CN116248411A - AWD attacks and defends platform - Google Patents

AWD attacks and defends platform Download PDF

Info

Publication number
CN116248411A
CN116248411A CN202310278355.6A CN202310278355A CN116248411A CN 116248411 A CN116248411 A CN 116248411A CN 202310278355 A CN202310278355 A CN 202310278355A CN 116248411 A CN116248411 A CN 116248411A
Authority
CN
China
Prior art keywords
game
user
awd
module
management module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310278355.6A
Other languages
Chinese (zh)
Other versions
CN116248411B (en
Inventor
梁金
刘国伟
颜靖
张冲
廖家辉
吴适怀
黄丽媚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangxi Tayi Information Technology Co ltd
Original Assignee
Guangxi Tayi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangxi Tayi Information Technology Co ltd filed Critical Guangxi Tayi Information Technology Co ltd
Priority to CN202310278355.6A priority Critical patent/CN116248411B/en
Publication of CN116248411A publication Critical patent/CN116248411A/en
Application granted granted Critical
Publication of CN116248411B publication Critical patent/CN116248411B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses an AWD attack and defense platform, which comprises a user module: the method comprises the steps of creating registered player information, checking account password information of a user and managing user information; AWD module: the method is used for editing and modifying the game questions, managing the created game question examples and creating specific games; a CTF module; and a flow management module: the method is used for recording and analyzing the player flow recording and connection conditions in the AWD/CTF competition. The invention adopts KVM technology, encapsulates interfaces provided by libvirt at the application level to control the network, the virtualization equipment and the storage of the virtualization client; the virtual machine file and the configuration file which are designed in advance can be packed into a compression package, and after the compression package is obtained by a user, the user only needs to upload the questions to the server, so that the updating of multiple questions can be completed, and the operation steps of the question updating are greatly simplified.

