期刊文献+

网络攻防模拟实验平台的设计与实现 被引量:9

Design and Implementation of Simulation Experiment Platform for Network Offense & Defense
原文传递
导出
摘要 针对网络攻防环境难以构建的难题,提出了基于虚拟环境的网络攻防模拟实验平台,给出了模拟实验平台的组成结构,分析了在该平台上开展网络攻防模拟实验过程和系统运行机制。分别对网络攻击子系统和网络防护子系统进行了详细设计,研究了两个子系统中采用的关键技术及实现方法。通过采用虚拟机技术,在服务器上虚拟出网络攻击和网络防护子系统,能够实现当前绝大多数的网路攻击操作以及网络防护的配置管理,能够为用户提供功能更为全面、性能更为优越、仿真程度更为逼真的网络攻防实验训练环境。 Aiming at the hard construction of network offense defense environment,a simulation experiment platform based on the virtual environment for network offense defense is proposed the components of the platform are given,and the experiment process and system operating mechanism of the simulation experiments on the platform also analyzed.In addition,the detailed design on the subsystems of network offense defense is expounded,the key technologies and implementation methods adopted in the two subsystems are described.By using virtual machine technology and virtualizing network attacks and protection sub-systems,the most current network attack operations and network protection configuration management could be achieved,thus to provide for the users a network offense defense experimental training environment with more comprehensive functions,more excellent performance,and more realistic simulation degree.
作者 孔轶艳
出处 《通信技术》 2012年第11期37-39,43,共4页 Communications Technology
基金 广西新世纪教改工程项目--高职院校信息安全专业课程体系建设研究(No.2012JGB327) 柳州职业技术学院教改工程项目--面向应用型的网络技术专业人才培养模式研究(No.2011-B003)
关键词 实验平台 网络攻防 模拟 虚拟环境 组成结构 experiment platform network offense & defense simulation virtual environment composition structure
  • 相关文献

参考文献13

二级参考文献61

共引文献113

同被引文献50

  • 1华三通信技术有限公司.设备管理控制台(DMC)技术介绍[E13/OL].杭州:杭州华三通信技术有限公司,[2009-04-27].http://www.h3c.com.cn/products-technology/technology/system-management/other-technology/tech-nology_recommend/200904/632643-30003-0.htm. 被引量:1
  • 2Yuan E, Tong Jing. Attribute Based Access Control(ABAC) for Web Services[C].Proc. of the IEEE International Conference on Web Services. Piscataway, USA: IEEE Computer Society, 2005:561-569. 被引量:1
  • 3Perlman R. An Overview of PKI Trust Models[J]. IEEE Network, 1999, 13(6): 38-43. 被引量:1
  • 4Lang Bo, Foster I, Siebenlist F, et al. Attribute Based Access Control for Grid Computing[EB/OL].ftp://info.mcs.anl.gov/ pub/tech_reports/ reports/P1367.pdf, 2006-04-25. 被引量:1
  • 5Park J S, Sandhu R. Smart Certificates: Extending X.509 for Secure Attribute Service on the Web[C].Proc. of National InformationSystems Security Conference. Arlington, USA: [s. n.], 1999:340-346. 被引量:1
  • 6OASIS. eXtensible Access Control Markup Language(XACML) Version 2.0[EB/OL].docs.oasis-open.org/xacml/2.0/ access_control-xacml-2.0- core-spec-os.pdt, 2005-02-01. 被引量:1
  • 7Ragsdale D J, Surdu J R, Carver C A.Information assurance education through active leaming[R].The IWAR Laboratory, 2002. 被引量:1
  • 8de Vivo M, de Vivo G O, Isern G.Internet security attacks at the basic levels[J].Operating Systems Review, 2002, 32(2):111-116 . 被引量:1
  • 9Teo L, Zheng Y, Ahn G.Intrusion detection force: an infrastructure for internet- scale intrusion detection[C].Proceedings of the First IEEE International Workshop on Information Assurance(IWIA'03) , Darmstadt, Germany, 2003:73- 91. 被引量:1
  • 10BJORLIN M.A study of modeling and simulation for computer and network security[R].Stockholm: University of Stockholm / Royal Instituteof Technology, 2005. 被引量:1

引证文献9

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部