CN111555913A - Simulation method, system, electronic device and storage medium for simulating real network environment based on virtualization - Google Patents
Simulation method, system, electronic device and storage medium for simulating real network environment based on virtualization Download PDFInfo
- Publication number
- CN111555913A CN111555913A CN202010332981.5A CN202010332981A CN111555913A CN 111555913 A CN111555913 A CN 111555913A CN 202010332981 A CN202010332981 A CN 202010332981A CN 111555913 A CN111555913 A CN 111555913A
- Authority
- CN
- China
- Prior art keywords
- layer
- information
- service layer
- virtualization
- simulation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004088 simulation Methods 0.000 title claims abstract description 53
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000006243 chemical reaction Methods 0.000 claims description 12
- 238000007689 inspection Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 9
- 230000007123 defense Effects 0.000 abstract description 13
- 238000005553 drilling Methods 0.000 abstract description 10
- 230000008569 process Effects 0.000 abstract description 6
- 238000012795 verification Methods 0.000 abstract description 4
- 238000011156 evaluation Methods 0.000 abstract 1
- 238000012360 testing method Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 4
- 238000011160 research Methods 0.000 description 4
- 238000010276 construction Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035515 penetration Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012502 risk assessment Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45562—Creating, deleting, cloning virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45575—Starting, stopping, suspending or resuming virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45595—Network integration; Enabling network access in virtual machine instances
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to the technical field of virtualization network simulation, in particular to a simulation method, a simulation system, electronic equipment and a storage medium for simulating a real network environment based on virtualization; the simulation method comprises the following steps: starting to create a shooting range; setting basic information; setting topology information; creating a resource; setting a full scene starting; saving the scene; the shooting range creation is complete. According to the simulation method, the simulation system, the electronic equipment and the storage medium for simulating the real network environment based on virtualization, network attack and defense parameters can be configured as required, such as a topological structure, the number of nodes, rule parameters and the like; the device can be used for performing drills in various modes to meet different application requirements, including red and blue countermeasure, individual drill and equipment system verification; in the drilling process, the target range can support rapid deployment of different attack and defense scenes in the aspects of operating resources and managing resources, so that safety evaluation is carried out on the target range in an all-around manner, and weak links are improved.
Description
Technical Field
The invention relates to the technical field of virtualization network simulation, in particular to a simulation method, a simulation system, electronic equipment and a storage medium for simulating a real network environment based on virtualization.
Background
With the rapid development of computer network technology and the wide application thereof in various fields, the social circles also pay more and more attention to the information network security problem, and resources are continuously invested to carry out network attack and defense drilling and information security research. Considering the real-time and high reliability requirements of computer network application services, it is difficult to directly perform network attack and defense drilling and penetration test research on a service network, especially a production system.
The network target range technology can simulate a real service network, attack and defense drilling can be carried out on the network target range technology, damage to the real service network can be avoided, the cost is low, the deployment is flexible, the process can be repeated, and the method is an effective way for network attack and defense drilling and test research
The network target range concept is originally proposed in the military field, is an information security test platform constructed for meeting the research requirements of an information weapon system, and is an information war simulation environment close to actual combat. Meanwhile, network target range construction is highly valued by all countries in the world and is used as an important means for supporting network space safety technical verification, network weapon test, attack and defense confrontation drilling and network risk assessment.
Chinese patent CN201711270092.5 provides a method and a system for realizing a network shooting range based on Docker; virtualizing system resources of the network shooting range system by adopting a Docker engine, and establishing virtual system resources; the service process of the Docker engine calls a virtual system resource deployment and control Docker container construction resource service regulation and control module for allocating the virtual system resources to support the application layer to create the application program; creating the shooting range system application based on the resource service regulation and control module. The invention can quickly realize the experimental environment of the network shooting range, quickly and flexibly realize the change of the network topology, quickly and flexibly realize a series of problems of expandable network scale of the shooting range experiment and the like. However, the method mainly simulates a 2-layer network system without a three-layer network; the network simulation degree is not high.
