CN114327757A - Network target range tool delivery method, device, equipment and readable storage medium - Google Patents
Network target range tool delivery method, device, equipment and readable storage medium Download PDFInfo
- Publication number
- CN114327757A CN114327757A CN202111571064.3A CN202111571064A CN114327757A CN 114327757 A CN114327757 A CN 114327757A CN 202111571064 A CN202111571064 A CN 202111571064A CN 114327757 A CN114327757 A CN 114327757A
- Authority
- CN
- China
- Prior art keywords
- tool
- virtual machine
- target virtual
- tool software
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
- Stored Programmes (AREA)
Abstract
The application provides a network target range tool delivery method which is applied to first physical equipment, wherein the first physical equipment comprises a host machine and at least one set of deployed virtual machines, based on the method, the host machine is utilized to receive tool software of a target virtual machine sent by second physical equipment, the tool software is transmitted to a specified directory of the target virtual machine through a file system hardware interface of the host machine, and then the target virtual machine is utilized to poll and scan the specified directory so as to obtain the tool software from the specified directory. According to the method and the device, efficient transmission of the tool software can be achieved through a file system, transmission requirements under the conditions that a network cannot be reached and the like can be met, efficient installation and deployment of the tool software are achieved through the method, and user experience is improved. The application also provides a network shooting range tool delivery device, equipment and a readable storage medium.
Description
Technical Field
The present application relates to the field of network security, and in particular, to a method, an apparatus, a device, and a computer-readable storage medium for delivering network shooting range tools.
Background
The network target range is a technology or a product for simulating and reproducing the running states and running environments of network architecture, system equipment and business processes in a real network space based on a virtualization technology. Network shooting ranges have become an essential network space security core infrastructure for network space security research, learning, testing, verification, drilling and the like in various countries. Network shooting ranges are highly valued in all countries in the world and are used as important means for safety capacity construction support.
The network architecture, the service system, the access behavior and the like in the network shooting range are mainly realized by a virtualization technology, and how to efficiently transmit and manage auxiliary tool software required by a network environment based on the virtualization technology is a technical difficulty which is urgently needed to be solved at present because the auxiliary tool is used as the basic capability of a network shooting range platform. However, in the prior art, in the case of the inaccessible state of the network and the multi-layer network, the rapid transfer of the auxiliary tool software cannot be realized, and a real-time method for directly deploying the tool software to the virtual machine is lacked.
Disclosure of Invention
The application provides a network shooting range tool delivery method, a device, equipment and a computer readable storage medium, which can quickly transfer network shooting range tool software.
In a first aspect, the present application provides a network shooting range tool delivery method, which is applied to a first physical device, where the first physical device includes a host and at least one deployed set of virtual machines, and the method includes:
receiving tool software of a target virtual machine sent by second physical equipment by using the host machine, and transmitting the tool software to a specified directory of the target virtual machine through a file system hardware interface of the host machine, wherein the tool software is network target range tool software;
and polling and scanning the specified directory by using the target virtual machine so as to acquire the tool software from the specified directory.
Optionally, a file synchronization module is deployed on the host, and the file synchronization module communicates with a tool management center of the second physical device; the receiving, by the host machine, the tool software of the target virtual machine sent by the second physical device includes:
and receiving the tool software of the target virtual machine sent by the tool management center by using a file synchronization module of the host machine.
Optionally, the method further includes:
and based on a safety control strategy issued by the tool management center, regularly cleaning the file directory on the host machine by using a file synchronization module of the host machine.
Optionally, the method further includes:
receiving a deployment script sent by the tool management center while the host receives the tool software, so that the host transmits the tool software and the deployment script together to a specified directory of the target virtual machine;
and after the target virtual machine acquires the tool software and the deployment script from the specified directory, executing the deployment script to install the tool software, and feeding back the script execution condition to the tool management center.
Optionally, a tool client module is deployed on the target virtual machine, and the tool client module communicates with a tool management center of the second physical device; the method further comprises the following steps:
and sending the user information of the target virtual machine to the tool management center by utilizing the tool client module, so that the tool management center sends the tool software of the target virtual machine to the host machine after the user information is authenticated.
Optionally, the polling and scanning the specified directory by using the target virtual machine includes:
and polling and scanning the specified directory by utilizing a tool client module of the target virtual machine.
