CN116232753A - Network range tool deployment method, device, equipment and storage medium - Google Patents

Network range tool deployment method, device, equipment and storage medium Download PDF

Info

Publication number
CN116232753A
CN116232753A CN202310296532.3A CN202310296532A CN116232753A CN 116232753 A CN116232753 A CN 116232753A CN 202310296532 A CN202310296532 A CN 202310296532A CN 116232753 A CN116232753 A CN 116232753A
Authority
CN
China
Prior art keywords
deployment
tool
virtual machine
drilling
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310296532.3A
Other languages
Chinese (zh)
Inventor
贾焰
杨明盛
黄珺
李宗哲
韩伟红
张家伟
陈睿
吉青利
杨杰
吴志良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peng Cheng Laboratory
Original Assignee
Peng Cheng Laboratory
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peng Cheng Laboratory filed Critical Peng Cheng Laboratory
Priority to CN202310296532.3A priority Critical patent/CN116232753A/en
Publication of CN116232753A publication Critical patent/CN116232753A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Stored Programmes (AREA)
  • Orthopedics, Nursing, And Contraception (AREA)

Abstract

The invention discloses a network target range tool deployment method, a device, equipment and a storage medium, wherein the method comprises the following steps: receiving a deployment task generated by a user based on a front-end page, and automatically generating a deployment scheme based on the deployment task, wherein the deployment task carries a drilling tool for generating the deployment scheme and a target virtual machine to be deployed; and sending the deployment scheme to the target virtual machine so that the target virtual machine can automatically complete deployment of the drilling tool based on the deployment scheme. The method and the device can provide efficient tool deployment efficiency for players when the network target range is subjected to attack and defense countermeasure exercise.

Description

Network range tool deployment method, device, equipment and storage medium
Technical Field
The present invention relates to the field of information security, and in particular, to a method, an apparatus, a device, and a storage medium for deploying a network target range tool.
Background
With the rapid development of the information age, the importance of network security is increasingly highlighted, and the appearance of the network target range facilitates the study and research of related personnel on the network security, wherein the related personnel can conduct attack and defense countermeasure exercise based on the network target range, so that the network security level of the related personnel is improved.
The network target range is based on a virtualization technology, and can simulate or reproduce a network architecture, a system equipment service running environment and the like in a real network space. At present, various virtual machines are arranged in a network target range platform, so that the network security countermeasure level among the virtual machines is realized. When the existing network target range is used for the attack and defense countermeasure exercise, the tool deployment of the attack and defense countermeasure exercise can only be manually deployed by a player, however, the deployment efficiency of manually deploying the attack and defense countermeasure exercise tool is low, and the deployment efficiency is an important constraint factor affecting the preparation time of the attack and defense countermeasure exercise.
That is, when the virtual machine performs the attack and defense countermeasure exercise, there is a technical problem of low tool deployment efficiency in the related art.
Disclosure of Invention
The main purpose of the application is to provide a network shooting range tool deployment method, device, equipment and storage medium, which are used for solving the technical problem of low tool deployment efficiency in the related technology when a virtual machine performs attack and defense countermeasure exercise.
To achieve the above object, the present application provides a network range tool deployment method, including: receiving a deployment task generated by a user based on a front-end page, and automatically generating a deployment scheme based on the deployment task, wherein the deployment task carries a drilling tool for generating the deployment scheme and a target virtual machine to be deployed;
and sending the deployment scheme to the target virtual machine so that the target virtual machine can automatically complete deployment of the drilling tool based on the deployment scheme.
In one possible implementation manner of the present application, before the step of obtaining the deployment task, the method includes:
determining tool resources formed by unified drilling tools; the tool resources are unified based on attribute characteristic information of each drilling tool, wherein the attribute characteristic information comprises one or more of types, names, versions, operation platforms and attack and defense attribute matrixes;
and determining the layout page of the corresponding front end based on the tool resource, so that a user can generate a deployment task based on the layout page.
In one possible embodiment of the present application, before the step of determining the layout page based on the tool resource, the method includes;
acquiring a deployment task history record;
analyzing the drilling tool history record, and determining a common drilling tool based on an analysis result;
the step of determining the layout page of the corresponding front end based on the tool resource comprises the following steps:
and determining the layout page of the corresponding front end based on the tool resources formed by the unified drilling tools and the common drilling tools.