Therefore, in order to solve the above problems, it is urgently needed to invent a simulation method, a simulation system, an electronic device, and a storage medium for simulating a real network environment based on virtualization.
Disclosure of Invention
The invention aims to: providing a simulation method, a simulation system, electronic equipment and a storage medium for simulating a real network environment based on virtualization, and simulating safety equipment by adopting an equipment virtualization mode; thereby forming a realistic network simulation.
The invention provides the following scheme:
a simulation method for simulating a real network environment based on virtualization comprises the following steps:
starting to create a shooting range;
setting basic information;
setting topology information;
creating a resource;
setting a full scene starting;
saving the scene;
the shooting range creation is complete.
The step of creating resources specifically comprises the following steps:
setting post configuration information between a network layer and a service layer;
and creating virtual resources between the service layer and the virtual equipment layer, feeding back information of the successfully created resources to the service layer after the resources are successfully created, and storing the resource configuration information in a warehouse.
Setting a full-scene startup step, specifically:
acquiring full startup information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
and carrying out full scene startup between the service layer and the virtual equipment layer, feeding startup success information back to the service layer after all the virtual machines are successfully started, and returning the starting state to the network layer.
The method for saving the scene specifically comprises the following steps:
acquiring post storage scene information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
warehousing the updated topology information;
performing virtual machine conversion between the service layer and the virtual equipment layer, after all the virtual machines are successfully converted, feeding the successful conversion information back to the service layer, and storing the updated integrity information in a warehouse;
the service layer returns the information of successful creation to the network layer and feeds back the information to the user layer.
A simulation system for simulating a real network environment based on virtualization, which implements the simulation method for simulating a real network environment based on virtualization, comprises:
the setting module is used for setting basic information of a target range and setting topological information;
a resource module for creating a resource;
the starting module is used for setting full scene starting;
and the storage module is used for storing the scene.
The step of creating resources specifically comprises the following steps:
setting post configuration information between a network layer and a service layer;
and creating virtual resources between the service layer and the virtual equipment layer, feeding back information of the successfully created resources to the service layer after the resources are successfully created, and storing the resource configuration information in a warehouse.
Setting a full-scene startup step, specifically:
acquiring full startup information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
and carrying out full scene startup between the service layer and the virtual equipment layer, feeding startup success information back to the service layer after all the virtual machines are successfully started, and returning the starting state to the network layer.
The method for saving the scene specifically comprises the following steps:
acquiring post storage scene information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
warehousing the updated topology information;
performing virtual machine conversion between the service layer and the virtual equipment layer, after all the virtual machines are successfully converted, feeding the successful conversion information back to the service layer, and storing the updated integrity information in a warehouse;
the service layer returns the information of successful creation to the network layer and feeds back the information to the user layer.
An electronic device comprising a memory and a processor; the memory is used for storing a computer program; the processor executes the computer program in the memory to implement the method for simulating a real network environment based on virtualization.
A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the method for simulating a real network environment based on virtualization.
The invention has the following beneficial effects:
the invention discloses a simulation method, a simulation system, electronic equipment and a storage medium for simulating a real network environment based on virtualization, wherein the simulation method comprises the following steps: starting to create a shooting range; setting basic information; setting topology information; creating a resource; setting a full scene starting; saving the scene; completing the establishment of the target range; network attack and defense parameters can be configured according to requirements, such as topological structures, node number, rule parameters and the like; the device can be used for performing drills in various modes to meet different application requirements, including red and blue countermeasure, individual drill and equipment system verification; in the drilling process, the target range can support rapid deployment of different attack and defense scenes in the aspects of operating resources and managing resources, so that the safety of the target range is evaluated in an all-around manner, weak links are improved in a key way, and theoretical knowledge and practical skills of network attack and protection can be mastered through abundant drilling scenes.
Drawings
Fig. 1 is a flow chart of a simulation method for simulating a real network environment based on virtualization according to the present invention.
Fig. 2 is a block diagram of a simulation system for simulating a real network environment based on virtualization according to the present invention.