Optionally, the method further includes:
and after the tool software is installed on the target virtual machine, deleting the tool software by using a tool client module of the target virtual machine.
In a second aspect, the present application provides a network shooting range tool delivery apparatus, which is applied to a first physical device, where the first physical device includes a host and at least one deployed set of virtual machines, and the apparatus includes:
the tool software transmitting unit is used for receiving tool software of a target virtual machine sent by second physical equipment by using the host machine and transmitting the tool software to a specified directory of the target virtual machine through a file system hardware interface of the host machine, wherein the tool software is network target range tool software;
and the tool software acquisition unit is used for polling and scanning the specified directory by using the target virtual machine so as to acquire the tool software from the specified directory.
Optionally, a file synchronization module is deployed on the host, and the file synchronization module communicates with a tool management center of the second physical device; the tool software transmission unit is specifically configured to receive, by using the file synchronization module of the host, the tool software of the target virtual machine sent by the tool management center.
Optionally, the apparatus further comprises:
and the directory cleaning unit is used for regularly cleaning the file directory on the host machine by utilizing the file synchronization module of the host machine based on the security control strategy issued by the tool management center.
Optionally, the apparatus further comprises:
the script receiving unit is used for receiving the deployment script sent by the tool management center while the host machine receives the tool software, so that the host machine can transmit the tool software and the deployment script to the specified directory of the target virtual machine;
and the script execution unit is used for executing the deployment script to install the tool software after the target virtual machine acquires the tool software and the deployment script from the specified directory, and feeding back the script execution condition to the tool management center.
Optionally, a tool client module is deployed on the target virtual machine, and the tool client module communicates with a tool management center of the second physical device; the device further comprises:
and the user authentication unit is used for sending the user information of the target virtual machine to the tool management center by using the tool client module so that the tool management center sends the tool software of the target virtual machine to the host machine after the user information is authenticated.
Optionally, the tool software obtaining unit is specifically configured to poll and scan the specified directory by using a tool client module of the target virtual machine.
Optionally, the apparatus further comprises:
and the tool deleting unit is used for deleting the tool software by using a tool client module of the target virtual machine after the tool software is installed on the target virtual machine.
In a third aspect, the present application provides an electronic device, comprising: a processor, a memory;
the memory for storing a computer program;
the processor is used for executing the network shooting range tool delivery method by calling the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the network range tool delivery method described above.
In the technical solution provided by the application, the method is applied to a first physical device, where the first physical device includes a host and at least one set of deployed virtual machines, and based on this, the host is used to receive tool software of a target virtual machine sent by a second physical device, and the tool software is transferred to a specified directory of the target virtual machine through a file system hardware interface of the host, and then the target virtual machine is used to poll and scan the specified directory to obtain the tool software from the specified directory. According to the method and the device, efficient transmission of the tool software can be achieved through a file system, transmission requirements under the conditions that a network cannot be reached and the like can be met, efficient installation and deployment of the tool software are achieved through the method, and user experience is improved.
Drawings
FIG. 1 is a schematic diagram of a network range tool delivery system shown in the present application;
FIG. 2 is a schematic flow chart illustrating a network range tool delivery method according to the present application;
FIG. 3 is a schematic diagram of the components of a network range tool delivery apparatus shown in the present application;
fig. 4 is a schematic structural diagram of an electronic device shown in the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The embodiment of the application provides a network shooting range tool delivery method, which is applied to first physical equipment, wherein the first physical equipment comprises a host and at least one set of deployed virtual machines. Specifically, the first physical device may be any physical computing node device in a network target range, on a set of physical hardware of the first physical device, a host system is run, and one or more sets of virtual machines are implemented on the host system through a virtualization technology; the virtual machine is an operating system and various application environments running on a virtualization technology (KVM), various software and hardware functions are realized through a full virtualization technology, the host machine is a basic operating system running on physical hardware, and the KVM technology and software on the host machine are the basis for running the virtual machine.
As shown in fig. 1, the network range tool delivery system is a schematic diagram, and the physical computing node a in fig. 1 is the first physical device in the embodiment of the present application.
In order to realize the rapid delivery of the network range tool (which is a component of an auxiliary tool which is a basic function of the network range), the efficient delivery of the network range tool can be realized through the interaction of a host machine and a virtual machine.
