Abstract
This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical framework of the system and the experimental process and technical principle of the platform. The experiment platform can provide more than 20 attack classes. Using the virtualization technology can build hypothesized target of various types in the laboratory and diversified network structure to carry out attack and defense experiment.
Highlights
Information security technology is the discipline that all sectors of society pay attention to at the present stage
This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical framework of the system and the experimental process and technical principle of the platform
Using the virtualization technology can build hypothesized target of various types in the laboratory and diversified network structure to carry out attack and defense experiment
Summary
Information security technology is the discipline that all sectors of society pay attention to at the present stage. It is difficult for experiment teaching of network security courses to finish in real network environment. The network security attack and defense platform based on virtualization provides new thoughts for experiment teaching of information security [1] [2]. The existing network attack and defense teaching and training products based on virtual simulation technology promote experiment and research on network security, but it has the following problems: 1) because of the complexity and diversity of the real network environment, it is difficult to realize the simulation of diversified network topology and attack and defense scenes by only relying on virtualization technology or hardware equipment [3]; 2) the remote attack and defense experiment cannot be conducted through network, and the use ratio of experimental facilities is low [4].
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have