept of the invention are equally replaced or changed; are intended to be covered by the scope of the present invention.

Claims (4)

1. A network shooting range platform based on virtualization technology is characterized in that: the system comprises an attack and defense control subsystem, wherein the attack and defense control subsystem comprises a visualization module, a system parameter configuration module, a service environment control module, a user management module, a task management module, a resource management module, a data acquisition module, a data analysis module, a situation perception module and an effect evaluation module, and further comprises an attack simulation subsystem, the attack simulation subsystem comprises a scanning detection tool, a leak utilization tool, a remote control defense tool, a DOS attack tool, a vulnerability discovery tool, an intranet penetration tool, a password cracking tool and a tool kit, the tool kit comprises an on-line evidence obtaining and an encryption weapon, a virtualization simulation support module is arranged in the attack simulation subsystem, the attack simulation subsystem further comprises an environment simulation subsystem, the attack simulation subsystem and the environment simulation subsystem are interacted through a network attack and defense data stream, and the environment simulation subsystem comprises an internet target range environment, The industrial control network target range environment, the thing networking target range environment, the environment simulation subsystem still includes the honeypot equipment, the honeypot equipment is including host computer honeypot and application honeypot, be equipped with virtualization emulation support module in the environment simulation subsystem equally, attack simulation subsystem has data acquisition module through the probe connection, the environment simulation subsystem has data acquisition module through the probe connection equally.
2. The virtualization technology-based network shooting range platform of claim 1, wherein: the internet shooting range environment comprises a portal website, social media and an e-commerce platform.
3. The virtualization technology-based network shooting range platform of claim 1, wherein: the industrial control network target range environment comprises an experiment platform, a mobile target range and a private network simulation.
4. The virtualization technology-based network shooting range platform of claim 1, wherein: the target range environment of the Internet of things comprises video monitoring, intelligent transportation and an access control network.
CN202010087983.2A 2020-02-12 2020-02-12 Network shooting range platform based on virtualization technology Active CN111343158B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010087983.2A CN111343158B (en) 2020-02-12 2020-02-12 Network shooting range platform based on virtualization technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010087983.2A CN111343158B (en) 2020-02-12 2020-02-12 Network shooting range platform based on virtualization technology

Publications (2)

Publication Number Publication Date
CN111343158A true CN111343158A (en) 2020-06-26
CN111343158B CN111343158B (en) 2022-06-14

Family

ID=71186835

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010087983.2A Active CN111343158B (en) 2020-02-12 2020-02-12 Network shooting range platform based on virtualization technology

Country Status (1)

Country Link
CN (1) CN111343158B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111800420A (en) * 2020-07-06 2020-10-20 南方电网科学研究院有限责任公司 Network security target range system of power system
CN112055026A (en) * 2020-09-11 2020-12-08 湖南泛联新安信息科技有限公司 Network target range physical environment construction method and system
CN112104514A (en) * 2020-11-18 2020-12-18 中国人民解放军国防科技大学 Multi-view network attack and defense simulation system
CN112153010A (en) * 2020-08-31 2020-12-29 北京全路通信信号研究设计院集团有限公司 Network security shooting range system and operation method thereof
CN113067728A (en) * 2021-03-17 2021-07-02 中国人民解放军海军工程大学 Network security attack and defense test platform
CN113438103A (en) * 2021-06-08 2021-09-24 博智安全科技股份有限公司 Large-scale network target range and construction method, construction device and construction equipment thereof
CN113595799A (en) * 2021-08-03 2021-11-02 北京恒安嘉新安全技术有限公司 Mobile network shooting range system and network flow attack simulation method
CN113691416A (en) * 2021-07-29 2021-11-23 中科兴云(北京)科技有限公司 Distributed layered deployed network target range management platform
CN114040408A (en) * 2021-11-02 2022-02-11 恒安嘉新(北京)科技股份公司 Shooting range system based on 4G mobile network simulation environment
CN114071467A (en) * 2021-11-04 2022-02-18 恒安嘉新(北京)科技股份公司 Shooting range system based on 4G mobile network simulation environment
CN115225347A (en) * 2022-06-30 2022-10-21 烽台科技(北京)有限公司 Method and device for monitoring shooting range resources
CN115225513A (en) * 2022-05-27 2022-10-21 湖南大佳数据科技有限公司 Network space actual combat training platform system and implementation method
CN117459402A (en) * 2023-10-09 2024-01-26 北京五一嘉峪科技有限公司 Cloud target range competition system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201307794A (en) * 2011-08-09 2013-02-16 Chung Shan Inst Of Science Firearm shooting simulation system and method thereof
CN103701777A (en) * 2013-12-11 2014-04-02 长春理工大学 Remote network attack and defense virtual simulation system based on virtualization and cloud technology
CN104410617A (en) * 2014-11-21 2015-03-11 西安邮电大学 Information safety attack and defense system structure of cloud platform
US20150295948A1 (en) * 2012-10-23 2015-10-15 Suzanne P. Hassell Method and device for simulating network resiliance against attacks
CN108521423A (en) * 2018-04-10 2018-09-11 江苏亨通工控安全研究院有限公司 HWIL simulation industry control network target range system
CN108900498A (en) * 2018-06-25 2018-11-27 哈尔滨工业大学 A kind of scheduling corpse machine attack method based on bgp network target range
CN109361534A (en) * 2018-09-20 2019-02-19 中国航天系统科学与工程研究院 A kind of network security emulation system
CN109802841A (en) * 2017-11-16 2019-05-24 四川勇超网络科技有限公司 A kind of network-combination yarn target range system based on cloud platform
CN110098951A (en) * 2019-03-04 2019-08-06 西安电子科技大学 A kind of network-combination yarn virtual emulation based on virtualization technology and safety evaluation method and system
CN209820257U (en) * 2018-09-21 2019-12-20 成都克诺尔科技有限公司 Setting device for shooting game