Description

AWD attacks and defends platform
Technical Field
The invention relates to the technical field of virtualization, in particular to an AWD attack and defense platform.
Background
The network security attack and defense countermeasure competition (AWD, attack With Defence) is a competition mode for both attack and defense, and comprehensively checks the attack of a competition team, the capability of a defense technology and the competition mode of an instant strategy. The traditional CTF (Capture The Flag) competition has the special advantages of simple and fair form and relatively easy competition organization, but has the defect that the frame in the problem solving mode is difficult to jump out, and the protection capability of competitors is difficult to promote and compare. In the AWD attack and defense mode, the team involved in the game defends the virtual target machines which are configured in the same way, finds weak links of other teams to attack in limited game time, and strengthens and defends own target machine environment. In the simulation exercise, players are put into the game in a whole body, learn each other, continuously perfect self-coding codes and further improve the capability of the attack and defense games.
The AWD attack and defense platform has higher requirements on diversity and instantaneity of the game questions, but the traditional AWD platform question updating depends on mirror image uploading, and the updating speed is slow due to the fact that the platform is used for editing, professional staff is required to maintain and update the questions, the maintenance difficulty of common users is higher, and the questions are difficult to independently update.
Disclosure of Invention
The invention aims to provide an AWD attack and defense platform which solves the following technical problems:
the aim of the invention can be achieved by the following technical scheme:
an AWD attack and defense platform, comprising:
and (3) a user module: the method comprises the steps of creating registered player information, checking account password information of a user and managing user information;
AWD module: for editing and modifying game questions, managing created game question instances, and creating specific games.
A CTF module;
and a flow management module: the method is used for recording and analyzing the player flow recording and connection conditions in the AWD/CTF competition.
As a further scheme of the invention: the user module comprises:
a user registration module: for creating registered player information;
a user login module: the user login module is used for verifying account password information of a user and verifying the validity of a user name and a password;
and the user information management module: the user information management module is used for editing and modifying information such as personal information nicknames and the like by users.
As a further scheme of the invention: the AWD module includes:
the topic management module: the method is used for updating, exporting and editing the game questions;
the topic example management module: the system comprises a user interface, a virtual machine name, a network interface and a state information, wherein the user interface is used for managing a created game question instance, the game question instance is created by game question configuration, the created game question instance stores a generated UUID, a virtual machine name, an associated game question, a user to which the game question belongs, a Mac address, an IP address, the network interface and the state information, the network interface designates a specific network card used by the instance, a complex attack and defense network environment can be built by configuring the parameter and combining other instances, the user is bound with an owner of the current instance, and when a certain team attack is successful, the attribution right of the instance is automatically obtained;
the match management module: the system comprises a game management module, a game management module and a game management module, wherein the game management module is used for managing by an administrator, creating a game in advance, associating AWD/CTF (automatic thread/computer program function) game questions and users needed in the game into the game, and automatically starting the associated game questions when the game starts to create a game question instance;
and a flow management module: the server authority number and the score obtained by the player are recorded, and then real-time ranking is carried out according to the score.
As a further scheme of the invention: the AWD module also comprises a Flag management module, wherein the Flag management module is used for managing the certificates submitted after the competitor acquires the target server, the Flag management module provides an interface for Flag acquisition, only if a machine IP initiating request of a game question instance created by a game proves that other players attack the machine, the server can respond to return the correct Flag, a user submitting the Flag can acquire the attribution authority of the corresponding game question server, meanwhile, the user can increase the score of the corresponding game question, the user cannot repeatedly submit the Flag belonging to the server of the user, and the module can detect the abnormally submitted Flag and record the abnormally submitted Flag in an abnormal log.
As a further scheme of the invention: the flow management module comprises:
and a flow monitoring module: the method is used for recording player network traffic and analyzing player traffic recording and connection conditions in the AWD/CTF competition;
and a flow analysis module: the method is used for recording player network traffic, analyzing the target of player specific attack in the AWD/CTF competition and the used attack mode;
flow dynamic display module: the player network flow analysis and display device is used for analyzing and displaying player network flow, cleaning recorded game flow, displaying the game flow on a large screen and visualizing a game attack process and a battle condition.
As a further scheme of the invention: in the user registration module, when a user participates in a game for the first time, submitting own identity information to complete player registration, wherein the identity information comprises mailbox information, user personal profile, user name and user password.
As a further scheme of the invention: in the game question management module, editing the game questions comprises adding, deleting and modifying, setting system prepositive parameters such as titles, descriptions, basic scores, mirror image files, operating system types, CPU core numbers, memory sizes, system user names and the like of the game questions, and controlling various resources distributed in the process of instance generation.
As a further scheme of the invention: in the game question management module, the specific importing process comprises the following steps:
extracting each item of configuration information of the title, and writing the configuration information into a configuration file according to a preset format;
collecting a virtual machine file related to the title;
classifying and packaging the configuration files and the virtual machine files in the same folder, and encrypting the compressed package by using a key configured by the system;
storing the packaged files, registering the files in a database, and not repeatedly exporting the questions when exporting the questions next time;
and returning the file to the front end for downloading by the user.
As a further scheme of the invention: in the game question management module, the specific export process comprises the following steps:
the system receives a game question file uploaded by a user;
decompressing the uploaded file by using a key configured by the system, and checking whether the data file related to the title accords with the specification of the current system version;
analyzing the configuration file of the title, importing and registering the related title file into a system, adding the analyzed title data into a system database, and associating the file with a virtual machine file;
check if there is missing data in the database and provide default values for non-critical data fields.
