Font Size: a A A

Design And Implementation Of A Testing Platform For Cyber Attack

Posted on:2016-05-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y F ZhangFull Text:PDF
GTID:2308330482451148Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology and communications equipment, people increasingly enjoy and rely on the service supported by a variety of information system. However, a large number of security risks and threats of information system have appeared attribute to the opening and sharing of Internet. In order to improve the safety of information system, government is establishing and perfecting a mechanism called "Information System Classified Security Protection" to protect the information and the information carrier according to the importance level.This paper statement the significant of testing and assessment with "Information System Classified Security Protection". Because network security is a very important component of information security. This paper introduce the basic types and their principle. This paper analyse and design a testing platform based TCP/IP protocol for cyber attack to help information system owner self-checking and provide testing reference. This paper analyse and summary the platform, and review the defects and improvement advisement.In this paper, the main work done as follows:(1) This paper has analysed the process of the "testing and assessing". Through coding and using the popular tools of network attack design a function to promote efficiency of testing.(2) This paper has researched the assessing algorithm. Choosing different weight parameter due to the difference of the computing and network resource that testing need. To promise conclusion is correct and actual.(3) This paper provide a range of mechanism to monitor. Through monitor the goal address of data package that platform sending ensure only test the target and do not impact other system.It could help them grading fitful and strengthening the weaknesses of information system according to the owner of information system use this platform to test themselves. At the same time providing evaluation reference for testing person.
Keywords/Search Tags:Information security level protection, Network security, Testing platform
PDF Full Text Request
Related items