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201307794A (en) * 2011-08-09 2013-02-16 Chung Shan Inst Of Science Firearm shooting simulation system and method thereof
US20150295948A1 (en) * 2012-10-23 2015-10-15 Suzanne P. Hassell Method and device for simulating network resiliance against attacks
CN103701777A (en) * 2013-12-11 2014-04-02 长春理工大学 Remote network attack and defense virtual simulation system based on virtualization and cloud technology
CN104410617A (en) * 2014-11-21 2015-03-11 西安邮电大学 Information safety attack and defense system structure of cloud platform
CN109802841A (en) * 2017-11-16 2019-05-24 四川勇超网络科技有限公司 A kind of network-combination yarn target range system based on cloud platform
CN108521423A (en) * 2018-04-10 2018-09-11 江苏亨通工控安全研究院有限公司 HWIL simulation industry control network target range system
CN108900498A (en) * 2018-06-25 2018-11-27 哈尔滨工业大学 A kind of scheduling corpse machine attack method based on bgp network target range
CN109361534A (en) * 2018-09-20 2019-02-19 中国航天系统科学与工程研究院 A kind of network security emulation system
CN209820257U (en) * 2018-09-21 2019-12-20 成都克诺尔科技有限公司 Setting device for shooting game
CN110098951A (en) * 2019-03-04 2019-08-06 西安电子科技大学 A kind of network-combination yarn virtual emulation based on virtualization technology and safety evaluation method and system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
刘晓曦: "基于电力物联网的网络安全靶场应用设计", 《信息与电脑(理论版)》 *
刘晓曦: "基于电力物联网的网络安全靶场应用设计", 《信息与电脑(理论版)》, 25 August 2019 (2019-08-25) *
韩卫国: "面向赛博空间的网络靶场建设思路", 《计算机与数字工程》 *
韩卫国: "面向赛博空间的网络靶场建设思路", 《计算机与数字工程》, 20 August 2015 (2015-08-20) *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111800420A (en) * 2020-07-06 2020-10-20 南方电网科学研究院有限责任公司 Network security target range system of power system
CN112153010A (en) * 2020-08-31 2020-12-29 北京全路通信信号研究设计院集团有限公司 Network security shooting range system and operation method thereof
CN112153010B (en) * 2020-08-31 2023-01-20 北京全路通信信号研究设计院集团有限公司 Network security shooting range system and operation method thereof
CN112055026B (en) * 2020-09-11 2022-06-10 湖南泛联新安信息科技有限公司 Network target range physical environment construction method and system
CN112055026A (en) * 2020-09-11 2020-12-08 湖南泛联新安信息科技有限公司 Network target range physical environment construction method and system
CN112104514A (en) * 2020-11-18 2020-12-18 中国人民解放军国防科技大学 Multi-view network attack and defense simulation system
CN112104514B (en) * 2020-11-18 2021-02-26 中国人民解放军国防科技大学 Multi-view network attack and defense simulation system
CN113067728A (en) * 2021-03-17 2021-07-02 中国人民解放军海军工程大学 Network security attack and defense test platform
CN113438103B (en) * 2021-06-08 2023-08-22 博智安全科技股份有限公司 Large-scale network shooting range, construction method, construction device and construction equipment thereof
CN113438103A (en) * 2021-06-08 2021-09-24 博智安全科技股份有限公司 Large-scale network target range and construction method, construction device and construction equipment thereof
CN113691416A (en) * 2021-07-29 2021-11-23 中科兴云(北京)科技有限公司 Distributed layered deployed network target range management platform
CN113691416B (en) * 2021-07-29 2024-05-31 中科兴云(北京)科技有限公司 Distributed layered deployment network target range management platform
CN113595799B (en) * 2021-08-03 2024-06-04 北京恒安嘉新安全技术有限公司 Mobile network target range system and network traffic attack simulation method
CN113595799A (en) * 2021-08-03 2021-11-02 北京恒安嘉新安全技术有限公司 Mobile network shooting range system and network flow attack simulation method
CN114040408A (en) * 2021-11-02 2022-02-11 恒安嘉新(北京)科技股份公司 Shooting range system based on 4G mobile network simulation environment
CN114040408B (en) * 2021-11-02 2024-05-28 恒安嘉新(北京)科技股份公司 Target range system based on 4G mobile network simulation environment
CN114071467A (en) * 2021-11-04 2022-02-18 恒安嘉新(北京)科技股份公司 Shooting range system based on 4G mobile network simulation environment
CN115225513B (en) * 2022-05-27 2024-01-30 湖南大佳数据科技有限公司 Network space actual combat training platform system and implementation method
CN115225513A (en) * 2022-05-27 2022-10-21 湖南大佳数据科技有限公司 Network space actual combat training platform system and implementation method
CN115225347B (en) * 2022-06-30 2023-12-22 烽台科技(北京)有限公司 Method and device for monitoring target range resources
CN115225347A (en) * 2022-06-30 2022-10-21 烽台科技(北京)有限公司 Method and device for monitoring shooting range resources
CN117459402A (en) * 2023-10-09 2024-01-26 北京五一嘉峪科技有限公司 Cloud target range competition system

