CN111897624A - Method for building information security network attack and defense experiment platform - Google Patents

Method for building information security network attack and defense experiment platform Download PDF

Info

Publication number
CN111897624A
CN111897624A CN202010577739.4A CN202010577739A CN111897624A CN 111897624 A CN111897624 A CN 111897624A CN 202010577739 A CN202010577739 A CN 202010577739A CN 111897624 A CN111897624 A CN 111897624A
Authority
CN
China
Prior art keywords
attack
defense
information
behavior
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010577739.4A
Other languages
Chinese (zh)
Inventor
王晓敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huayu Hengtuo Tianjin Technology Co ltd
Original Assignee
Huayu Hengtuo Tianjin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huayu Hengtuo Tianjin Technology Co ltd filed Critical Huayu Hengtuo Tianjin Technology Co ltd
Priority to CN202010577739.4A priority Critical patent/CN111897624A/en
Publication of CN111897624A publication Critical patent/CN111897624A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/128Details of file system snapshots on the file-level, e.g. snapshot creation, administration, deletion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45562Creating, deleting, cloning virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method for building an information security network attack and defense experiment platform comprises the following steps: receiving a template triggering instruction sent by a user system; determining a target template by using the template trigger instruction; creating a virtual hardware environment by using hardware configuration information in the target template information; determining an attack machine mirror image and a target machine mirror image by using the mirror image information in the target template information; utilizing idle information resources in the target template information; installing a virtual machine snapshot; and setting to obtain the network attack and defense experiment system. And monitoring various performance indexes of the information of the attack and defense experiment system uninterruptedly by using the target template information and the network configuration parameters. According to the method for building the attack and defense experiment platform, after the target template is determined, the attack and defense experiment system is built, and an auxiliary resource recovery system, a snapshot generation system, performance index monitoring and a log for recording attack and defense behaviors in the later period are configured, so that the topological network attack and defense experiment system is obtained.