In one possible implementation manner of the present application, the step of determining the page layout based on the tool resources formed by unifying the drilling tools and the common drilling tools includes:
receiving a newly added drilling tool uploaded by a user based on a front-end page, and examining the newly added drilling tool;
if the newly added drilling tool meets the preset conditions, storing the newly added drilling tool to a tool resource;
and determining an arrangement page of the corresponding front end based on tool resources formed by unified drilling tools and the common drilling tools, wherein each drilling tool comprises the newly added drilling tool.
In one possible implementation manner of the present application, before the step of obtaining a deployment task and automatically generating a deployment solution based on the deployment task, the method includes:
calling a preset function interface of a configuration data channel, and mapping different functions of a server port to a subnet where a target virtual machine is located so as to complete the configuration of different data channel functions of the virtual machine.
In one possible implementation manner of the present application, after the step of sending the deployment solution to the virtual machine for the virtual machine to automatically complete tool deployment based on the deployment solution, the method includes:
when a switching instruction is detected, determining a switching type in the switching instruction;
if the switching type is switching of the drilling tool, determining the drilling tool to be switched in the target virtual machine, and replacing the drilling tool to be switched with the target drilling tool carried in the switching instruction;
if the switching type is the switching of the deployment scheme, determining the deployment scheme to be switched in the target virtual machine, and replacing the deployment scheme to be switched with the target deployment scheme carried in the switching instruction.
In one possible implementation manner of the present application, after the step of sending the deployment solution to the target virtual machine for the target virtual machine to automatically complete deployment of the exercise tool based on the deployment solution, the method includes:
receiving a drilling tool cleaning task generated by a user based on a front-end page;
and sending the drill tool clearing task to the virtual machine so that the virtual machine can clear the drill tool in the target virtual machine based on the drill tool clearing task.
The present application also provides a network range tool deployment device comprising:
the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving a deployment task generated by a user based on a front-end page and automatically generating a deployment scheme based on the deployment task, wherein the deployment task carries an exercise tool for generating the deployment scheme and a target virtual machine to be deployed;
the first scheduling module is used for sending the deployment scheme to the target virtual machine so that the target virtual machine can automatically complete deployment of the drilling tool based on the deployment scheme.
The application also provides a network range tool deployment device, and the network range tool deployment method device comprises the following steps: a memory, a processor and a program stored on the memory for implementing the network range tool deployment method,
the memory is used for storing a program for realizing the network shooting range tool deployment method;
the processor is configured to execute a program implementing the network range tool deployment method to implement the steps of the network range tool deployment method as described above.
The present application also provides a storage medium having stored thereon a program for implementing the above-described network range tool deployment method, the program for implementing the network range tool deployment method being executed by a processor to implement the steps of the network range tool deployment method as described above.
The application provides a network shooting range tool deployment method, device, equipment and storage medium, which are compared with the problem that in the prior art, the tool deployment of attack and defense countermeasure exercise can only be manually deployed by a player, so that the tool deployment efficiency is low. The method comprises the steps of receiving a deployment task generated by a user based on a front-end page, and automatically generating a deployment scheme based on the deployment task, wherein the deployment task carries a drilling tool for generating the deployment scheme and a target virtual machine to be deployed; and sending the deployment scheme to the target virtual machine so that the target virtual machine can automatically complete deployment of the drilling tool based on the deployment scheme. According to the method and the device, the deployment scheme can be automatically generated based on the deployment task only by acquiring the deployment task, the deployment scheme is sent to the virtual machine, the virtual machine automatically completes tool deployment based on the deployment scheme, the drilling tool does not need to be copied into the virtual machine, and the deployment and the installation of the tool are manually executed, so that the preparation time required by tool deployment in attack and defense countermeasure drilling is shortened. That is, in the application, the system can provide efficient tool deployment efficiency for players when the network shooting range performs attack and defense countermeasure exercise.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flow chart of a first embodiment of a networked range tool deployment method of the present application;
FIG. 2 is an overall architecture diagram of the networked range tool deployment method of the present application;
FIG. 3 is a flowchart of the networked range tool deployment of the present application;
fig. 4 is a schematic device structure diagram of a hardware running environment according to an embodiment of the present application.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In a first embodiment of the network range tool deployment method, referring to fig. 1, the network range tool deployment method includes:
step S10, receiving a deployment task generated by a user based on a front-end page, and automatically generating a deployment scheme based on the deployment task, wherein the deployment task carries an exercise tool for generating the deployment scheme and a target virtual machine to be deployed;
step S20, sending the deployment scheme to the target virtual machine, so that the target virtual machine can automatically complete deployment of the drilling tool based on the deployment scheme.
