Back
 JIS  Vol.7 No.5 , October 2016
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
Abstract: This paper puts forward the plan on constructing information security attack and defense platform based on cloud computing and virtualization, provides the hardware topology structure of the platform and technical framework of the system and the experimental process and technical principle of the platform. The experiment platform can provide more than 20 attack classes. Using the virtualization technology can build hypothesized target of various types in the laboratory and diversified network structure to carry out attack and defense experiment.
Cite this paper: Ding, X. (2016) Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization. Journal of Information Security, 7, 297-303. doi: 10.4236/jis.2016.75025.
References

[1]   Li, P., Mao, C.J., Xu, J., et al. (2013) Carry out National Level Experimental Teaching Center Construction of Virtual Simulation to Improve the Informatization Level of Experiment Teaching in Universities. Laboratory Research and Exploration, 32, 5-8.

[2]   Xia, Y.W. (2013) Laboratory Construction Must Be Practical (Continued): Interview Zhou Xingming, the Academician of Chinese Academy of Science, Professor of National University of Defense Technology. Laboratory Research and Exploration, 32, 1-4.

[3]   Cao, Y., Liang, X., Li, Y.C., et al. (2008) Research on Practical Teaching of Network Attack and Defense Technology Course. Experiment Science and Technology, 6, 97-99.

[4]   Luo, J. and Ning, T.Q. (2010) Practical Application of Server Virtualization in Computer Laboratory. Computer Era, 2, 44-46, 48.

[5]   Long, Y.J., Ouyang, J.Q. and Yu, J.X. (2013) Research on Virtual Network Integration Laboratory Based on GNS3 and VMware. Experimental Technology and Management, 30, 90-93.

[6]   Cheng, L. (2013) Research on Application of Cloud Technology in Management of Experiment Teaching. The Guide of Science and Education, 9, 86-87.

[7]   Zhong, P. and Wang, H.L. (2010) Exploration on Construction of Network Security Laboratory in Universities. Laboratory Science, 13, 122-124.

[8]   Wang, F., Wang, W.B., Wang, C.D., et al. (2011) Application of Server Virtualization Technology in Laboratory Informatization Construction. Laboratory Science, 14, 76-78.

[9]   Li, Y.Q., Song, Y., Huang, Y.B., et al. (2011) A Memory Optimizer Technology Facing Virtualization of the Cloud Computing Platform. Chinese Journal of Computers, 34, 684-693.
http://dx.doi.org/10.3724/SP.J.1016.2011.00684

[10]   Liang, H. (2008) Cloud Computing and Computer Security. Collected Papers of the 23rd National Computer Security Academic Seminar, 19-24.

[11]   Zhao, W., Wang, H.Q. and Xia, C.H. (2008) Research and Realization of Operating System Simulation Model Facing Network Attack and Defense Drilling. Application Research of Computers, 8, 2451-2453.

[12]   Kuang, Y.H. and Zhang, H.B. (2008) Research on Network Engineering Virtual Laboratory. Experimental Technology and Management, 25, 93-95.

 
 
Top