毕业设计反病毒虚拟机源码-graduation-project:设计

上传者: 38636763 | 上传时间: 2023-03-18 18:15:13 | 文件大小: 29.27MB | 文件类型: ZIP
毕业设计 反病毒虚拟机源码 graduation-project 仓库说明: 毕业设计。 markdown分为六章,完整资料包括代码已存网盘。 Ⅰ 题目 Ⅱ 开题:开题答辩内容+初期理论补充 Ⅲ 中期:开题答辩内容+中期理论补充 Ⅳ 结项:结项答辩内容 Ⅴ 实验及结果 Ⅵ 场景设计总结 场景报告 Ⅶ 指导总结 Ⅷ 同学的毕设 Ⅰ 题目:Linux 威胁模拟工具设计与实现---攻击方环境测评系统 Design and Implementation of Linux Red Team Adversary Emulation Tools 在传统的网络攻防演练活动中,攻防演练双方要么在一个「第三方」搭建的仿真演练平台、要么直接在真实网络系统环境中展开一场模拟真实网络攻防活动的演练活动,这种演练方式的优点在于「高仿真性」,缺点在于对于防御方的能力检验「仿真性」程度高低很大程度上取决于攻击方的「攻击能力」高低。ATT&CK 知识库的出现使得对于特定威胁类型和手段的模拟有了标准化描述,这使得对于防御方的能力检验「仿真性」保证从依赖于攻击方「攻击能力水平」转为依赖于标准化威胁模拟方案。只要基于标准化的