In this embodiment, the scenes aimed at are: with the rapid development of the information age, the importance of network security is increasingly highlighted, and the appearance of the network target range facilitates the study and research of related personnel on the network security, wherein the related personnel can conduct attack and defense countermeasure exercise based on the network target range, so that the network security level of the related personnel is improved.
The network target range is based on a virtualization technology, and can simulate or reproduce a network architecture, a system equipment service running environment and the like in a real network space. At present, various virtual machines are arranged in a network target range platform and are used for realizing the network security countermeasure level among the virtual machines. When the existing network target range is used for the attack and defense countermeasure exercise, the tool deployment of the attack and defense countermeasure exercise can only be manually deployed by a player, however, the deployment efficiency of manually deploying the attack and defense countermeasure exercise tool is low, and the deployment efficiency is an important constraint factor affecting the preparation time of the attack and defense countermeasure exercise.
The present embodiment aims to provide efficient tool deployment efficiency for players when the network target range performs attack and defense countermeasure exercises.
The method comprises the following specific steps:
step S10, receiving a deployment task generated by a user based on a front-end page, and automatically generating a deployment scheme based on the deployment task, wherein the deployment task carries an exercise tool for generating the deployment scheme and a target virtual machine to be deployed;
as an example, the network range tool deployment method may be applied to a network range tool deployment device deployed at a server side.
As an example, the server side includes a deployment module, a management module, a scheduling module, a virtual machine module, a proxy module, and the like.
As an example, as shown in fig. 2, the virtual machine device is also deployed at the server side.
As an example, fig. 3 is a deployment flow of the network range tool deployment device deployment exercise tool in the present application.
In this embodiment, the server receives a deployment task selected by the user based on the drilling tool and the virtual machine displayed on the front-end page, and automatically generates a deployment scheme based on the drilling tool and the target virtual machine in the deployment task.
As an example, a server receives a deployment task, identifies a drilling tool and a target virtual machine in the deployment task, and generates a deployment scheme based on the identified drilling tool and target virtual machine.
As an example, the deployment task may be a task of deploying a plurality of exercise tools to one virtual machine, or may be a task of deploying one exercise tool to a plurality of virtual machines.
As one example, the drill tools may be classified into drill attack tools and drill defense tools.
Step S20, sending the deployment scheme to the target virtual machine, so that the target virtual machine can automatically complete deployment of the drilling tool based on the deployment scheme.
In this embodiment, the server issues the deployment scheme to the target virtual machine through the data channel, so that the target virtual machine can identify the drilling tool in the scheme, and the drilling tool downloaded through the data channel can automatically complete tool deployment based on the downloaded drilling tool.
The server needs to establish a data channel with the new virtual machine every time the new virtual machine is created.
The application provides a network shooting range tool deployment method, device, equipment and storage medium, which are compared with the problem that in the prior art, the tool deployment of attack and defense countermeasure exercise can only be manually deployed by a player, so that the tool deployment efficiency is low. The method comprises the steps of receiving a deployment task generated by a user based on a front-end page, and automatically generating a deployment scheme based on the deployment task, wherein the deployment task carries a drilling tool for generating the deployment scheme and a target virtual machine to be deployed; and sending the deployment scheme to the target virtual machine so that the target virtual machine can automatically complete deployment of the drilling tool based on the deployment scheme. According to the method and the device, the deployment scheme can be automatically generated based on the deployment task only by acquiring the deployment task, the deployment scheme is sent to the virtual machine, the virtual machine automatically completes tool deployment based on the deployment scheme, the drilling tool does not need to be copied into the virtual machine, and the deployment and the installation of the tool are manually executed, so that the preparation time required by tool deployment in attack and defense countermeasure drilling is shortened. That is, in the application, the system can provide efficient tool deployment efficiency for players when the network shooting range performs attack and defense countermeasure exercise.
Further, based on the first embodiment of the network range tool deployment method of the present application, a second embodiment is provided, where before the step of obtaining the deployment task, the method includes:
step S30, determining tool resources formed by unified drilling tools; the tool resources are unified based on attribute characteristic information of each drilling tool, wherein the attribute characteristic information comprises one or more of types, names, versions, operation platforms and attack and defense attribute matrixes;
in this embodiment, the server acquires attribute feature information of each drilling tool, and unifies each drilling tool based on the attribute feature information of each drilling tool.
