Font Size: a A A

Design And Implementation Of Network Attack Simulation Platform

Posted on:2022-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:C H ZhangFull Text:PDF
GTID:2518306524492394Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
Attack simulation and test have become the research focus of network security for the problem that attack data is difficult to obtain and attack behavior is difficult to detect.Attack testing uses penetration tools to launch attacks on the target system and proactively analyze weaknesses and technical flaws in the system.Among the many penetration tools,low automation,low scanning efficiency,complex module operations,few types of simulation attacks,and fuzzy attack targets are common,which ultimately lead to poor penetration effects.In response to current problems,based on penetration technology,distributed technology,Kafka message system,path optimization,etc.,a network attack simulation platform was designed and implemented to provide a richer attack behavior and data for the network detection system.The specific work content is as follows:1.We propose an optimal attack path generation algorithm for network vulnerability.Through the dynamic collection of target network vulnerability information,combined with CVSS vulnerability scores,the difficulty of the target network vulnerability exploitation is evaluated,the network vulnerability topology map is generated,and the optimal attack path is formed based on the path generation algorithm.2.We design a network attack traffic simulation algorithm.Based on the analysis of the statistical distribution characteristics of the attack traffic,combined with the traditional intrusion detection system rule set,the simulation traffic generation rule set is established.We can generate simulation traffic data close to the actual attack traffic through the network traffic generation tool.3.We design and implement an attack simulation system.The client provides a visual interface,the server processes the data requested by the client,the attack hosts process the attack tasks of the server,and the storage host storages system operation and other information.The attack path generation module uses the information collected by the information collection module,vulnerability database,CVSS score and other information to generate the optimal attack path;the command parsing module receives the request parameters of the client and verifies the validity of the parameters,and finally returns the response to the client;The task scheduling module distributes the task issued by the client to the attack hosts reasonably;the information collection module collects information such as ports,hosts,operating systems,vulnerabilities,etc.;traffic simulation module generates attack simulation traffic data;the penetration attack module uses the Metasploit to carry out the penetration attack.4.Through the test of the system,the features of the platform's functions and performance are analyzed,which proves that it can effectively perform attack simulation tests,provide various network detection systems with effects that are close to real attack scene,and further promote the development of network attack detection technology research and design.
Keywords/Search Tags:network attack, topology map, attack path, attack traffic generatio
PDF Full Text Request
Related items