Fig. 3 is a schematic structural diagram of an electronic device according to the present invention.
Fig. 4 is a flowchart of a simulation method for simulating a real network environment based on virtualization according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Referring to fig. 1 and 4, a method for simulating a real network environment based on virtualization includes the following steps:
starting to create a shooting range;
setting basic information;
setting topology information;
creating a resource;
setting a full scene starting;
saving the scene;
the shooting range creation is complete.
The step of creating resources specifically comprises the following steps:
setting post configuration information between a network layer and a service layer;
and creating virtual resources between the service layer and the virtual equipment layer, feeding back information of the successfully created resources to the service layer after the resources are successfully created, and storing the resource configuration information in a warehouse.
Setting a full-scene startup step, specifically:
acquiring full startup information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
and carrying out full scene startup between the service layer and the virtual equipment layer, feeding startup success information back to the service layer after all the virtual machines are successfully started, and returning the starting state to the network layer.
The method for saving the scene specifically comprises the following steps:
acquiring post storage scene information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
warehousing the updated topology information;
performing virtual machine conversion between the service layer and the virtual equipment layer, after all the virtual machines are successfully converted, feeding the successful conversion information back to the service layer, and storing the updated integrity information in a warehouse;
the service layer returns the information of successful creation to the network layer and feeds back the information to the user layer.
Referring to fig. 2 and 4, a simulation system for simulating a real network environment based on virtualization, which implements the simulation method for simulating a real network environment based on virtualization, includes:
the setting module is used for setting basic information of a target range and setting topological information;
a resource module for creating a resource;
the starting module is used for setting full scene starting;
and the storage module is used for storing the scene.
The step of creating resources specifically comprises the following steps:
setting post configuration information between a network layer and a service layer;
and creating virtual resources between the service layer and the virtual equipment layer, feeding back information of the successfully created resources to the service layer after the resources are successfully created, and storing the resource configuration information in a warehouse.
Setting a full-scene startup step, specifically:
acquiring full startup information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
and carrying out full scene startup between the service layer and the virtual equipment layer, feeding startup success information back to the service layer after all the virtual machines are successfully started, and returning the starting state to the network layer.
The method for saving the scene specifically comprises the following steps:
acquiring post storage scene information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
warehousing the updated topology information;
performing virtual machine conversion between the service layer and the virtual equipment layer, after all the virtual machines are successfully converted, feeding the successful conversion information back to the service layer, and storing the updated integrity information in a warehouse;
the service layer returns the information of successful creation to the network layer and feeds back the information to the user layer.
Referring to fig. 3, an electronic device includes a memory 501 and a processor 502; the memory is used for storing a computer program; the processor executes the computer program in the memory to implement the method for simulating a real network environment based on virtualization. Further, a computer-readable storage medium is provided, in which a computer program is stored, which, when being executed by a processor, is adapted to carry out the method for simulating a real network environment based on virtualization.
In the embodiment, the simulation method, the simulation system, the electronic device, and the storage medium for simulating the real network environment based on virtualization includes the following steps: starting to create a shooting range; setting basic information; setting topology information; creating a resource; setting a full scene starting; saving the scene; completing the establishment of the target range; network attack and defense parameters can be configured according to requirements, such as topological structures, node number, rule parameters and the like; the device can be used for performing drills in various modes to meet different application requirements, including red and blue countermeasure, individual drill and equipment system verification; in the drilling process, the target range can support rapid deployment of different attack and defense scenes in the aspects of operating resources and managing resources, so that the safety of the target range is evaluated in an all-around manner, weak links are improved in a key way, and theoretical knowledge and practical skills of network attack and protection can be mastered through abundant drilling scenes.
