Font Size: a A A

Design And Implementation Of The Equipment Cyber Range

Posted on:2021-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:S JiangFull Text:PDF
GTID:2392330620472174Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the popularization and rapid development of information technology,Weaponry is increasingly dependent on computer and network.It is possible for the enemy to disrupt and destroy our military equipment through cyber-attacks.This paper is based on the network security construction needs of the navy’s ship-borne weapons and equipment,with aiming at the characteristics of ship-borne equipment network,the design and implementation of the equipment cyber range are carried out by combining cloud computing and virtualization technology.With testing the security of ship-borne weapon and equipment network which the virtuality and reality combination,the ability of anti-network attack is tested and the security risk of ship-borne weapons and equipment is assessed,which was of great significance for the navy to strengthen the network security design of weapons and equipment and to enhance the capability of cyberspace warfare.According to the above research background,this paper has done the following work:(1)The paper summarized the key technologies involved in the equipment cyber range,including the test platform construction technology、large-scale target network environment construction technology,object network environment construction technology,resource management technology,test process control technique,equipment network security assessment technology and so on.On this basis,some study and analysis the mechanism of virtualization technology applied to cloud platform,resource management,target network construction and other aspects has been done,which laid the technical foundation for completing the overall design of the equipment cyber range.(2)The overall scheme design and the function design of each subsystem of the equipment network range are completed to provide the basis for the construction of the test environment and the realization of the system,with dividing the cyber range into six parts:cloud platform,attack and defense counter application,threat access control,security assessment,situation display,and test guide subsystem.According to the actual situation of ship-borne equipment,a new idea of building a ship-borne weapon control system based on the combination of virtual and real is proposed to provide reasonable and effective evaluation objects,with network nodes,functional applications,and traffic simulated and the network topology simplified(3)With the experimental environment construction and link test of equipment network range completed and the basic functions of the design scheme realized,three realistic representative attack methods,such as ARP attack,PLC attack,U disk attack,are selected as the means to test the target network security of a type of ship-borne weapon,which could evaluate its safety status and analyze possible consequences.
Keywords/Search Tags:Cyber range, Security evaluation, Virtualization technology, Cloud computing, Ship-borne equipment
PDF Full Text Request
Related items