引用本文
  • 方滨兴,贾焰,李爱平,张伟哲.网络空间靶场技术研究[J].信息安全学报,2016,1(3):1-9    [点击复制]
  • FANG Binxing,JIA Yan,LI Aiping,ZHANG Weizhe.Cyber Ranges: state-of-the-art and research challenges[J].Journal of Cyber Security,2016,1(3):1-9   [点击复制]
【打印本页】 【下载PDF全文】 查看/发表评论下载PDF阅读器关闭

←前一篇|后一篇→

过刊浏览    高级检索

本文已被:浏览 16075次   下载 33440 本文二维码信息
码上扫一扫!
网络空间靶场技术研究
方滨兴1,2,3, 贾焰2, 李爱平2, 张伟哲3
0
(1.北京邮电大学 北京 中国 100876;2.国防科技大学计算机学院 长沙 中国 410073;3.哈尔滨工业大学计算机科学与技术学院 哈尔滨 中国 150001)
摘要:
网络靶场已经成为支撑网络空间安全技术验证、网络武器试验、攻防对抗演练和网络风险评估的重要手段。本文首先介绍了网络靶场国内外研究现状;然后介绍了靶场相关技术的研究进展,包括大规模网络仿真、网络流量/服务与用户行为模拟、试验数据采集与评估、系统安全与管理等方面;最后阐述了网络靶场发展面临的挑战与发展趋势。
关键词:  网络靶场  网络仿真  用户行为模拟  数据采集与分析  安全与管理
DOI:10.19363/j.cnki.cn10-1380/tn.2016.03.001
投稿时间:2016-03-28修订日期:2016-06-28
基金项目:
Cyber Ranges: state-of-the-art and research challenges
FANG Binxing1,2,3, JIA Yan2, LI Aiping2, ZHANG Weizhe3
(1.Beijing University of Posts and Telecommunications, Beijing 100876, China;2.School of Computer, National University of Defense Technology, Changsha 410073, China;3.School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China)
Abstract:
Cyber Range has become a very important means to support tasks such as network security technology validation, network weapon testing, training of network attack and defense, and network risk assessment etc. In this survey, we first give an overview of the current research works in the field of Cyber Range, including both domestic and international contributions; secondly, state-of-the-art techniques of Cyber Range is described, including large-scale network simulation, network traffic/service and user behavior simulation, acquisition and analysis of testing data, and system security and management etc.; finally, we concluded the paper by discussing the challenges and trends of Cyber Range.
Key words:  cyber range  network simulation  user behavior simulation  data acquisition and analysis  system security and management