In the simulation method, system, electronic device, and storage medium for simulating a real network environment based on virtualization according to the embodiment, a three-layer network is simulated in an SDN manner; simulating the safety equipment by adopting an equipment virtualization mode; thereby forming a realistic network simulation. The ultra-large-scale computing and storage resources are integrated through the network, and computing tasks are distributed on the resource pools, so that users can obtain information services such as computing, storage, network and the like according to the needs of the users. Before the shooting range test is carried out each time, the virtual machine can be dynamically established to meet the number of nodes required by the current test, and an expected network topology structure is formed through flexible deployment and dynamic migration of the virtual machine. In the process of the shooting range test, all attack effects are limited in a virtual target scene, no influence is caused on real system and enterprise business, and the risk that physical equipment needs to be invested due to failure or damage caused by attack is reduced. And when each test is finished, the virtual machine can be dynamically suspended or destroyed, the distributed test resources are released, and the test resources are completely recovered by the target range and are used for the next test. Researchers can very conveniently deploy various attack and defense scenes in a shooting range and repeatedly practice different attack and defense means.
In the simulation method, system, electronic device, and storage medium for simulating a real network environment based on virtualization described in this embodiment, the system bottom layer provides virtualization of a computing storage network and virtualization of security based on virtualization, and adopts multi-tenant management and task scheduling HA, and the like. The middle layer simulates various devices and systems on the infrastructure, including network devices, security devices, host devices and operating systems, and can completely approach various application fields of network security, such as network device security, operating system security, database security, Web application security, host program security, mobile device security and the like; meanwhile, various mirror image resources, target resources, tool resources, vulnerability knowledge resources and task resources are integrated, service support is provided for an application layer in a service bus ESB mode, communication and integration among different services can be achieved, routing and filtering based on content are supported, the transmission capability of complex data is achieved, and a series of standard interfaces can be provided. The application layer provides various application services to users. The security and security system relates to the aspects of security protection, detection, response, recovery and the like, and supports and implements security policies through the use of security and security equipment and technologies. In the aspect of a standard specification system, the product adopts an open and standard-based message mechanism, and completes the interoperation among coarse-grained application, service and other components through a simple standard adapter and an interface, so that the arranging requirement of a complex scene can be met.
For simplicity of explanation, the method embodiments are described as a series of acts or combinations, but those skilled in the art will appreciate that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently with other steps in accordance with the embodiments of the invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A simulation method for simulating a real network environment based on virtualization is characterized in that: the method comprises the following steps:
starting to create a shooting range;
setting basic information;
setting topology information;
creating a resource;
setting a full scene starting;
saving the scene;
the shooting range creation is complete.
2. The virtualization-based simulation method for a real network environment simulation according to claim 1, wherein: the step of creating resources specifically comprises the following steps:
setting post configuration information between a network layer and a service layer;
and creating virtual resources between the service layer and the virtual equipment layer, feeding back information of the successfully created resources to the service layer after the resources are successfully created, and storing the resource configuration information in a warehouse.
3. The virtualization-based simulation method for a simulation of a real network environment according to claim 2, wherein: setting a full-scene startup step, specifically:
acquiring full startup information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
and carrying out full scene startup between the service layer and the virtual equipment layer, feeding startup success information back to the service layer after all the virtual machines are successfully started, and returning the starting state to the network layer.
4. The virtualization-based simulation method for a simulation of a real network environment according to claim 3, wherein: the method for saving the scene specifically comprises the following steps:
acquiring post storage scene information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
warehousing the updated topology information;
performing virtual machine conversion between the service layer and the virtual equipment layer, after all the virtual machines are successfully converted, feeding the successful conversion information back to the service layer, and storing the updated integrity information in a warehouse;
the service layer returns the information of successful creation to the network layer and feeds back the information to the user layer.
5. A virtualization-based simulation system for a simulation of a real network environment, which implements the virtualization-based simulation method for a simulation of a real network environment according to claim 1, characterized in that: the method comprises the following steps:
the setting module is used for setting basic information of a target range and setting topological information;
a resource module for creating a resource;
the starting module is used for setting full scene starting;
and the storage module is used for storing the scene.
6. The virtualization-based simulation system for a real network environment simulation of claim 5, wherein: the step of creating resources specifically comprises the following steps:
setting post configuration information between a network layer and a service layer;
and creating virtual resources between the service layer and the virtual equipment layer, feeding back information of the successfully created resources to the service layer after the resources are successfully created, and storing the resource configuration information in a warehouse.
7. The virtualization-based simulation system for a real network environment simulation of claim 6, wherein: setting a full-scene startup step, specifically:
acquiring full startup information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
and carrying out full scene startup between the service layer and the virtual equipment layer, feeding startup success information back to the service layer after all the virtual machines are successfully started, and returning the starting state to the network layer.
8. The virtualization-based simulation system for a real network environment simulation of claim 7, wherein: the method for saving the scene specifically comprises the following steps:
acquiring post storage scene information between a network layer and a service layer;
carrying out full-field node state self-inspection on a service layer;
warehousing the updated topology information;
performing virtual machine conversion between the service layer and the virtual equipment layer, after all the virtual machines are successfully converted, feeding the successful conversion information back to the service layer, and storing the updated integrity information in a warehouse;
the service layer returns the information of successful creation to the network layer and feeds back the information to the user layer.
9. An electronic device, characterized in that: comprising a memory and a processor; the memory is used for storing a computer program; the processor executes the computer program in the memory to implement the method of virtualization-based simulation of a real network environment according to any of claims 1-4.
10. A computer-readable storage medium characterized by: a computer program is stored which, when being executed by a processor, is adapted to carry out the method for virtualization-based simulation of a real network environment according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010332981.5A CN111555913A (en) | 2020-04-24 | 2020-04-24 | Simulation method, system, electronic device and storage medium for simulating real network environment based on virtualization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010332981.5A CN111555913A (en) | 2020-04-24 | 2020-04-24 | Simulation method, system, electronic device and storage medium for simulating real network environment based on virtualization |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111555913A true CN111555913A (en) | 2020-08-18 |
Family
ID=72007651
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010332981.5A Pending CN111555913A (en) | 2020-04-24 | 2020-04-24 | Simulation method, system, electronic device and storage medium for simulating real network environment based on virtualization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111555913A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112040021A (en) * | 2020-08-24 | 2020-12-04 | 南京赛宁信息技术有限公司 | System and method for operating machine dormant network hosting in network target range actual combat drilling scene |
CN112104514A (en) * | 2020-11-18 | 2020-12-18 | 中国人民解放军国防科技大学 | Multi-view network attack and defense simulation system |
CN112153010A (en) * | 2020-08-31 | 2020-12-29 | 北京全路通信信号研究设计院集团有限公司 | Network security shooting range system and operation method thereof |
CN112270085A (en) * | 2020-10-26 | 2021-01-26 | 广州锦行网络科技有限公司 | Dynamic design method of 3D network shooting range |
CN112311816A (en) * | 2020-12-30 | 2021-02-02 | 博智安全科技股份有限公司 | Initialization method and reset method for virtual and real combined network target range environment |
CN112416469A (en) * | 2020-12-30 | 2021-02-26 | 博智安全科技股份有限公司 | Initialization method and reset method of virtualized network target range environment |
CN112583671A (en) * | 2020-12-14 | 2021-03-30 | 上海英方软件股份有限公司 | Method and system for practicing virtual machine through proxy gateway |
CN113268206A (en) * | 2021-07-19 | 2021-08-17 | 南京赛宁信息技术有限公司 | Network target range resource hot plug implementation method and system |
CN114172815A (en) * | 2021-11-19 | 2022-03-11 | 杭州安恒信息技术股份有限公司 | Behavior traffic transmission method and device, computer equipment and computer readable storage medium |
CN114257506A (en) * | 2021-12-21 | 2022-03-29 | 北京知道未来信息技术有限公司 | Network target range construction method and device, back-end server and readable storage medium |
CN114281514A (en) * | 2022-03-08 | 2022-04-05 | 南京赛宁信息技术有限公司 | Method and system for recovering multi-stage queue scenes in shooting range environment |
CN114640597A (en) * | 2022-02-24 | 2022-06-17 | 烽台科技(北京)有限公司 | Network target range configuration migration method and device, computer equipment and medium |
CN114996703A (en) * | 2022-06-06 | 2022-09-02 | 南方电网科学研究院有限责任公司 | Power system network safety target range hybrid simulation method, system and equipment |
CN115051927A (en) * | 2022-07-01 | 2022-09-13 | 中国信息通信研究院 | Data network development method and system |
CN115225347A (en) * | 2022-06-30 | 2022-10-21 | 烽台科技(北京)有限公司 | Method and device for monitoring shooting range resources |
CN118316882A (en) * | 2024-03-28 | 2024-07-09 | 长扬科技(北京)股份有限公司 | Interference flow injection method, device, equipment, storage medium and test system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220298A (en) * | 2013-04-27 | 2013-07-24 | 西北工业大学 | Windows Virtual machine remote detecting method |
CN109802852A (en) * | 2018-12-13 | 2019-05-24 | 烽台科技(北京)有限公司 | The construction method and system of network simulation topology applied to network target range |
-
2020
- 2020-04-24 CN CN202010332981.5A patent/CN111555913A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220298A (en) * | 2013-04-27 | 2013-07-24 | 西北工业大学 | Windows Virtual machine remote detecting method |
CN109802852A (en) * | 2018-12-13 | 2019-05-24 | 烽台科技(北京)有限公司 | The construction method and system of network simulation topology applied to network target range |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112040021B (en) * | 2020-08-24 | 2022-01-18 | 南京赛宁信息技术有限公司 | System and method for operating machine dormant network hosting in network target range actual combat drilling scene |
CN112040021A (en) * | 2020-08-24 | 2020-12-04 | 南京赛宁信息技术有限公司 | System and method for operating machine dormant network hosting in network target range actual combat drilling scene |
CN112153010A (en) * | 2020-08-31 | 2020-12-29 | 北京全路通信信号研究设计院集团有限公司 | Network security shooting range system and operation method thereof |
CN112153010B (en) * | 2020-08-31 | 2023-01-20 | 北京全路通信信号研究设计院集团有限公司 | Network security shooting range system and operation method thereof |
CN112270085A (en) * | 2020-10-26 | 2021-01-26 | 广州锦行网络科技有限公司 | Dynamic design method of 3D network shooting range |
CN112104514A (en) * | 2020-11-18 | 2020-12-18 | 中国人民解放军国防科技大学 | Multi-view network attack and defense simulation system |
CN112104514B (en) * | 2020-11-18 | 2021-02-26 | 中国人民解放军国防科技大学 | Multi-view network attack and defense simulation system |
CN112583671B (en) * | 2020-12-14 | 2022-03-25 | 上海英方软件股份有限公司 | Method and system for practicing virtual machine through proxy gateway |
CN112583671A (en) * | 2020-12-14 | 2021-03-30 | 上海英方软件股份有限公司 | Method and system for practicing virtual machine through proxy gateway |
CN112311816A (en) * | 2020-12-30 | 2021-02-02 | 博智安全科技股份有限公司 | Initialization method and reset method for virtual and real combined network target range environment |
CN112416469B (en) * | 2020-12-30 | 2021-12-17 | 博智安全科技股份有限公司 | Initialization method and reset method of virtualized network target range environment |
CN112311816B (en) * | 2020-12-30 | 2021-03-30 | 博智安全科技股份有限公司 | Initialization method and reset method for virtual and real combined network target range environment |
CN112416469A (en) * | 2020-12-30 | 2021-02-26 | 博智安全科技股份有限公司 | Initialization method and reset method of virtualized network target range environment |
CN113268206A (en) * | 2021-07-19 | 2021-08-17 | 南京赛宁信息技术有限公司 | Network target range resource hot plug implementation method and system |
CN114172815A (en) * | 2021-11-19 | 2022-03-11 | 杭州安恒信息技术股份有限公司 | Behavior traffic transmission method and device, computer equipment and computer readable storage medium |
CN114172815B (en) * | 2021-11-19 | 2024-04-09 | 杭州安恒信息技术股份有限公司 | Behavior traffic transmission method, device, computer equipment and computer readable storage medium |