Also Published As

Publication number Publication date
CN111343158B (en) 2022-06-14

Similar Documents

Publication Publication Date Title
CN111343158B (en) Network shooting range platform based on virtualization technology
Tian et al. A real-time correlation of host-level events in cyber range service for smart campus
CN111327463B (en) Industrial Internet security practical training platform based on virtualization
Parks et al. Principles of cyberwarfare
CN108922298A (en) A kind of electric power safety operation training system
CN113691416A (en) Distributed layered deployed network target range management platform
CN112153010A (en) Network security shooting range system and operation method thereof
CN109802841A (en) A kind of network-combination yarn target range system based on cloud platform
Cisar et al. Some ethical hacking possibilities in Kali Linux environment
CN114329484A (en) Target network security risk automatic assessment method, device, equipment and medium
Schafer et al. The IWAR range: a laboratory for undergraduate information assurance education
CN117176452A (en) Dynamic honey point placement method and device
KR102033750B1 (en) Electronic warfare signal low data generation device for avionics electronic warfare system and method of generating low data thereof
KR102381277B1 (en) Method And Apparatus for Providing Security for Defending Cyber Attack
Thomas Like adding wings to the tiger: Chinese information war theory and practice
Vautrinot Sharing the Cyber Journey
KR101200055B1 (en) Real time protecting system from infiltraion for c4isr and data center
Okolica et al. Developing systems for cyber situational awareness
Maji et al. White Hat Security-An Overview of Penetration Testing Tools
Schwartz et al. Automated testing of a cyber training environment within an agile development process
Ošlejšek et al. Towards a unified data storage and generic visualizations in cyber ranges
Hoff et al. Simulation in support of army structure analysis
Blumbergs Specialized cyber red team responsive computer network operations
KR102345332B1 (en) Avionics electronic signals intelligence warfare integration system and control method thereof
CN111312005A (en) Electronic evidence obtaining practical training platform based on virtualization technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant