首页 | 本学科首页   官方微博 | 高级检索  
     

网络靶场及其关键技术研究
引用本文:李馥娟,王群.网络靶场及其关键技术研究[J].计算机工程与应用,2022,58(5):12-22.
作者姓名:李馥娟  王群
作者单位:江苏警官学院 计算机信息与网络安全系,南京 210031
基金项目:江苏省高校自然科学研究重大项目;江苏省高校优秀科技创新团队
摘    要:网络靶场是用于网络空间安全研究,利用计算机仿真技术创建的高度近似于真实网络空间运行机制的可信、可控、可定制的重要基础设施。结合网络空间安全发展态势,归纳分析并重新定义了网络靶场的概念,提出了网络靶场的基本服务能力。立足体系结构、实现技术和功能需求等属性特征,选择目前具有代表性的典型网络靶场进行了分析。在此基础上,重点从大规模网络仿真、网络流量模拟及用户行为模拟等方面,讨论了网络靶场的关键技术。着重从技术和应用方面讨论了网络靶场的发展过程与趋势,并对我国网络靶场的现状与发展作了必要探讨。

关 键 词:网络空间安全  网络靶场  攻防演练  网络仿真  

Research on Cyber Ranges and Its Key Technologies
LI Fujuan,WANG Qun.Research on Cyber Ranges and Its Key Technologies[J].Computer Engineering and Applications,2022,58(5):12-22.
Authors:LI Fujuan  WANG Qun
Affiliation:Department of Computer Information and Cybersecurity, Jiangsu Police Institute, Nanjing 210031, China
Abstract:The cyber range is a credible,controllable,and customizable key infrastructure which is used for cyberspace security research and uses computer simulation technology to create the high similarity real cyberspace operating mechanism.First of all,the concept of cyber range is summarized,analyzed and redefined,the basic service capabilities of cyber range are proposed combined with the development trend of cyberspace security.Then the representative typical selected cyber ranges which based on the characteristics of architecture,implementation technology and functional requirements are analyzed.The key technologies of the cyber range are discussed mainly from the aspects of large-scale network simulation,network traffic simulation and user behavior simulation on this basis.Lastly,the development process and trend of the cyber range is discussed from the aspects of technology and application,in addition,the current situation and development of the cyber range in China is explored.
Keywords:cyberspace security  cyber range  attack and defense confrontation exercises  network simulation
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号