CN114257506A (en) * | 2021-12-21 | 2022-03-29 | 北京知道未来信息技术有限公司 | Network target range construction method and device, back-end server and readable storage medium |
CN114257506B (en) * | 2021-12-21 | 2024-04-02 | 北京知道未来信息技术有限公司 | Network target range construction method and device, back-end server and readable storage medium |
CN114640597A (en) * | 2022-02-24 | 2022-06-17 | 烽台科技(北京)有限公司 | Network target range configuration migration method and device, computer equipment and medium |
CN114640597B (en) * | 2022-02-24 | 2023-08-15 | 烽台科技(北京)有限公司 | Network target range configuration migration method, device, computer equipment and medium |
CN114281514A (en) * | 2022-03-08 | 2022-04-05 | 南京赛宁信息技术有限公司 | Method and system for recovering multi-stage queue scenes in shooting range environment |
CN114996703A (en) * | 2022-06-06 | 2022-09-02 | 南方电网科学研究院有限责任公司 | Power system network safety target range hybrid simulation method, system and equipment |
CN114996703B (en) * | 2022-06-06 | 2024-04-19 | 南方电网科学研究院有限责任公司 | Hybrid simulation method, system and equipment for network safety range of power system |
CN115225347A (en) * | 2022-06-30 | 2022-10-21 | 烽台科技(北京)有限公司 | Method and device for monitoring shooting range resources |
CN115225347B (en) * | 2022-06-30 | 2023-12-22 | 烽台科技(北京)有限公司 | Method and device for monitoring target range resources |
CN115051927A (en) * | 2022-07-01 | 2022-09-13 | 中国信息通信研究院 | Data network development method and system |
CN115051927B (en) * | 2022-07-01 | 2023-09-19 | 中国信息通信研究院 | Data network development method and system |
CN118316882A (en) * | 2024-03-28 | 2024-07-09 | 长扬科技(北京)股份有限公司 | Interference flow injection method, device, equipment, storage medium and test system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111555913A (en) | Simulation method, system, electronic device and storage medium for simulating real network environment based on virtualization | |
US9680867B2 (en) | Network stimulation engine | |
CN111211930B (en) | Block chain service disaster-tolerant backup containerized deployment method | |
Gao et al. | System design of cloud computing based on mobile learning | |
CN113691416A (en) | Distributed layered deployed network target range management platform | |
CN110178357A (en) | Cellular service based on cloud in the accessible cloud of remote equipment | |
CN103475677B (en) | The method, apparatus and system of dummy node are managed in a kind of PaaS cloud platforms | |
CN112712741A (en) | Safety management training system, method and terminal | |
Catarci et al. | WORKPAD: process management and geo-collaboration help disaster response | |
CN110413595A (en) | A kind of data migration method and relevant apparatus applied to distributed data base | |
CN109768892A (en) | A kind of network security experimental system of micro services | |
CN111049686A (en) | Safety protection virtual laboratory of power monitoring system and construction method thereof | |
CN114186348A (en) | Fine agility construction method for multi-aircraft cooperative application simulation environment | |
CN114996703A (en) | Power system network safety target range hybrid simulation method, system and equipment | |
CN115733754A (en) | Resource management system based on cloud native middle platform technology and elastic construction method thereof | |
CN111200525A (en) | Network shooting range scene re-engraving method and system, electronic equipment and storage medium | |
CN114741853A (en) | Simulation operation platform and method based on universal blackboard system | |
CN117932859A (en) | Large-scale combat simulation training system and training method thereof | |
Zhou et al. | FTCloudSim: support for cloud service reliability enhancement simulation | |
Blythe et al. | Testing cyber security with simulated humans | |
CN111193791A (en) | Training system based on B/S architecture and information display method | |
CN112506729B (en) | Fault simulation method and device | |
CN107015787A (en) | A kind of method and device of interactive application Frame Design | |
CN113076500A (en) | Online routing exchange virtual experiment platform | |
CN113467890A (en) | Distributed virtual college laboratory management method, system and storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200818 |