The invention has the beneficial effects that: in order to solve the above problems, my refers to a compound multi-container construction technology based on a dock, which only needs to edit corresponding YML files in the use process to construct a complex intranet environment, but because of the limitation of the dock virtualization technology, the compound only supports the environment deployment of Linux, and cannot deploy complex exercise environments including Linux and indows: the invention adopts KVM technology, encapsulates interfaces provided by libvirt at the application level to control the network, the virtualization equipment and the storage of the virtualization client; the virtual machine file and the configuration file which are designed in advance can be packed into a compression package, and after the compression package is obtained by a user, the user only needs to upload the questions to the server, so that the updating of multiple questions can be completed, and the operation steps of the question updating are greatly simplified.
Drawings
The invention is further described below with reference to the accompanying drawings.
FIG. 1 is a system framework diagram of an AWD attack and defense platform of the present invention;
FIG. 2 is a block diagram of a user module of an AWD attack and defense platform of the present invention;
FIG. 3 is a block diagram of an AWD module of the AWD attack and defense platform of the present invention;
fig. 4 is a block diagram of a traffic management module of the AWD attack and defense platform of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Fig. 1 to fig. 4 show a design idea and a management method of an AWD attack and defense platform, which quickly builds an attack and defense environment through a virtualization technology, a question maker can configure a generation environment and export the environment into an encrypted compressed package containing a configuration file and an image file, the exported compressed package is directly imported into a system to complete the update of a game question during maintenance, and in the game process, a submitter is analyzed whether illegal operation exists or not through analyzing Flag sources, time and request parameters, so that the game is conveniently arbitrated by a referee, and the method specifically comprises the following steps:
a user registration module: the registration module is used for creating registered player information;
in the system, when a user participates in a game for the first time, the user needs to submit information such as own mailbox information, user personal profile, user name, user password and the like to finish player registration, the user name is not repeatable, and the user password is not allowed to be set as a common password or an excessively short password.
A user login module: the user login module is used for checking account password information of a user;
in the system, the user login needs to check the validity of the user name and the password.
And the user information management module: the user information management module is used for modifying personal information by a user.
In the system, after logging in, the user can edit and modify information such as personal profile, mailbox, password, nickname and the like of the personal account.
The game question management module is used for editing and modifying game questions.
In the system, the topic management module comprises the following core functions:
editing the game questions:
an administrator can add, delete and change the game questions, set system prepositive parameters such as titles, descriptions, basic scores, mirror image files, operating system types, CPU core numbers, memory sizes, system user names and the like of the game questions, and control various resources distributed in the process of generating the instance.
Import/export of game questions:
when the administrator creates the game questions, the method comprises the following steps: 1. the system extracts each item of configuration information of the title and writes the item of configuration information into a configuration file according to a certain format; 2. collecting a virtual machine file related to the title; 3. classifying and packaging the configuration files and the virtual machine files in the same folder, and encrypting the compressed package by using a key configured by the system; 4. storing the packaged files, registering the files in a database, and not repeatedly exporting the questions when exporting the questions next time; 5. when the file is returned to the front end for a user to download and introduce the game questions created by the manager: 1. the system receives a game question file uploaded by a user; 2. decompressing the uploaded file by using a key configured by the system, and checking whether the data file related to the title accords with the specification of the current system version; 3. analyzing the configuration file of the title, importing and registering the related title file into a system, adding the analyzed title data into a system database, and associating the file with a virtual machine file; 4. check if there is missing data in the database and provide default values for non-critical data fields.
The topic example management module:
the topic instance management module is used for managing the created topic instance.
In the system, a game question instance is created by game question configuration, UUID, virtual machine names, associated game questions, users to which the game questions belong, mac addresses, IP addresses, bridging network ports, states and other information are stored, the specific network cards used by the instance are designated by the bridging network ports, the parameters can be configured, a complex attack and defense network environment can be built by combining other instances, the users are bound with owners of the current instance, and when a team attack is successful, the attribution right of the instance is automatically obtained.
The match management module:
the game management module is used for creating a specific game.
In the system, the competition management module is managed by an administrator, and can associate the competition questions and competition users needed in the competition with the competition, set the competition introduction, the competition round, the round time, whether the competition is open or not and other information at the same time, only players participating in the competition can join the competition, the competition can be initialized once before starting, a unique example is created according to each competition player, a hand selecting network section is allocated at the same time, the administrator can finish, pause and resume the competition process in advance in the competition process, and the competition can also provide the selection of manual starting and timing starting according to the competition time.
Flag management module: the Flag management module uses certificates submitted after the target server is acquired by the competitor management party.
In the system, a Flag management module in an AWD module provides an interface for acquiring the Flag, and a server only responds to the correct Flag by initiating a request through a machine IP of a game question instance created by a game, and a user submitting the Flag can acquire the attribution authority of a specific game question server.
And a flow management module: the flow management module is used for recording scores acquired by the competitors.
In the system, a flow management module in the AWD/CTF records the number of server authorities and scores acquired by players, and then carries out real-time ranking according to the scores.
And a flow monitoring module: the flow monitoring module is used for recording player network flow.
In the system, the flow management records and analyzes player flow records and connection conditions in the AWD/CTF competition.
And a flow analysis module: the flow management module is used for recording player network flow.
In the system, the flow analysis module is used for analyzing the specific attack target of players in the AWD/CTF competition and the used attack mode.
Flow dynamic display module: the flow management module is used for analyzing and displaying player network flow.
In the system, the flow dynamic display module is used for displaying the recorded competition flow after cleaning to a large screen and visualizing the competition attack process and the war condition.
The foregoing describes one embodiment of the present invention in detail, but the description is only a preferred embodiment of the present invention and should not be construed as limiting the scope of the invention. All equivalent changes and modifications within the scope of the present invention are intended to be covered by the present invention.