文件下载

资源详情

[{"title":"( 52 个子文件 29.27MB ) 毕业设计反病毒虚拟机源码-graduation-project:设计","children":[{"title":"graduation-project-main","children":[{"title":"images","children":[{"title":"dve-1-result.png <span style='color:#111;'> 67.10KB </span>","children":null,"spread":false},{"title":"docker-network-mapping.png <span style='color:#111;'> 134.06KB </span>","children":null,"spread":false},{"title":"dve-1-ok.png <span style='color:#111;'> 52.46KB </span>","children":null,"spread":false},{"title":"taxii_diagram.png <span style='color:#111;'> 70.98KB </span>","children":null,"spread":false},{"title":"dve-3-ok.png <span style='color:#111;'> 271.31KB </span>","children":null,"spread":false},{"title":"attack-points.svg <span style='color:#111;'> 118.87KB </span>","children":null,"spread":false},{"title":"network-layers.png <span style='color:#111;'> 119.64KB </span>","children":null,"spread":false},{"title":"network-test-1.png <span style='color:#111;'> 81.65KB </span>","children":null,"spread":false},{"title":"SDN-realization.png <span style='color:#111;'> 31.11KB </span>","children":null,"spread":false},{"title":"THE-CYBER-KILL-CHAIN-body.png <span style='color:#111;'> 1.29MB </span>","children":null,"spread":false},{"title":"network-test-3.png <span style='color:#111;'> 129.16KB </span>","children":null,"spread":false},{"title":"taxii-models.png <span style='color:#111;'> 188.20KB </span>","children":null,"spread":false},{"title":"attack-route.png <span style='color:#111;'> 128.61KB </span>","children":null,"spread":false},{"title":"openstack-map.svg <span style='color:#111;'> 196.42KB </span>","children":null,"spread":false},{"title":"dve-2-ok.png <span style='color:#111;'> 119.74KB </span>","children":null,"spread":false},{"title":"CVEs.jpg <span style='color:#111;'> 74.80KB </span>","children":null,"spread":false},{"title":"malware-analysis.png <span style='color:#111;'> 319.83KB </span>","children":null,"spread":false},{"title":"001.png <span style='color:#111;'> 29.88KB </span>","children":null,"spread":false},{"title":"veth-pair.png <span style='color:#111;'> 122.19KB </span>","children":null,"spread":false},{"title":"opendaylight.jpg <span style='color:#111;'> 113.81KB </span>","children":null,"spread":false},{"title":"autoattack-function.png <span style='color:#111;'> 162.35KB </span>","children":null,"spread":false},{"title":"004.png <span style='color:#111;'> 345.40KB </span>","children":null,"spread":false},{"title":"ovn-architecture.png <span style='color:#111;'> 100.43KB </span>","children":null,"spread":false},{"title":"emulation.png <span style='color:#111;'> 408.40KB </span>","children":null,"spread":false},{"title":"dve-4-ok.png <span style='color:#111;'> 516.07KB </span>","children":null,"spread":false},{"title":"network-test-2.png <span style='color:#111;'> 181.67KB </span>","children":null,"spread":false},{"title":"ids-result.png <span style='color:#111;'> 332.14KB </span>","children":null,"spread":false},{"title":"ATT&CKMatrixforEnterprise.png <span style='color:#111;'> 483.09KB </span>","children":null,"spread":false},{"title":"python-result.png <span style='color:#111;'> 60.78KB </span>","children":null,"spread":false},{"title":"veth-connection.png <span style='color:#111;'> 37.33KB </span>","children":null,"spread":false},{"title":"attack-process.png <span style='color:#111;'> 154.82KB </span>","children":null,"spread":false},{"title":"CybOX-framwork.png <span style='color:#111;'> 14.36KB </span>","children":null,"spread":false},{"title":"range-environment.png <span style='color:#111;'> 121.97KB </span>","children":null,"spread":false},{"title":"github-ids.png <span style='color:#111;'> 211.29KB </span>","children":null,"spread":false},{"title":"dve-4-result.png <span style='color:#111;'> 22.23KB </span>","children":null,"spread":false},{"title":"1-1.jpg <span style='color:#111;'> 254.84KB </span>","children":null,"spread":false},{"title":"1-2.png <span style='color:#111;'> 138.73KB </span>","children":null,"spread":false},{"title":"network-support.png <span style='color:#111;'> 60.81KB </span>","children":null,"spread":false},{"title":"003.png <span style='color:#111;'> 582.26KB </span>","children":null,"spread":false},{"title":"network-result.png <span style='color:#111;'> 26.86KB </span>","children":null,"spread":false},{"title":"openvswitch-openflow.png <span style='color:#111;'> 55.52KB </span>","children":null,"spread":false},{"title":"dve-2-result.png <span style='color:#111;'> 126.62KB </span>","children":null,"spread":false},{"title":"002.png <span style='color:#111;'> 19.18KB </span>","children":null,"spread":false},{"title":"dve--3-result.png <span style='color:#111;'> 172.99KB </span>","children":null,"spread":false},{"title":"APT3-Emulation-Plan.png <span style='color:#111;'> 445.96KB </span>","children":null,"spread":false}],"spread":false},{"title":"output","children":[{"title":"images","children":[{"title":"ATT&CKMatrixforEnterprise.png <span style='color:#111;'> 483.09KB </span>","children":null,"spread":false},{"title":"Adversary-emulation-in-the-cyber-kill-chain.png <span style='color:#111;'> 35.90KB </span>","children":null,"spread":false},{"title":"APT3.png <span style='color:#111;'> 128.70KB </span>","children":null,"spread":false}],"spread":true},{"title":"graduation-paper.md <span style='color:#111;'> 7.95KB </span>","children":null,"spread":false}],"spread":true},{"title":"videos","children":[{"title":"中期答辩演示视频.mp4 <span style='color:#111;'> 20.62MB </span>","children":null,"spread":false}],"spread":true},{"title":"README.md <span style='color:#111;'> 74.39KB </span>","children":null,"spread":false},{"title":"references","children":[{"title":"uws-using-mitre-attack-in-threat-hunting-and-detection-white-paper.pdf <span style='color:#111;'> 1.91MB </span>","children":null,"spread":false}],"spread":true}],"spread":true}],"spread":true}]

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明