期刊文献+

网络信息安全测试平台设计与实现 被引量:7

Design and Implementation of Network Information Security Testing Platform
下载PDF
导出
摘要 网络信息已经成为人们日常工作和生活的重要载体,在给人们带来便利的同时,其安全防护也面临日趋严重的挑战.分析了网络信息存在的主要安全问题和面临的威胁的主要来源,针对传统的网络信息安全测试平台存在的不足,提出了一种新型的、基于控制与实验相互分离的双层网络信息安全测试系统平台的设计方案.该系统能够快速地、可重复地、自动化地部署研究人员所需要的测试环境.文中详述了系统的工作原理和功能架构,并在最后对系统的部分功能进行的验证展示. Network information has become an important part of people's daily work and life. With the rapid development of computer technology and network technology, network information security is facing more and more serious threats. This paper analyzes the problems of network information security and the main threats. For the shortcomings of the traditional network information security testing platform, this paper proposes a new type of double-layer network information security testing platform, in which control net- work and experimental network are separated from each other based on the design solutions. In the system, testing environments will be rapidly, automated deployed and repeatable. This paper details the system working principle and functional architecture, and in the last part verifies and shows some of the system function.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第10期2304-2309,共6页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划项目(2012AA012600 2012AA01A401 2012AA01A402)资助 国家自然科学基金项目(60933005)资助 国家科技支撑计划项目(2012BAH38B-04 2012BAH38B06)资助 国家"二四二"信息安全计划项目(2011A010)资助
关键词 网络信息安全 网络攻防 仿真测试 network information security network attack and defense simulation and analysis
  • 相关文献

参考文献15

  • 1DARPA. The ns manual [EB/OL]. http://www.isi. edu/nsnam/ns/doc/ns_doc. pdf. November,2011.
  • 2Hibler M, Stoller L, Lepreau J, et al. Fast, scalable disk imaging with frisbee [C]. In Proceedings of the 2003 USENIX Annual Technical Conference ,2003 :283-296.
  • 3Ward B. Book of vmware- the complete guide to VMware workstation[M]. Berkeley ,CA:No Starch Press ,2002.
  • 4Analysis and prevention of network and information security prob lems [EB/OL]. http://www.studa.net/network/100521/1116389. html,2010.
  • 5Goel, Sanjay. Cyberwarfare , connecting the dots in cyber intelligence[J]. Communications of the ACM,2011 ,54(8) : 132-140.
  • 6Global Payments cops to 1.5 million total on credit card breach [EB/OL]. http://www.infosecurity-magazine.comlview/24914/ globalpayments-cops-to-15-million-total-on-credit-card-breachl ,2012.
  • 7Dolgikh A, Nykodym T, Skormin V, et al. Computer network testbed at binghamton university [C]. Military Communications Conference,2011-MILCOM 2011 ,IEEE ,2011 : 1146-115l.
  • 8Tanimoto S,et al. VLAN control system and method[P]. U. S. Patent:6075776,2000.
  • 9J Bamford R, Butler D, Boris Klots, et al. Architecture of oracle parallel server [C]. Proceedings of the 24th International Conference on Very Large Data Bases, August 24-27, 1998 :669-670.
  • 10Wang Pei-guo,Fan Jiong. Network information system security risk analysis and countermeasures [J]. Communications and Information Technology 3,2011 (3) :86-88.

二级参考文献2

共引文献8

同被引文献18

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部