Description

Method for building information security network attack and defense experiment platform
Technical Field
The invention relates to the technical field of computer network security, in particular to a method for constructing an information security network attack and defense experiment platform.
Background
With the development of computer technology and the popularization of the internet, the problem of information security becomes more and more serious, information security becomes a new industry and receives more and more attention, and meanwhile, information security is a new subject in many schools. The attack and protection technology of the information system is the main content of information security research, the information security attack and prevention is the work with strong practicability, and the spread and popularization of the attack and protection technology need to rely on a large amount of information security training activities. Training activities for information safety professionals are divided into two categories, namely courses and competitions, and both the two categories of activities need to be performed with attack and defense demonstration and drilling in the actual information system environment. Considering that network attack and defense operations are often destructive to a certain extent, relevant laws must be authorized when attack and defense experiments are performed in a real network environment, so attack and defense demonstration and drilling are generally performed in a virtual network environment. The practical operation environment is called a network attack and defense experiment platform system. The network attack and defense experiment platform is a micro-simulation information system, the system has reserved vulnerability (software program vulnerability and improper parameter configuration), and a student can be used as an attacker to search for the vulnerability on the platform and utilize the vulnerability, and can also be used as a defender to search for the vulnerability on the platform and carry out corresponding repair. The instructor can see all activities and progress of both the attacking and defending parties and corresponding evaluations.
Disclosure of Invention
The invention provides a method for constructing an information security network attack and defense experiment platform.
The technical scheme adopted by the invention is as follows:
a method for building an information security network attack and defense experiment platform comprises the following steps:
receiving a template triggering instruction sent by a user system;
determining a target template by using the template trigger instruction;
creating a virtual hardware environment by using hardware configuration information in the target template information;
determining an attacker mirror image and a target drone mirror image by using the mirror image information in the target template information, and installing the attacker mirror image and the target drone mirror image in the virtual hardware environment to obtain an attacker system and a target drone system;
obtaining a resource recovery system by using idle information resources in the target template information;
installing a virtual machine snapshot in a virtual hardware environment by using pause information in the target template information, and saving the experiment progress to obtain a snapshot generating system;
and respectively carrying out network topology setting on the attacker system and the target drone system by utilizing the network configuration parameters in the target template information to obtain a network attack and defense experiment system.
And monitoring various performance indexes of the information of the attack and defense experiment system uninterruptedly by using the network configuration parameters in the target template information, and forcibly starting a resource recovery module to recover partial resources when the platform resources are insufficient so as to ensure the normal operation of the platform.
Optionally, the method further includes:
the method comprises the steps of forming an attack and defense behavior log by utilizing the attack and defense behaviors on a monitored attack and defense experiment system, obtaining the attack and defense behavior log from an attacker system and a target drone system, extracting the key information of the attack and defense behavior from the attack and defense behavior log, matching the key information of the attack and defense behavior according to a preset grading rule, and determining the grading of the attack and defense experiments corresponding to an attacker and a target drone.
The attack and defense behavior log records operation behaviors performed on the virtual operating systems of the attack side virtual machine system and the target machine system.
Optionally, the method further includes:
and performing normalization processing by using the attack and defense behavior logs, and extracting attack and defense behavior key information corresponding to each attack and defense behavior key element from the attack and defense behavior logs according to preset attack and defense behavior key elements.
The key elements of the attack and defense behaviors comprise a behavior execution subject, a behavior execution object, a behavior execution time, a behavior execution address, a behavior execution action and a behavior execution mode.
And storing the attack and defense behavior logs after the normalization processing in a behavior log database.
The system automatically calls a mirror image according to a preset configuration file, and injects parameters in metadata into an instance to complete the establishment of network topology; if the platform resources are insufficient, automatically terminating the creation of the training topology and recycling system resources; when the training project is terminated; if the training project is not completed, the mirror image is saved, and if the training project is completed, the resources are automatically recovered.
The invention has the beneficial effects that: according to the method for building the attack and defense experiment platform, after the target template is determined, the attack and defense experiment system is built, and an auxiliary resource recovery system, a snapshot generation system, performance index monitoring and a log for recording attack and defense behaviors in the later period are configured, so that the topological network attack and defense experiment system is obtained.
Detailed Description
A method for building an information security network attack and defense experiment platform comprises the following steps:
receiving a template triggering instruction sent by a user system;
determining a target template by using the template trigger instruction;
creating a virtual hardware environment by using hardware configuration information in the target template information;
determining an attacker mirror image and a target drone mirror image by using the mirror image information in the target template information, and installing the attacker mirror image and the target drone mirror image in the virtual hardware environment to obtain an attacker system and a target drone system;
obtaining a resource recovery system by using idle information resources in the target template information;
installing a virtual machine snapshot in a virtual hardware environment by using pause information in the target template information, and saving the experiment progress to obtain a snapshot generating system;
and respectively carrying out network topology setting on the attacker system and the target drone system by utilizing the network configuration parameters in the target template information to obtain a network attack and defense experiment system.
And monitoring various performance indexes of the information of the attack and defense experiment system uninterruptedly by using the network configuration parameters in the target template information, and forcibly starting a resource recovery module to recover partial resources when the platform resources are insufficient so as to ensure the normal operation of the platform.
Optionally, the method further includes:
the method comprises the steps of forming an attack and defense behavior log by utilizing the attack and defense behaviors on a monitored attack and defense experiment system, obtaining the attack and defense behavior log from an attacker system and a target drone system, extracting the key information of the attack and defense behavior from the attack and defense behavior log, matching the key information of the attack and defense behavior according to a preset grading rule, and determining the grading of the attack and defense experiments corresponding to an attacker and a target drone.
The attack and defense behavior log records operation behaviors performed on the virtual operating systems of the attack side virtual machine system and the target machine system.
Optionally, the method further includes:
and performing normalization processing by using the attack and defense behavior logs, and extracting attack and defense behavior key information corresponding to each attack and defense behavior key element from the attack and defense behavior logs according to preset attack and defense behavior key elements.
The key elements of the attack and defense behaviors comprise a behavior execution subject, a behavior execution object, a behavior execution time, a behavior execution address, a behavior execution action and a behavior execution mode.
And storing the attack and defense behavior logs after the normalization processing in a behavior log database.
The system automatically calls a mirror image according to a preset configuration file, and injects parameters in metadata into an instance to complete the establishment of network topology; if the platform resources are insufficient, automatically terminating the creation of the training topology and recycling system resources; when the training project is terminated; if the training project is not completed, the mirror image is saved, and if the training project is completed, the resources are automatically recovered.
The invention will be explained in detail with reference to the following embodiments:
example 1
A method for building an information security network attack and defense experiment platform comprises the following steps:
the control server is a server for controlling other computing servers in the scheme, and the computing server is a server for actually carrying an attack plane system and a target plane system and receiving a template trigger instruction sent by a user system; the control server receives a template triggering instruction sent by a user system;
determining a target template by using the template triggering instruction, wherein the triggering instruction is determined according to the selection of the template by the user, and the target template selected by the user can be determined according to the triggering instruction;
creating a virtual hardware environment by using hardware configuration information in the target template information, and determining a target template selected by a user according to a trigger instruction, wherein the template information comprises relevant parameters required by a network attack and defense experiment system, such as virtual hardware configuration parameters, mirror image parameters, network setting parameters and the like;
determining an attacker mirror image and a target drone mirror image by using the mirror image information in the target template information, and installing the attacker mirror image and the target drone mirror image in the virtual hardware environment to obtain an attacker system and a target drone system;
and obtaining a resource recovery system by using idle information resources in the target template information, and actively recovering resources such as the experimental virtual machine and the like. After the experiment is completed, starting system resource recovery; if receiving the warning information of the performance monitoring module 106, the module is started immediately to force the recovery of the system resources;
installing a virtual machine snapshot in a virtual hardware environment by using pause information in the target template information, and saving the experiment progress to obtain a snapshot generating system;
and respectively carrying out network topology setting on the attacker system and the target drone system by utilizing the network configuration parameters in the target template information to obtain a network attack and defense experiment system.
And monitoring various performance indexes of the information of the attack and defense experiment system uninterruptedly by using the network configuration parameters in the target template information, and forcibly starting a resource recovery module to recover partial resources when the platform resources are insufficient so as to ensure the normal operation of the platform.
The method comprises the steps of forming an attack and defense behavior log by utilizing the attack and defense behaviors on a monitored attack and defense experiment system, obtaining the attack and defense behavior log from an attacker system and a target drone system, extracting the key information of the attack and defense behavior from the attack and defense behavior log, matching the key information of the attack and defense behavior according to a preset grading rule, and determining the grading of the attack and defense experiments corresponding to an attacker and a target drone. And performing normalization processing by using the attack and defense behavior logs, and extracting attack and defense behavior key information corresponding to each attack and defense behavior key element from the attack and defense behavior logs according to preset attack and defense behavior key elements. And storing the attack and defense behavior logs after the normalization processing in a behavior log database. Respectively monitoring the attack and defense behaviors on the attacking party virtual machine and the defending party virtual machine to form an attack and defense behavior log; acquiring an attack and defense behavior log from an attacking party virtual machine and a defending party virtual machine, and extracting key information of the attack and defense behavior; and matching the attack and defense behavior key information according to a preset grading rule, and determining the attack and defense experiment grading corresponding to the attacking party and the defending party.
A user logs in the attack and defense test system through authentication, and after the network attack and defense test system experiment is finished, the system recovers experiment resources; due to the shortage of system resources caused by the performance reduction of the platform, warning is sent out through system monitoring, and the system resources are recovered forcibly; and (4) as the user pauses the experiment, the snapshot generating system generates the virtual machine snapshot and saves the experiment progress.
The embodiments of the present invention have been described in detail, but the description is only for the preferred embodiments of the present invention and should not be construed as limiting the scope of the present invention. All equivalent changes and modifications made within the scope of the present invention shall fall within the scope of the present invention.

Claims (7)

1. A method for constructing an information security network attack and defense experiment platform is characterized by comprising the following steps:
receiving a template triggering instruction sent by a user system;
determining a target template by using the template trigger instruction;
creating a virtual hardware environment by using hardware configuration information in the target template information;
determining an attacker mirror image and a target drone mirror image by using the mirror image information in the target template information, and installing the attacker mirror image and the target drone mirror image in the virtual hardware environment to obtain an attacker system and a target drone system;
obtaining a resource recovery system by using idle information resources in the target template information;
installing a virtual machine snapshot in a virtual hardware environment by using pause information in the target template information, and saving the experiment progress to obtain a snapshot generating system;
respectively carrying out network topology setting on the attacker system and the target drone system by utilizing the network configuration parameters in the target template information to obtain a network attack and defense experiment system;
and monitoring various performance indexes of the information of the attack and defense experiment system uninterruptedly by using the network configuration parameters in the target template information, and forcibly starting a resource recovery module to recover partial resources when the platform resources are insufficient so as to ensure the normal operation of the platform.
2. The method for building the information security network attack and defense experiment platform according to claim 1, wherein the method further comprises the following steps: the method comprises the steps of forming an attack and defense behavior log by utilizing the attack and defense behaviors on a monitored attack and defense experiment system, obtaining the attack and defense behavior log from an attacker system and a target drone system, extracting the key information of the attack and defense behavior from the attack and defense behavior log, matching the key information of the attack and defense behavior according to a preset grading rule, and determining the grading of the attack and defense experiments corresponding to an attacker and a target drone.
3. The method for constructing the information security network attack and defense experiment platform according to claim 2, wherein the attack and defense behavior log records operation behaviors performed on virtual operating systems of an attacker virtual machine system and a target machine system.
4. The method for building the information security network attack and defense experiment platform according to claim 3, wherein the method further comprises the following steps: and performing normalization processing by using the attack and defense behavior logs, and extracting attack and defense behavior key information corresponding to each attack and defense behavior key element from the attack and defense behavior logs according to preset attack and defense behavior key elements.
5. The method for constructing the information security network attack and defense experiment platform according to claim 4, wherein the attack and defense behavior key elements comprise a behavior execution subject, a behavior execution object, a behavior execution time, a behavior execution address, a behavior execution action and a behavior execution mode.
6. The method for constructing the information security network attack and defense experiment platform according to claim 4, wherein the attack and defense behavior log after the normalization processing is stored in a behavior log database.
7. The method for constructing the information security network attack and defense experiment platform according to claim 1, characterized in that the network topology setup of the attacker system and the drone system is established through configuration files, the system automatically calls mirror images according to preset configuration files, and parameters in metadata are injected into instances to complete the construction of the network topology.
CN202010577739.4A 2020-06-23 2020-06-23 Method for building information security network attack and defense experiment platform Withdrawn CN111897624A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010577739.4A CN111897624A (en) 2020-06-23 2020-06-23 Method for building information security network attack and defense experiment platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010577739.4A CN111897624A (en) 2020-06-23 2020-06-23 Method for building information security network attack and defense experiment platform

Publications (1)

Publication Number Publication Date
CN111897624A true CN111897624A (en) 2020-11-06

Family

ID=73206399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010577739.4A Withdrawn CN111897624A (en) 2020-06-23 2020-06-23 Method for building information security network attack and defense experiment platform

Country Status (1)

Country Link
CN (1) CN111897624A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112104514A (en) * 2020-11-18 2020-12-18 中国人民解放军国防科技大学 Multi-view network attack and defense simulation system
CN114297172A (en) * 2022-01-04 2022-04-08 北京乐讯科技有限公司 Cloud-native-based distributed file system
CN114501501A (en) * 2022-02-09 2022-05-13 北京恒安嘉新安全技术有限公司 Configuration management method, device, equipment and medium for mobile communication network target range
CN115865519A (en) * 2023-02-07 2023-03-28 苏州市卫生计生统计信息中心 Data processing method and system suitable for network attack and defense virtual simulation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789233A (en) * 2016-12-16 2017-05-31 华北电力科学研究院有限责任公司 A kind of automatic scoring method and device of network-combination yarn experiment porch
CN110047346A (en) * 2019-04-29 2019-07-23 惠州城市职业学院 The emulation mode and simulated teaching experience system of virtual emulation practice teaching platform
CN110351271A (en) * 2019-07-09 2019-10-18 广东工业大学 Network-combination yarn experimental system building method, system, device and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789233A (en) * 2016-12-16 2017-05-31 华北电力科学研究院有限责任公司 A kind of automatic scoring method and device of network-combination yarn experiment porch
CN110047346A (en) * 2019-04-29 2019-07-23 惠州城市职业学院 The emulation mode and simulated teaching experience system of virtual emulation practice teaching platform
CN110351271A (en) * 2019-07-09 2019-10-18 广东工业大学 Network-combination yarn experimental system building method, system, device and storage medium

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112104514A (en) * 2020-11-18 2020-12-18 中国人民解放军国防科技大学 Multi-view network attack and defense simulation system
CN112104514B (en) * 2020-11-18 2021-02-26 中国人民解放军国防科技大学 Multi-view network attack and defense simulation system
CN114297172A (en) * 2022-01-04 2022-04-08 北京乐讯科技有限公司 Cloud-native-based distributed file system
CN114297172B (en) * 2022-01-04 2022-07-12 北京乐讯科技有限公司 Cloud-native-based distributed file system
CN114501501A (en) * 2022-02-09 2022-05-13 北京恒安嘉新安全技术有限公司 Configuration management method, device, equipment and medium for mobile communication network target range
CN114501501B (en) * 2022-02-09 2024-03-29 北京恒安嘉新安全技术有限公司 Configuration management method, device, equipment and medium for mobile communication network target range
CN115865519A (en) * 2023-02-07 2023-03-28 苏州市卫生计生统计信息中心 Data processing method and system suitable for network attack and defense virtual simulation

Similar Documents

Publication Publication Date Title
CN111897624A (en) Method for building information security network attack and defense experiment platform
CN107659543B (en) Protection method for APT (android packet) attack of cloud platform
Zhuang et al. A theory of cyber attacks: A step towards analyzing MTD systems
Li et al. Security attack analysis using attack patterns
CN110730161B (en) Network target range implementation method, device, equipment, medium and system
CN106789233B (en) Automatic scoring method and device for network attack and defense experiment platform
EP3958152B1 (en) Attack scenario simulation device, attack scenario generation system, and attack scenario generation method
CN103701783A (en) Preprocessing unit, data processing system consisting of same, and processing method
CN104965695A (en) Method and apparatus for simulating user real-time operation
CN116527332B (en) Network attack drilling method, device, equipment and storage medium
CN114113984A (en) Fault drilling method, device, terminal equipment and medium based on chaotic engineering
CN116962057A (en) Multi-user collaborative network security emergency response and exercise platform and operation method thereof
CN108900505A (en) A kind of cluster audit management-control method based on block chain technology
Alrimawi et al. Incidents are meant for learning, not repeating: sharing knowledge about security incidents in cyber-physical systems
CN116346466B (en) Method, system and equipment for complex disk deduction based on network target range scene
CN113572860B (en) Method and device for tracking leaked data, storage system, equipment and storage medium
CN116208514A (en) Multi-stage attack defending trend prediction method, system, equipment and medium
WO2023166614A1 (en) Information processing device, information processing method, and computer-readable recording medium
CN112286733B (en) Method, device and equipment for determining backup data recovery time and storage medium
CN111796911B (en) Attack detection method for cloud platform virtual equipment and electronic device
WO2022193517A1 (en) Platform for constructing sample for capability verification of mobile phone forensics, and method
CN115438518B (en) Fault simulation application system based on chaos concept
KR102395134B1 (en) Method and apparatus for implementation of playbook-style penetration simulator
CN117235686B (en) Data protection method, device and equipment
Regainia et al. A practical way of testing security patterns

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20201106

WW01 Invention patent application withdrawn after publication