Referring to fig. 2, a schematic flow chart of a network range tool delivery method provided in an embodiment of the present application is shown, where an execution subject of the method is a first physical device, and the method includes the following steps:
s201: and receiving the tool software of the target virtual machine sent by the second physical device by using the host machine, and transmitting the tool software to the specified directory of the target virtual machine through a file system hardware interface of the host machine.
The tool software is network range tool software.
In this embodiment of the present application, the second physical device is another physical computing node device in the network target range, for example, the second physical device is a physical computing node B shown in fig. 1, a tool management center module may be deployed on the second physical device, and the tool management center module may be configured to formulate a delivery policy of the tool software, where the delivery policy includes an acquisition catalog and a deployment requirement of the configuration tool software/deployment script, and a configuration user category, an applicable scenario, and the like, and configure a security management and control policy, such as an expiration date and a policy destruction policy. That is, the tool management center module is used for daily management (such as addition, deletion, modification, and check) of the tool software, for specifying virtual machines, users, scenes, and the like to which the tool software is applicable, for issuing automated deployment scripts and verification measures of the tool software, for preventing leakage or managing and controlling measures, and for realizing who, when, on which virtual machine, rapid and effective delivery and deployment of the tool software are performed.
In the embodiment of the present application, as shown in fig. 1, a file synchronization module may be deployed on a host, and a tool client module may be deployed on a virtual machine, based on which, the tool management center module may communicate with the tool client module of the virtual machine (for example, under the condition that a network is accessible) and communicate with the file synchronization module of the host, so as to implement secure storage and transmission of tool software. The subsequent contents are introduced to the file synchronization module of the host machine and the tool client module of the virtual machine.
It should be noted that, since one or more sets of virtual machines may be running on the first physical device, any virtual machine that needs to install the tool software is defined as a target virtual machine.
In this step S201, for the tool software to be installed in the target virtual machine, the second physical device may transmit the tool software to a host where the specified target virtual machine is located through a network, and after the host obtains the tool software and performs security verification, the host sends the tool software to a specified target of the target virtual machine in a manner of a file system hardware interface, where the specified directory may be a default file directory of the target virtual machine.
In an implementation manner of the embodiment of the present application, since the host is deployed with the file synchronization module, and the file synchronization module can communicate with the tool management center of the second physical device, based on this, the step S201 of receiving, by using the host, the tool software of the target virtual machine sent by the second physical device may include: and receiving tool software of the target virtual machine sent by the tool management center by using a file synchronization module of the host machine.
In this implementation manner, regarding the file synchronization module deployed on the host, file transmission and synchronization between the host and the target virtual machine can be implemented through an Application Programming Interface (API), that is, based on a file system hardware Interface (similar to a usb disk or a mobile hard disk), without depending on a network architecture.
In an implementation manner of the embodiment of the present application, since the tool client module is deployed on the target virtual machine, based on this, the "polling and scanning the specified directory by using the target virtual machine" in this step S201 may include: and polling and scanning the specified directory by utilizing a tool client module of the target virtual machine.
In an implementation manner of the embodiment of the present application, since the target virtual machine is deployed with the tool client module, based on this, the embodiment of the present application may further include: after the tool software is installed on the target virtual machine, the tool software is deleted by using the tool client module of the target virtual machine. In the implementation mode, the tool client module can automatically patrol the tool software transmitted by the file synchronization module of the host, receive the deployment script, automatically install and deploy, and delete the tool software to avoid artificial leakage and transmission of the tool software.
S202: and polling and scanning the specified directory by using the target virtual machine to acquire tool software from the specified directory.
In the embodiment of the application, after the file synchronization module of the host machine transfers the tool software to the designated file directory of the target virtual machine, the tool client module of the target virtual machine can poll and scan the file directory of the tool client module to acquire the delivery condition of the tool software. When the tool software is scanned from the specified file object, the tool software is obtained from the specified file object and is placed in the specified file sharing area (as shown in fig. 1) so as to install the tool software.
In an implementation manner of the embodiment of the application, in order to implement installation of tool software, in the embodiment of the application, while a host receives the tool software, the host receives a deployment script sent by a tool management center, so that the host transmits the tool software and the deployment script together to a specified directory of a target virtual machine; and after the target virtual machine acquires the tool software and the deployment script from the specified directory, executing the deployment script to install the tool software, and feeding back the script execution condition to the tool management center.
In the implementation mode, the tool software delivery strategy formulated by the tool management center is analyzed, so that not only the tool software but also the corresponding deployment script can be obtained, therefore, the file synchronization module deployed on the host machine can be in contact with the tool management center to receive the tool software and the deployment script of the target virtual machine and transmit the tool software and the deployment script to the appointed directory of the target virtual machine in a file system mode, and after the target virtual machine receives the file in the appointed directory, the deployment script is executed, the installation of the tool software is realized, and the execution condition is fed back to the tool management center.
Therefore, the file synchronization module deployed on the host machine is used for realizing direct file transmission between the host machine and the target virtual machine on the host machine, and the purposes of avoiding storage network exposure and network disconnection are still suitable are achieved.
Further, the embodiment of the present application may further include: and based on a safety control strategy issued by the tool management center, regularly cleaning the file directory on the host machine by using a file synchronization module of the host machine.
Specifically, a file (such as tool software) received by a host from a tool management center may be placed in a specified file cache region of the host (as shown in fig. 1), and based on analyzing an issued policy of the tool management center, a security management and control policy configured in the policy, such as a validity period and a destruction policy of the file, may be obtained, and a file synchronization module of the host may periodically clean a file directory on the host according to requirements of the security management and control policy, so as to ensure security of the file.
Further, since the tool client module is deployed on the target virtual machine and the tool client module can communicate with the tool management center of the second physical device, the embodiment of the present application may further include: and sending the user information of the target virtual machine to the tool management center by using the tool client module, so that the tool management center sends the tool software of the target virtual machine to the host machine after the user information is authenticated.
Specifically, because there are many sensitive tool software or samples in the network shooting range, strict control and refined delivery are required, and under a proper condition, a proper person is given with a controllable range and time efficiency, if a user in the virtual machine needs to access in a mode of sharing files or services through a network mode in a traditional mode and then obtains the files or services, however, the mode needs the user to access and log in, download and manually operate for many times, so that the user experience is poor, and the interaction mode is not good.
However, in the embodiment of the present application, a tool client module is deployed in the target virtual machine, and the tool client module obtains basic information (such as user, virtual machine, role, resource condition, and the like) of a current user, and informs the tool management center of the basic information for user authentication, and after the tool management center passes the user information authentication, the tool management center sends tool software of the target virtual machine to the host to implement delivery of the network target site tool. Therefore, the embodiment of the application can realize timely and effective supply of tool software based on authority and scene, can also achieve the purposes of fine supply and strict range limitation, and realizes fine file delivery and installation, namely fine management and control are realized, and the requirement of high safety of a network shooting range is met
In the network target range tool delivery method provided by the embodiment of the application, the method is applied to a first physical device, the first physical device includes a host and at least one set of deployed virtual machines, based on which, the host is used to receive tool software of a target virtual machine sent by a second physical device, and the tool software is transferred to a specified directory of the target virtual machine through a file system hardware interface of the host, and then the target virtual machine is used to poll and scan the specified directory to obtain the tool software from the specified directory. According to the method and the device, efficient transmission of the tool software can be achieved through a file system, transmission requirements under the conditions that a network cannot be reached and the like can be met, efficient installation and deployment of the tool software are achieved through the method, and user experience is improved.
Referring to fig. 3, a schematic composition diagram of a network target range tool delivery apparatus provided in an embodiment of the present application is shown, where the apparatus is applied to a first physical device, where the first physical device includes a host and at least one deployed set of virtual machines, and the apparatus includes:
the tool software transmitting unit 310 is configured to receive, by using the host, tool software of a target virtual machine sent by a second physical device, and transmit the tool software to a designated directory of the target virtual machine through a file system hardware interface of the host, where the tool software is network shooting range tool software;
a tool software obtaining unit 320, configured to poll and scan the specified directory by using the target virtual machine, so as to obtain the tool software from the specified directory.
In an implementation manner of the embodiment of the present application, a file synchronization module is deployed on the host, and the file synchronization module communicates with a tool management center of the second physical device; the tool software transmission unit 310 is specifically configured to receive, by using the file synchronization module of the host, the tool software of the target virtual machine sent by the tool management center.
In an implementation manner of the embodiment of the present application, the apparatus further includes:
and the directory cleaning unit is used for regularly cleaning the file directory on the host machine by utilizing the file synchronization module of the host machine based on the security control strategy issued by the tool management center.
In an implementation manner of the embodiment of the present application, the apparatus further includes:
the script receiving unit is used for receiving the deployment script sent by the tool management center while the host machine receives the tool software, so that the host machine can transmit the tool software and the deployment script to the specified directory of the target virtual machine;
and the script execution unit is used for executing the deployment script to install the tool software after the target virtual machine acquires the tool software and the deployment script from the specified directory, and feeding back the script execution condition to the tool management center.
In an implementation manner of the embodiment of the present application, a tool client module is deployed on the target virtual machine, and the tool client module communicates with a tool management center of the second physical device; the device further comprises:
and the user authentication unit is used for sending the user information of the target virtual machine to the tool management center by using the tool client module so that the tool management center sends the tool software of the target virtual machine to the host machine after the user information is authenticated.
In an implementation manner of the embodiment of the present application, the tool software obtaining unit 320 is specifically configured to utilize a tool client module of the target virtual machine to poll and scan the specified directory.
In an implementation manner of the embodiment of the present application, the apparatus further includes:
and the tool deleting unit is used for deleting the tool software by using a tool client module of the target virtual machine after the tool software is installed on the target virtual machine.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
An embodiment of the present application further provides an electronic device, a schematic structural diagram of the electronic device is shown in fig. 4, where the electronic device 4000 includes at least one processor 4001, a memory 4002, and a bus 4003, and the at least one processor 4001 is electrically connected to the memory 4002; the memory 4002 is configured to store at least one computer-executable instruction, and the processor 4001 is configured to execute the at least one computer-executable instruction to perform the steps of any of the network range tool delivery methods as provided by any one of the embodiments or any one of the alternative embodiments herein.
Further, the processor 4001 may be an FPGA (Field-Programmable Gate Array) or other devices with logic processing capability, such as an MCU (micro controller Unit) and a CPU (Central processing Unit).
By applying the method and the device, the efficient transmission of the tool software can be realized in a file system mode, the transmission requirements under the conditions that the network cannot be reached and the like can be met, the efficient installation and deployment of the tool software are realized in the mode, and the user experience degree is improved.
The embodiments of the present application further provide another computer-readable storage medium, which stores a computer program, and the computer program is configured to, when executed by a processor, implement the steps of any one of the network range tool delivery methods provided in any one of the embodiments or any one of the alternative embodiments of the present application.
The computer-readable storage medium provided by the embodiments of the present application includes, but is not limited to, any type of disk including floppy disks, hard disks, optical disks, CD-ROMs, and magneto-optical disks, ROMs (Read-Only memories), RAMs (Random Access memories), EPROMs (Erasable Programmable Read-Only memories), EEPROMs (Electrically Erasable Programmable Read-Only memories), flash memories, magnetic cards, or optical cards. That is, a readable storage medium includes any medium that stores or transmits information in a form readable by a device (e.g., a computer).
By applying the method and the device, the efficient transmission of the tool software can be realized in a file system mode, the transmission requirements under the conditions that the network cannot be reached and the like can be met, the efficient installation and deployment of the tool software are realized in the mode, and the user experience degree is improved.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (10)
1. A network shooting range tool delivery method is applied to first physical equipment, wherein the first physical equipment comprises a host and at least one set of deployed virtual machines, and the method comprises the following steps:
receiving tool software of a target virtual machine sent by second physical equipment by using the host machine, and transmitting the tool software to a specified directory of the target virtual machine through a file system hardware interface of the host machine, wherein the tool software is network target range tool software;
and polling and scanning the specified directory by using the target virtual machine so as to acquire the tool software from the specified directory.
2. The method according to claim 1, wherein a file synchronization module is deployed on the host machine, the file synchronization module being in communication with a tool management center of the second physical device; the receiving, by the host machine, the tool software of the target virtual machine sent by the second physical device includes:
and receiving the tool software of the target virtual machine sent by the tool management center by using a file synchronization module of the host machine.
3. The method of claim 2, further comprising:
and based on a safety control strategy issued by the tool management center, regularly cleaning the file directory on the host machine by using a file synchronization module of the host machine.
4. The method of claim 1, further comprising:
receiving a deployment script sent by the tool management center while the host receives the tool software, so that the host transmits the tool software and the deployment script together to a specified directory of the target virtual machine;
and after the target virtual machine acquires the tool software and the deployment script from the specified directory, executing the deployment script to install the tool software, and feeding back the script execution condition to the tool management center.
5. The method according to any one of claims 1-4, wherein a tool client module is deployed on the target virtual machine, the tool client module being in communication with a tool management center of the second physical device; the method further comprises the following steps:
and sending the user information of the target virtual machine to the tool management center by utilizing the tool client module, so that the tool management center sends the tool software of the target virtual machine to the host machine after the user information is authenticated.
6. The method of claim 5, wherein polling and scanning the specified directory using the target virtual machine comprises:
and polling and scanning the specified directory by utilizing a tool client module of the target virtual machine.
7. The method of claim 5, further comprising:
and after the tool software is installed on the target virtual machine, deleting the tool software by using a tool client module of the target virtual machine.
8. A network shooting range tool delivery device is applied to a first physical device, the first physical device comprises a host and at least one set of deployed virtual machines, and the device comprises:
the tool software transmitting unit is used for receiving tool software of a target virtual machine sent by second physical equipment by using the host machine and transmitting the tool software to a specified directory of the target virtual machine through a file system hardware interface of the host machine, wherein the tool software is network target range tool software;
and the tool software acquisition unit is used for polling and scanning the specified directory by using the target virtual machine so as to acquire the tool software from the specified directory.
9. An electronic device, comprising: a processor, a memory;
the memory for storing a computer program;
the processor, configured to execute the network range tool delivery method according to any one of claims 1-7 by calling the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the network range tool delivery method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111571064.3A CN114327757B (en) | 2021-12-21 | 2021-12-21 | Network target range tool delivery method, device, equipment and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111571064.3A CN114327757B (en) | 2021-12-21 | 2021-12-21 | Network target range tool delivery method, device, equipment and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114327757A true CN114327757A (en) | 2022-04-12 |
CN114327757B CN114327757B (en) | 2023-03-24 |
Family
ID=81053945
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111571064.3A Active CN114327757B (en) | 2021-12-21 | 2021-12-21 | Network target range tool delivery method, device, equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114327757B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115225410A (en) * | 2022-08-30 | 2022-10-21 | 四川安洵信息技术有限公司 | Independent dynamic network security shooting range system, device and application method thereof |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107291525A (en) * | 2016-04-01 | 2017-10-24 | 华为技术有限公司 | A kind of method, host and system for disposing virtual machine |
CN108600338A (en) * | 2018-03-30 | 2018-09-28 | 山东乾云启创信息科技股份有限公司 | File sharing method, apparatus and system in a kind of virtualized environment |
CN109743293A (en) * | 2018-12-13 | 2019-05-10 | 烽台科技(北京)有限公司 | The access method and network target range system, computer storage medium in network target range |
US20200145434A1 (en) * | 2018-11-06 | 2020-05-07 | Bank Of America Corporation | Processing System for Providing Console Access to a Cyber Range Virtual Environment |
US10757132B1 (en) * | 2017-09-08 | 2020-08-25 | Architecture Technology Corporation | System and method for evaluating and optimizing training effectiveness |
CN111654512A (en) * | 2020-08-06 | 2020-09-11 | 北京赛宁网安科技有限公司 | USB flash disk ferry attack environment simulation device and method applied to network target range |
CN112130953A (en) * | 2020-10-28 | 2020-12-25 | 无锡雪浪数制科技有限公司 | Application deployment method for Windows Hyper-V virtualization |
CN112398688A (en) * | 2020-11-13 | 2021-02-23 | 广东省华南技术转移中心有限公司 | Container network configuration method, container network system, and storage medium |
-
2021
- 2021-12-21 CN CN202111571064.3A patent/CN114327757B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107291525A (en) * | 2016-04-01 | 2017-10-24 | 华为技术有限公司 | A kind of method, host and system for disposing virtual machine |
US10757132B1 (en) * | 2017-09-08 | 2020-08-25 | Architecture Technology Corporation | System and method for evaluating and optimizing training effectiveness |
CN108600338A (en) * | 2018-03-30 | 2018-09-28 | 山东乾云启创信息科技股份有限公司 | File sharing method, apparatus and system in a kind of virtualized environment |
US20200145434A1 (en) * | 2018-11-06 | 2020-05-07 | Bank Of America Corporation | Processing System for Providing Console Access to a Cyber Range Virtual Environment |
CN109743293A (en) * | 2018-12-13 | 2019-05-10 | 烽台科技(北京)有限公司 | The access method and network target range system, computer storage medium in network target range |
CN111654512A (en) * | 2020-08-06 | 2020-09-11 | 北京赛宁网安科技有限公司 | USB flash disk ferry attack environment simulation device and method applied to network target range |
CN112130953A (en) * | 2020-10-28 | 2020-12-25 | 无锡雪浪数制科技有限公司 | Application deployment method for Windows Hyper-V virtualization |
CN112398688A (en) * | 2020-11-13 | 2021-02-23 | 广东省华南技术转移中心有限公司 | Container network configuration method, container network system, and storage medium |
Non-Patent Citations (5)
Title |
---|
CUONG PHAM,DAT TANG,KEN-ICHI CHINEN,RAZVAN BEURAN: "CyRIS: a cyber range instantiation system for facilitating security training", 《SOICT "16: PROCEEDINGS OF THE SEVENTH SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY》 * |
JIAJUN XIE,CHUNRUI ZHANG,FANG LOU,YU CUI,LUN AN,LE WANG: "High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range", 《SPRINGERLINK》 * |
刘渊: "面向虚实互联网络的链路采集技术研究", 《***仿真学报》 * |
吉书朋: "基于Windows网络环境的Linux上机考试***的研究与实现", 《中国优秀博硕士学位论文全文数据库(硕士) 信息科技辑》 * |
陈吉龙等: "虚拟化工控网络靶场的设计与自动化部署", 《智能计算机与应用》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115225410A (en) * | 2022-08-30 | 2022-10-21 | 四川安洵信息技术有限公司 | Independent dynamic network security shooting range system, device and application method thereof |
CN115225410B (en) * | 2022-08-30 | 2022-12-09 | 四川安洵信息技术有限公司 | Independent dynamic network security target range system, device and application method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN114327757B (en) | 2023-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110752947B (en) | K8s cluster deployment method and device, and deployment platform | |
CN113169952B (en) | Container cloud management system based on block chain technology | |
CN108399101B (en) | Method, device and system for scheduling resources | |
CN101573691A (en) | Time based permissioning | |
CN107819891B (en) | Data processing method, data processing device, computer equipment and storage medium | |
CN104901923B (en) | A kind of virtual machine access mechanism and method | |
CN108256118B (en) | Data processing method, device, system, computing equipment and storage medium | |
EP2955651A1 (en) | Methods and systems for managing license distribution for software | |
CN107087009A (en) | A kind of realization method and system of collaborative share | |
CN103677858A (en) | Method, system and device for managing virtual machine software in cloud environment | |
CN102650968A (en) | Environmental constructing method and device for terminal system and terminal system | |
CN102843436A (en) | Method, equipment, server and system of equipment management | |
CN103207965A (en) | Method and device for License authentication in virtual environment | |
CN102662884A (en) | Device driving program configuration method based on network | |
CN114327757B (en) | Network target range tool delivery method, device, equipment and readable storage medium | |
CN105389520A (en) | Data access control method and apparatus and mobile storage medium | |
CN110890987A (en) | Method, device, equipment and system for automatically creating cluster | |
CN103716400A (en) | Method and system for achieving mobile working based on virtual machine | |
CN110955492A (en) | Service processing method and device based on container technology and computer equipment | |
CN104346301B (en) | Information processing system, information processing unit and method | |
CN111935195A (en) | Distributed system management method, device, storage medium and distributed management system | |
CN107659621B (en) | RAID control card configuration method and device | |
CN111131324A (en) | Login method and device of business system, storage medium and electronic device | |
US20150067854A1 (en) | Apparatus and method for multi-checking for mobile malware | |
CN105868622A (en) | Method and device for controlling startup of application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100094 103, building 6, yard 9, FengHao East Road, Haidian District, Beijing Patentee after: Yongxin Zhicheng Technology Group Co.,Ltd. Address before: 100094 103, building 6, yard 9, FengHao East Road, Haidian District, Beijing Patentee before: BEIJING YONGXIN ZHICHENG TECHNOLOGY CO.,LTD. |
|
CP01 | Change in the name or title of a patent holder |