And step S40, determining the layout page of the corresponding front end based on the tool resource, so that a user can generate a deployment task based on the layout page.
In this embodiment, the server creates a layout page of the drilling tool at the front end based on the tool resource, so that the user selects the drilling tool and the target virtual machine to be deployed based on the layout page, and generates the deployment task based on the selected drilling tool and the target virtual machine.
Wherein the tool resources are composed of unified exercise tools.
The server unifies the drilling tools to obtain unified drilling tools.
As one example, the orchestration page may display the drill tool through a 2D image, and may also display the drill tool through a 3D image.
As one example, the orchestration page may display the drill tool through color images, or through black and white images.
As an example, the orchestration page may describe the exercise tool in Chinese, and may also describe the exercise tool in English.
As an example, the orchestration page may display the exercise tool through Arabic numerical ordering, or through English alphabetical ordering.
As one example, the orchestration page may display drill tool information, and may also display virtual machine information.
As one example, displaying virtual machine information may be displaying a current state of a virtual machine.
As one example, the orchestration page may display association information between the tool to be exercised and the target virtual machine.
As an example, the association information between the to-be-deployed drilling tool and the target virtual machine may be displayed, after the deployment task is generated, by displaying deployment status information between the to-be-deployed drilling tool and the target virtual machine.
As an example, the programming page displays the association information between the exercise tool to be deployed and the target virtual machine, which may be described by text, or may be displayed by an image.
As an example, before determining to lay out a page based on the tool resource, the method includes:
step S41, acquiring a deployment task history record;
as an example, the server obtaining a deployment task history may be obtaining a history of deployment tasks within a month.
Step S42, analyzing the drilling tool history record, and determining a common drilling tool based on an analysis result;
as an example, the server may analyze the exercise tool history, which may be the time duration of use of the exercise tool, or the number of times the exercise tool is used.
As an example, the server determines that the common practice tool may be a common attack tool or a common defense tool, or may be a combination of common attack and defense tools.
As an example, the step of determining an orchestration page based on the tool resources includes:
step S43, determining the layout page of the corresponding front end based on the tool resources formed by the unified drilling tools and the common drilling tools.
In this embodiment, the server determines the common drilling tool based on the deployment task, creates the layout page at the front end based on the tool resource and the common drilling tool, so that the user can select the drilling tool based on the layout page, and if the common drilling tool provided by the layout page is the drilling tool required by the user, the user does not need to search the required drilling tool any more, thereby improving the efficiency of selecting the drilling tool by the user.
As an example, the step of determining the page layout based on the tool resources formed by unifying the drilling tools and the common drilling tools includes:
step S431, receiving a newly added drilling tool uploaded by a user based on a front-end page, and examining the newly added drilling tool;
in this embodiment, before the front-end page receives the new exercise tool that the user uploads based on the front-end page, it is required to receive option information that the user discloses the new exercise tool and the new exercise tool information that the user fills in.
As an example, if the server detects that the option information of the newly added drilling tool is public option information, the newly added drilling tool is disclosed, the disclosed newly added drilling tool can be checked and deployed by all users, and if the server detects that the option information of the newly added drilling tool is non-public option information, the newly added drilling tool is hidden, and only the hidden newly added drilling tool is uploaded to the users for checking and deployment.
As an example, the newly added exercise tool information may be classification information of the newly added exercise tool, or may be version information of the newly added exercise tool.
As an example, the server receives a new exercise tool uploaded by the user based on the front-end page, and the user may upload the exercise tool through a local area network or through a data interface.
As an example, the uploaded new drilling tool may be a drilling attack tool, a drilling defending tool, or a drilling defending tool combination.
As one example, the server's review of the newly added drilling tool may be to review if the drilling tool has a security threat.
Step S432, if the newly added drilling tool meets the preset conditions, storing the newly added drilling tool to a tool resource;
in this embodiment, the server examines the newly added drilling tool uploaded by the user based on the front end, and if the uploaded newly added drilling tool meets the preset condition, stores the newly added drilling tool into the tool resource.
As an example, the preset condition may be a condition that the exercise tool does not present a security threat.
And S433, determining an arranging page based on tool resources formed by unifying the drilling tools and the common drilling tools, wherein the drilling tools comprise the newly added drilling tools.
In this embodiment, after unifying and storing the newly uploaded drilling tools to the tool resources, the server creates a layout page of the drilling tool at the front end based on the tool resources and the commonly used drilling tools.
In this embodiment, the server collects the drilling tools and unifies the collected drilling tools, but the server has a part of drilling tools not collected or a part of drilling tools not disclosed, so that the server cannot provide the required drilling tools for the user, and provides the function of uploading the drilling tools for the user.
Further, based on the first embodiment and the second embodiment of the network target range tool deployment method of the present application, a third embodiment is provided, and before the step of receiving the deployment task generated by the user based on the front end page, the method includes:
step S50, calling a preset function interface for configuring the data channels, and mapping different functions of the server port to the subnet where the target virtual machine is located so as to complete the configuration of different data channel functions of the virtual machine.
In this embodiment, after the server establishes network connection with the target virtual machine through the data channel, the subnet number of the target virtual machine is obtained, the function interface of the configuration data channel is called based on the subnet number of the target virtual machine, and the functions of remote command execution, remote login, remote push file, status monitoring and the like are mapped into the target virtual machine based on the function interface of the configuration data channel.
As an example, after creating a new virtual machine, the server configures a data channel with each new virtual machine, establishes a network connection, obtains a subnet number of the new virtual machine, invokes a configuration data channel function interface based on the subnet number of the new virtual machine, and maps different configuration data channel functions into the new virtual machine based on the configuration data channel function interface.
As an example, the server remote command execution function may be that the server sends an execution command to the virtual machine based on the data channel.
As one example, the remote command sent by the server to the virtual machine based on the data channel may be a command to remotely log into the virtual machine.
As an example, the server push file function may be that the server pushes files to the virtual machine based on a data channel.
As an example, the server status monitoring function may be that the server monitors the running status of the virtual machine and the running status of the exercise tool through the data channel.
In this embodiment, the server maps different configuration data channel functions to the target virtual machine by calling a preset configuration data channel interface, so that the target virtual machine can implement different data channel functions.
Further, based on the first embodiment, the second embodiment, and the third embodiment of the network target range tool deployment method of the present application, a fourth embodiment is provided, where after the step of sending the deployment solution to the virtual machine for the virtual machine to automatically complete tool deployment based on the deployment solution, the method includes:
step S60, when a switching instruction is detected, determining a switching type in the switching instruction;
as an example, the switch type may be a switch of the drill tool, or may be a switch of the scene.
As an example, the switching of the scenes may be switching of the countermeasure exercise scene to the evaluation scene, or switching of the countermeasure exercise scene to the training scene.
As an example, the evaluation scenario may be a Web server that is required to be evaluated by a user deployment, and the attack tool and the target virtual machine to be deployed are selected based on the front-end layout page, so as to generate a deployment scheme, so that the target virtual machine can complete deployment of the attack tool based on the deployment scheme, attack the Web server, and the network target tool deployment device obtains attack parameters of the virtual machine, thereby determining a network security level of the Web server.
As an example, the training scenario may be to deploy a server with a vulnerability, select an attack tool and a target virtual machine to be deployed based on a front-end programming page, generate a deployment scheme, so that the target virtual machine can complete deployment of the attack tool based on the deployment scheme, attack the vulnerability server by using the virtual machine according to the steps, and thereby demonstrate an attack process of the virtual machine on the vulnerability server for a user.
Step S70, if the switching type is switching of the drilling tool, determining the drilling tool to be switched in the target virtual machine, and replacing the drilling tool to be switched with the target drilling tool carried in the switching instruction;
as an example, the target drilling tool may be an attack-only tool, a defense-only tool, or a combination of attack and defense tools.
As an example, the switching of the drill tool may be the switching of a single attack prop or the switching of a single defending tool.
As an example, after the server replaces the target drilling tool carried in the instruction with the drilling tool to be switched, the drilling tool to be switched can be regenerated into the deployment scheme for the user to replace again.
Step S80, if the switching type is switching of the deployment scheme, determining the deployment scheme to be switched in the target virtual machine, and replacing the deployment scheme to be switched with the target deployment scheme carried in the switching instruction.
As an example, the switching deployment of the exercise tool solution may be to switch the exercise tool into the target virtual machine carried in the instruction, or may be to switch the target exercise tool carried in the instruction into the target virtual machine carried in the instruction.
In this embodiment, after detecting the switching instruction, the server determines the type of the switching instruction, and switches the drilling tool and the drilling scene based on the type of the switching instruction, so that the user can remotely switch the drilling tool and the drilling scene in the countermeasure drilling.
Further, based on the first embodiment, the second embodiment, the third embodiment, and the fourth embodiment of the network range tool deployment method of the present application, a fifth embodiment is provided, where after the step of sending the deployment solution to the virtual machine for the virtual machine to automatically complete tool deployment based on the deployment solution, the method includes:
step S90, receiving a drilling tool removal task generated by a user based on a front-end page;
as an example, the instruction to clear the exercise tool may be an instruction to clear an attack tool or a defense tool, or may be an instruction to clear all the exercise tools.
And step S100, the drill tool clearing task is sent to the virtual machine, so that the virtual machine can clear the drill tool in the target virtual machine based on the drill tool clearing task.
In this embodiment, the server acquires the cleaning task of the drilling tool, and sends the cleaning task of the drilling tool to the target virtual machine, so that the target virtual machine can complete cleaning of the drilling tool based on the cleaning task of the drilling tool, and a user can remotely clean the drilling tool in the virtual machine.
Referring to fig. 4, fig. 4 is a schematic device structure diagram of a hardware running environment according to an embodiment of the present application.
As shown in fig. 4, the network range tool deployment device may include: a processor 1001, a memory 1005, and a communication bus 1002. The communication bus 1002 is used to enable connected communication between the processor 1001 and the memory 1005.
Optionally, the network range tool deployment device may further include a user interface, a network interface, a camera, an RF (Radio Frequency) circuit, a sensor, a WiFi module, and the like. The user interface may include a Display, an input sub-module such as a Keyboard (Keyboard), and the optional user interface may also include a standard wired interface, a wireless interface. The network interface may include a standard wired interface, a wireless interface (e.g., WI-FI interface).
Those skilled in the art will appreciate that the network range tool deployment device structure shown in fig. 4 does not constitute a limitation of the network range tool deployment device, and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 4, an operating system, a network communication module, and a network target tool deployment program may be included in the memory 1005 as one type of storage medium. The operating system is a program that manages and controls the hardware and software resources of the network yard tool deployment device, supporting the operation of the network yard tool deployment program and other software and/or programs. The network communication module is used to enable communication between components within the memory 1005, as well as with other hardware and software in the network target tool deployment system.
In the network range tool deployment device shown in fig. 4, the processor 1001 is configured to execute a network range tool deployment program stored in the memory 1005, to implement the steps of the network range tool deployment method described in any of the above.
The specific implementation manner of the device for reducing the port power consumption is basically the same as the above embodiments of the network target tool deployment method, and will not be described herein again.
The present application also provides a network range tool deployment device comprising:
the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving a deployment task generated by a user based on a front-end page and automatically generating a deployment scheme based on the deployment task, wherein the deployment task carries an exercise tool for generating the deployment scheme and a target virtual machine to be deployed;
the first scheduling module is used for sending the deployment scheme to the target virtual machine so that the target virtual machine can automatically complete deployment of the drilling tool based on the deployment scheme.
Illustratively, the network range tool deployment apparatus comprises:
the first management module is used for determining tool resources formed by unified drilling tools; the tool resources are unified based on attribute characteristic information of each drilling tool, wherein the attribute characteristic information comprises one or more of types, names, versions, operation platforms and attack and defense attribute matrixes;
the first deployment module is used for determining the layout page of the corresponding front end based on the tool resource so as to enable a user to generate a deployment task based on the layout page.
Illustratively, the network range tool deployment apparatus comprises:
the acquisition module is used for acquiring the deployment task history record;
the second management module is used for analyzing the history record of the drilling tool and determining a common drilling tool based on an analysis result;
and the second deployment module is used for determining the layout page of the corresponding front end based on the tool resources formed by the unified drilling tools and the common drilling tools.
Illustratively, the second deployment module includes:
the first management unit is used for receiving a newly-added drilling tool uploaded by a user based on a front-end page and checking the newly-added drilling tool;
the second management unit is used for storing the newly added drilling tool to tool resources if the newly added drilling tool meets preset conditions;
the deployment unit is used for determining the layout page of the corresponding front end based on the tool resources formed by the unified drilling tools and the common drilling tools, wherein each drilling tool comprises the newly added drilling tool.
Illustratively, the network range tool deployment apparatus comprises:
and the virtual machine module is used for calling a preset function interface for configuring the data channels and mapping different functions of the server port to the subnet where the target virtual machine is located so as to complete the configuration of different data channel functions of the virtual machine.
Illustratively, the network range tool deployment apparatus comprises:
the first proxy module is used for determining a switching type in a switching instruction when the switching instruction is detected;
the second agent module is used for determining the drilling tool to be switched in the target virtual machine if the switching type is the switching of the drilling tool, and replacing the drilling tool to be switched with the target drilling tool carried in the switching instruction;
and the third generation module is used for determining a deployment scheme to be switched in the target virtual machine if the switching type is the switching of the deployment scheme, and replacing the deployment scheme to be switched with the target deployment scheme carried in the switching instruction.
Illustratively, the network range tool deployment apparatus comprises:
the second scheduling module is used for receiving a drilling tool cleaning task generated by a user based on the front-end page;
and the third scheduling module is used for sending the drilling tool clearing task to the virtual machine so that the virtual machine can clear the drilling tool in the target virtual machine based on the drilling tool clearing task.
The specific implementation manner of the network target range tool deployment device is basically the same as the above embodiments of the method for reducing the port power consumption, and will not be described herein.
The present application also provides a storage medium having stored thereon a program of network range tool deployment which when executed by a processor implements the steps of the method of network range tool deployment as described in any of the preceding claims.
The specific implementation manner of the storage medium is basically the same as that of each embodiment of the network range tool deployment described above, and will not be repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) as described above, including several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.

Claims (10)

1. The network range tool deployment method is characterized by being applied to a server side, and comprises the following steps:
receiving a deployment task generated by a user based on a front-end page, and automatically generating a deployment scheme based on the deployment task, wherein the deployment task carries a drilling tool for generating the deployment scheme and a target virtual machine to be deployed;
and sending the deployment scheme to the target virtual machine so that the target virtual machine can automatically complete deployment of the drilling tool based on the deployment scheme.
2. The network range tool deployment method of claim 1, wherein prior to the step of acquiring the deployment task, comprising:
determining tool resources formed by unified drilling tools; the tool resources are unified based on attribute characteristic information of each drilling tool, wherein the attribute characteristic information comprises one or more of types, names, versions, operation platforms and attack and defense attribute matrixes;
and determining the layout page of the corresponding front end based on the tool resource, so that a user can generate a deployment task based on the layout page.
3. The network target range tool deployment method according to claim 2, wherein the step of determining the layout page of the corresponding front end based on the tool resource for the user to generate the deployment task based on the layout page is preceded by the steps of;
acquiring a deployment task history record;
analyzing the drilling tool history record, and determining a common drilling tool based on an analysis result;
the step of determining the layout page of the corresponding front end based on the tool resource comprises the following steps:
and determining the layout page of the corresponding front end based on the tool resources formed by the unified drilling tools and the common drilling tools.
4. The network target range tool deployment method according to claim 3, wherein the step of determining the layout page of the corresponding front end based on the tool resources formed by unifying the drilling tools and the common drilling tools comprises:
receiving a newly added drilling tool uploaded by a user based on a front-end page, and examining the newly added drilling tool;
if the newly added drilling tool meets the preset conditions, storing the newly added drilling tool to a tool resource;
and determining an arrangement page of the corresponding front end based on tool resources formed by unified drilling tools and the common drilling tools, wherein each drilling tool comprises the newly added drilling tool.
5. The method of network target tool deployment of claim 1, wherein prior to the step of receiving a user-generated deployment task based on a front-end page, comprising:
calling a preset function interface of a configuration data channel, and mapping different functions of a server port to a subnet where a target virtual machine is located so as to complete the configuration of different data channel functions of the virtual machine.
6. The method of network range tool deployment of claim 1, wherein after the step of sending the deployment solution to the target virtual machine for the target virtual machine to automatically complete deployment of the drilling tool based on the deployment solution, comprising:
when a switching instruction is detected, determining a switching type in the switching instruction;
if the switching type is switching of the drilling tool, determining the drilling tool to be switched in the target virtual machine, and replacing the drilling tool to be switched with the target drilling tool carried in the switching instruction;
if the switching type is the switching of the deployment scheme, determining the deployment scheme to be switched in the target virtual machine, and replacing the deployment scheme to be switched with the target deployment scheme carried in the switching instruction.
7. The method of network range tool deployment of claim 1, wherein after the step of sending the deployment solution to the target virtual machine for the target virtual machine to automatically complete deployment of the drilling tool based on the deployment solution, comprising:
receiving a drilling tool cleaning task generated by a user based on a front-end page;
and sending the drill tool clearing task to the virtual machine so that the virtual machine can clear the drill tool in the target virtual machine based on the drill tool clearing task.
8. A network range tool deployment device, the network range tool deployment device comprising:
the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving a deployment task generated by a user based on a front-end page and automatically generating a deployment scheme based on the deployment task, wherein the deployment task carries an exercise tool for generating the deployment scheme and a target virtual machine to be deployed;
the first scheduling module is used for sending the deployment scheme to the target virtual machine so that the target virtual machine can automatically complete deployment of the drilling tool based on the deployment scheme.
9. A network range tool deployment apparatus, the network range tool deployment method apparatus comprising: a memory, a processor and a program stored on the memory for implementing the network range tool deployment method,
the memory is used for storing a program for realizing the network shooting range tool deployment method;
the processor is configured to execute a program implementing the network range tool deployment method to implement the steps of the network range tool deployment method according to any one of claims 1 to 7.
10. A storage medium having stored thereon a program for implementing a network range tool deployment method, the program for implementing the network range tool deployment method being executed by a processor to implement the steps of the network range tool deployment method of any one of claims 1 to 7.
CN202310296532.3A 2023-03-17 2023-03-17 Network range tool deployment method, device, equipment and storage medium Pending CN116232753A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310296532.3A CN116232753A (en) 2023-03-17 2023-03-17 Network range tool deployment method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310296532.3A CN116232753A (en) 2023-03-17 2023-03-17 Network range tool deployment method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116232753A true CN116232753A (en) 2023-06-06

Family

ID=86578775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310296532.3A Pending CN116232753A (en) 2023-03-17 2023-03-17 Network range tool deployment method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116232753A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117852048A (en) * 2024-03-08 2024-04-09 华中科技大学 Multi-dimensional attack vector-based soft and hard combined Internet of vehicles shooting range construction method
CN117852048B (en) * 2024-03-08 2024-06-07 华中科技大学 Multi-dimensional attack vector-based soft and hard combined Internet of vehicles shooting range construction method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117852048A (en) * 2024-03-08 2024-04-09 华中科技大学 Multi-dimensional attack vector-based soft and hard combined Internet of vehicles shooting range construction method
CN117852048B (en) * 2024-03-08 2024-06-07 华中科技大学 Multi-dimensional attack vector-based soft and hard combined Internet of vehicles shooting range construction method

Similar Documents

Publication Publication Date Title
CN106649063A (en) Method and system used for monitoring time consuming data when program runs
EP2109323A1 (en) Dynamic fault analysis for a centrally managed network element in a telecommunications system
CN110833693B (en) Game running method and device, storage medium and electronic device
CN105225212A (en) A kind of image processing method and device
CN112596815B (en) Method and device for generating functional component, storage medium and electronic device
CN112100065A (en) Game scene data processing method, device and equipment
CN108628747A (en) H5 application testing methods, device, computer equipment and storage medium
CN110413282A (en) A kind of redundant resource processing method, device, equipment and storage medium
CN110096420A (en) A kind of data processing method, system and device
CN112148607A (en) Interface testing method and device for service scene
CN109618176A (en) A kind of processing method of live broadcast service, equipment and storage medium
CN112925520A (en) Method and device for building visual page and computer equipment
CN111782524A (en) Application testing method and device, storage medium and electronic device
CN109041267A (en) A kind of network connectivity fai_lure processing method, device and electronic equipment
CN110163201B (en) Image testing method and device, storage medium and electronic device
CN116232753A (en) Network range tool deployment method, device, equipment and storage medium
CN115484169A (en) Method, device and system for constructing network topology structure
CN112698829B (en) Abnormal resource positioning method and device, storage medium and electronic equipment
CN112364267B (en) Front-end data acquisition method and device
CN110264654B (en) Security-based monitoring management method and device, readable storage medium and system
King et al. Request driven social sensing
CN104216603A (en) Display method and electronic equipment
CN109544852B (en) Restaurant fire monitoring method and device
CN112383591B (en) Image management method, device and system
CN109634943B (en) Air conditioner data transmission method and device for screening data and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination