Font Size: a A A

The Research On Cyberspace Security & Countermeasures Simulation Methods

Posted on:2017-01-28Degree:MasterType:Thesis
Country:ChinaCandidate:C F JiaFull Text:PDF
GTID:2308330503958198Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Internet is facing more and more serious security problems and the shortage of network security professionals. How to cultivate the professionals rapidly is a severe problem to be solved. Cyberspace security confrontation simulation is a rapid method to severe security professionals and to improve the ability of security technology. Confrontation simulation makes the athletes assess to a premade network. Athletes can attack against each other in this target network. Now the general security competitions take this approach to investigate and evaluate the contestants. In those security competitions, the confrontational model should be improved in the deployment of network automatically, the architecture of target network, the effect of the evaluation and the visualization of results.Nowadays network security competitions are mainly consist of four models, including point-to-point confrontation, one-way attack, public positional inter-attack and private positional inter-attack. According to characteristics of the athletes and the target network, there are two mainly classification methods which are based on the athletes’ character classified as single role and dual role model, based on the target network classified as the single level and multi-level model. A dual role of multi-level network confrontation simulation model is proposed and constructed. In this model the athletes act as both attacker and defender. The target network are consist of public and private positions. The architecture of target network is the same as real network in the Internet. Flexible strategies can be used during the competition. The method of evaluation makes athletes confront actively.In view of the existing information security competition system, there are problems of high proportion of manual configuration, shortage of management function and high dependency on hardware. A cyberspace security confrontation simulation system based on cloud computing and virtualization are designed and constructed. The system is mainly consist of three sub-systems, such as the management of challenge, the deployment of target network and the management of competition. In those sub-systems, the management of challenge can manage various types of challenges, including choice, sub-item challenge and multiple challenge. The deployment of network can deploy the network speedily in a low power consumption and divide the network flexibly. The management of contest including user management, score management, can effectively reduce the cost of competition management. The problem, which the network is highly depended on the hardware, is successfully solved by cloud computing and virtualization. The system had been stably used in the Information Security and Countermeasures Contest at 2014 and 2015, which meant that the system was highly reliable and suitable.
Keywords/Search Tags:information security and countermeasures contest, ISCC, countermeasures simulation, cyberspace security, information security
PDF Full Text Request
Related items