Claims (9)

1. An AWD attack and defense platform, comprising:
and (3) a user module: the method comprises the steps of creating registered player information, checking account password information of a user and managing user information;
AWD module: the method is used for editing and modifying the game questions, managing the created game question examples and creating specific games;
a CTF module;
and a flow management module: the method is used for recording and analyzing the player flow recording and connection conditions in the AWD/CTF competition.
2. An AWD attack and defense platform according to claim 1 wherein the user module comprises:
a user registration module: for creating registered player information;
a user login module: the user login module is used for verifying account password information of a user and verifying the validity of a user name and a password;
and the user information management module: the user information management module is used for editing and modifying information such as personal information nicknames and the like by users.
3. The AWD attack and defense platform of claim 1, wherein the AWD module comprises:
the topic management module: the method is used for updating, exporting and editing the game questions;
the topic example management module: the system comprises a user interface, a virtual machine name, a network interface and a state information, wherein the user interface is used for managing a created game question instance, the game question instance is created by game question configuration, the created game question instance stores a generated UUID, a virtual machine name, an associated game question, a user to which the game question belongs, a Mac address, an IP address, the network interface and the state information, the network interface designates a specific network card used by the instance, a complex attack and defense network environment can be built by configuring the parameter and combining other instances, the user is bound with an owner of the current instance, and when a certain team attack is successful, the attribution right of the instance is automatically obtained;
the match management module: the system comprises a game management module, a game management module and a game management module, wherein the game management module is used for managing by an administrator, creating a game in advance, associating AWD/CTF (automatic thread/computer program function) game questions and users needed in the game into the game, and automatically starting the associated game questions when the game starts to create a game question instance;
and a flow management module: the server authority number and the score obtained by the player are recorded, and then real-time ranking is carried out according to the score.
4. An AWD attack and defense platform according to claim 3, wherein the AWD module further comprises a Flag management module, the Flag management module is configured to manage certificates submitted after the competitor obtains the target server, the Flag management module provides an interface for obtaining a Flag, only if a machine IP initiation request of a game question instance created by a game proves that other players have attacked the machine, the server will respond to returning a correct Flag, a user submitting the Flag will obtain the attribution authority of the corresponding game question server, meanwhile, the user will increase the score of the corresponding game question, the user cannot repeatedly submit the Flag attributed to the server, and the abnormally submitted Flag will be detected and recorded in an abnormal log.
5. The AWD attack and defense platform of claim 1, wherein the traffic management module comprises:
and a flow monitoring module: the method is used for recording player network traffic and analyzing player traffic recording and connection conditions in the AWD/CTF competition;
and a flow analysis module: the method is used for recording player network traffic, analyzing the target of player specific attack in the AWD/CTF competition and the used attack mode;
flow dynamic display module: the player network flow analysis and display device is used for analyzing and displaying player network flow, cleaning recorded game flow, displaying the game flow on a large screen and visualizing a game attack process and a battle condition.
6. The AWD attack and defense platform of claim 2, wherein in the user registration module, the user submits his identity information to complete player registration when participating in the game for the first time, the identity information including mailbox information, user personal profile, user name, user password.
7. The AWD attack and defense platform according to claim 3, wherein in the game question management module, the editing of the game questions includes adding, deleting and modifying, setting system prepositive parameters such as title, description, basic score, image file, operating system type, CPU core number, memory size, system user name, etc. of the game questions, and controlling various resources allocated in the process of instance generation.
8. An AWD attack and defense platform according to claim 3, wherein in the game question management module, the specific deriving process includes:
extracting each item of configuration information of the title, and writing the configuration information into a configuration file according to a preset format;
collecting a virtual machine file related to the title;
classifying and packaging the configuration files and the virtual machine files in the same folder, and encrypting the compressed package by using a key configured by the system;
storing the packaged files, registering the files in a database, and not repeatedly exporting the questions when exporting the questions next time;
and returning the file to the front end for downloading by the user.
9. The AWD attack and defense platform according to claim 3, wherein in the game question management module, the specific importing process includes:
the system receives a game question file uploaded by a user;
decompressing the uploaded file by using a key configured by the system, and checking whether the data file related to the title accords with the specification of the current system version;
analyzing the configuration file of the title, importing and registering the related title file into a system, adding the analyzed title data into a system database, and associating the file with a virtual machine file;
check if there is missing data in the database and provide default values for non-critical data fields.
CN202310278355.6A 2023-03-21 2023-03-21 AWD attacks and defends platform Active CN116248411B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310278355.6A CN116248411B (en) 2023-03-21 2023-03-21 AWD attacks and defends platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310278355.6A CN116248411B (en) 2023-03-21 2023-03-21 AWD attacks and defends platform

Publications (2)

Publication Number Publication Date
CN116248411A true CN116248411A (en) 2023-06-09
CN116248411B CN116248411B (en) 2024-02-23

Family

ID=86624230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310278355.6A Active CN116248411B (en) 2023-03-21 2023-03-21 AWD attacks and defends platform

Country Status (1)

Country Link
CN (1) CN116248411B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116866085A (en) * 2023-09-01 2023-10-10 合肥天帷信息安全技术有限公司 Network security exercise management analysis method, device and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874245A (en) * 2017-02-15 2017-06-20 南京赛宁信息技术有限公司 A kind of online competition platform dynamic Flag processing method and processing devices of CTF
CN107179938A (en) * 2017-05-12 2017-09-19 北京理工大学 A kind of information security technology contest attacking and defending environment automatic deployment method
KR101918546B1 (en) * 2017-11-28 2018-11-14 주식회사 시큐센 Hacking Defense Contest System
CN108881212A (en) * 2018-06-12 2018-11-23 广州大学 A kind of CTF Attack Defence system and method close to real network environment
CN111786983A (en) * 2020-06-24 2020-10-16 国家计算机网络与信息安全管理中心 Construction method of virtualized attack and defense confrontation environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874245A (en) * 2017-02-15 2017-06-20 南京赛宁信息技术有限公司 A kind of online competition platform dynamic Flag processing method and processing devices of CTF
CN107179938A (en) * 2017-05-12 2017-09-19 北京理工大学 A kind of information security technology contest attacking and defending environment automatic deployment method
KR101918546B1 (en) * 2017-11-28 2018-11-14 주식회사 시큐센 Hacking Defense Contest System
CN108881212A (en) * 2018-06-12 2018-11-23 广州大学 A kind of CTF Attack Defence system and method close to real network environment
CN111786983A (en) * 2020-06-24 2020-10-16 国家计算机网络与信息安全管理中心 Construction method of virtualized attack and defense confrontation environment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
冯一凡;朱文龙;杨双双;: "基于Docker的分布式网络安全攻防平台设计与实现", 计算机产品与流通, no. 03 *
贾丛飞: "网络空间安全对抗演练方法研究", 中国优秀硕士学位论文全文数据库 信息科技辑, pages 3 - 5 *
黄君阳;莫永华;: "网络攻防竞赛平台的设计与实现", 现代计算机(专业版), no. 36 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116866085A (en) * 2023-09-01 2023-10-10 合肥天帷信息安全技术有限公司 Network security exercise management analysis method, device and medium

Also Published As

Publication number Publication date
CN116248411B (en) 2024-02-23

Similar Documents

Publication Publication Date Title
CN106874245B (en) Dynamic Flag processing method and device for CTF online competition platform
US11666817B2 (en) Mission-based, game-implemented cyber training system and method
JP6818033B2 (en) Mission-based, game-enabled cyber training systems and methods
KR100638071B1 (en) Multi-user application program interface
CN106326113B (en) A kind of game data monitoring method and device
JP2009504348A5 (en)
CN116248411B (en) AWD attacks and defends platform
CN111209089B (en) CTF competition online environment class title safety deployment method
CN104935558B (en) A kind of network user fast registers and login method and system
CN106823376A (en) A kind of method and device for realizing user's matching
Raj et al. Scalable and lightweight {CTF} infrastructures using application containers (pre-recorded presentation)
CN106339613A (en) Application data processing method, terminal and server
Childers et al. Organizing large scale hacking competitions
CN113676363B (en) Network target range flow generation system and method
CN107493326B (en) Network voting processing method, device, server and computer readable storage medium
CN106390459A (en) A game data acquiring method and device
JP2014039639A (en) Game system and method for controlling parameter thereof
CN105022939B (en) Information Authentication method and device
KR101487077B1 (en) Game system and control method thereof
CN106789233A (en) A kind of automatic scoring method and device of network-combination yarn experiment porch
CN114328217A (en) Application testing method, device, equipment, medium and computer program product
CN112675543A (en) Role attribute configuration method and device, storage medium and electronic device
CN115225410A (en) Independent dynamic network security shooting range system, device and application method thereof
CN104717305B (en) A kind of online network security competition method and system based on Internet
Haines et al. 1999 DARPA intrusion detection evaluation: Design and procedures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant