头图

Foreword

With the continuous development of Internet network communication, network security is like a door, which plays a role of interception and protection for our daily network activities. Unknown attack, knowing how to defend, from the moment the network was born, the war between attack and defense has never ceased. Therefore, a large number of network information security management skills competitions have been derived to enhance the awareness of social network security responsibility and strengthen network security. The construction of technical talent team.

We also used Hightopo's product HT to build a large visual screen for the technical competition between technicians. Simulate a competitive defense battle in cyberspace, allowing the otherwise boring information competition to be more intuitively displayed to the spectators and contestants participating in the competition through HT 3D visualization.

effect display

Special effects scene rendering

Using HT's 2D and 3D engines, it is produced by setting up scenes, matching data panels and driving animations. The overall theme is based on the style of sci-fi planets. The scenes are expanded from the perspective of the solar system, centered on the sun, and increased halo rendering effects. Surrounded by a celestial system. The two panels present information about the progress of the game. The scene supports regular rotation, translation, and perspective zooming.

Hightopo's 3D visualization uses lightweight modeling to build the scene, combined with the powerful rendering capabilities of the HT engine, to ensure that the scene is loaded and run efficiently and smoothly on the Web and to ensure the excellent visualization of the scene.

Visual simulation of level

Capture The Flag (Capture The Flag, CTF) is a form of competition in the field of network security that refers to technical competition among network security technicians. Originated in the DEFCON Global Hacking Conference in 1996, to replace the previous method of hackers competing in technology by launching real attacks against each other. So far, it has become a popular form of competition in the global network security circle.

We will also present this case in the form of the CTF Capture the Flag, simulating the scene, process and results of the competition through visual animation effects.

CTF's competition mode can be divided into three main categories:

1. Problem solving mode (Jeopardy)

The CTF competition of this model is similar to the ACM programming competition and the informatics Olympiad. The topics mainly include reverse engineering, vulnerability mining and utilization, Web penetration, passwords, forensics, steganography, secure programming and other categories.

2. Attack-Defense mode (Attack-Defense)

The AWD mode emphasizes attack and defense. This mode can reflect the situation of the game through the score in real time, and in the end, the winner can be directly divided by the score. It is a fiercely competitive, highly admirable and highly transparent network security game system.

Three, mixed mode (Mix)

Combine problem-solving mode and offensive and defensive mode. A typical representative of the mixed-mode CTF competition system is the iCTF international CTF competition.

The case also displays these three competition styles in the form of HT visualization. At the end of each game, it will automatically jump to the next game link, or you can jump to the next game status interface through the game style selection on both sides of the panel.

information visualization

Through the radar chart, the multi-index system analyzes the situation of the game, which is more concise, convenient, accurate and intuitive to reflect more data information. Real-time display of the situation of the competition, the time of the participants to answer questions, time consumption and so on. And by accessing real-time data to display the standings list, dynamically update the player's score data, and keep abreast of the players' current rankings.

Event list

Events triggered during the game will be updated in a rolling list to record the key nodes in the game. From the list, you can see the time taken by the players to solve the problem, or the elimination broadcast that exceeds the limited time, as well as special events such as randomly triggered additional questions.

Multiple special effects attack forms

In the Capture the Flag game, in addition to the standings, we can also use the player’s position in the scene to assist in judging the current situation. The spacecraft will move one step towards the end of the sun when the player successfully solves the problem. Especially when there are many participating teams, the three-dimensional The virtual battlefield can more vividly and intuitively reflect the current battle situation and the strength gap between the teams than the leaderboard. When the contestant fails to solve the problem and is eliminated, the corresponding spaceship model will be destroyed and exploded.

In the semi-finals, each team sent a player to challenge the same problem, and the spacecraft that played in the battle showed special attack effects.

In the finals, through different spaceships attacking different pieces, we can clearly show the choices and strategies of different teams.


Summary

Users can access the HT visualization system anytime and anywhere through a PC, PAD or smart phone, as long as they open a browser to realize remote monitoring and control. The HT 3D visualization technology adopts the B/S architecture. Through the combination of the B/S architecture and the lightweight model, the HT 3D visualization technology reduces the pressure of users on purchasing high-performance hardware to a certain extent. Many limitations on dimensions.

The HT 3D topology solves some of the problems in the display of traditional 2D topology maps. For example, compared with 2D topology maps on a single node, the 3D format can carry more business information and display applications, services and hosts in a more three-dimensional and diverse manner. The health status and the upstream and downstream dependencies of the application, the PC terminal, mobile users, big data, car networking, IoT gateway and other nodes have been graphically 3D, which is more beautiful and vivid, no longer like a traditional single node The topology is so boring. Hightopo's 3D topology map can be applied to many fields such as telecommunications, network management, 5G, and base stations.

Expansion extension

In addition to the common CTF mode, HT visualization can also perfectly present the modes of online competitions in different scenarios, such as ISW (intranet shooting range exercise), RHG (artificial intelligence offensive and defense), BTC (pass through competition), CTL (territory competition), CFS (scene mode) and so on.

The difference between CFS mode and CTF is the comprehensive problem. There is an association between the problem and the problem, which can be understood as a network topology, and the flag is obtained through step-by-step penetration. And we have made innovations and changes in the presentation of the traditional competition mode or the topology map. With the continuous increase of data, the form of 2D graphics visualization is too flat and dense, and it is not easy to present the data. On this basis, adding the form of HT 3D visualization can more intuitively see the manifestation of various different data, which has the advantages of multi-dimensional, three-dimensional, and multi-faceted.

Innovative application

In the era of big data and artificial intelligence, visualization technology connects people, big data and intelligence. Through HT visualization, complex data can be presented in the simplest and most intuitive way. The application of visualization also has a lot of imagination, which can be used for innovative applications in many fields. For example, network situation awareness (Situation Awareness, SA) can also be integrated with visualization to be applied to network security prevention in other industries. Situation awareness is an environment-based, dynamic, and overall insight into security risks. Based on data, a way to improve the ability to detect and identify security threats, understand and analyze, and respond to and deal with security threats from a global perspective is ultimately for decision-making and action, and is the landing of security capabilities. The concept of situational awareness was first proposed in the military field.

As the importance of network security has become more prominent, security issues in the fields of smart city security, big data security, cloud security, 5G security, and industrial Internet security have been paid more attention, as well as the combination of emerging technologies, situational awareness has played a role in many areas, such as: Military joint operations, urban construction security situation, regulatory agency system control, corporate network operation monitoring, etc. The combination of HT visualization makes network information security more intuitive monitoring, analysis, response and prevention. Establish a secure network early warning mechanism, network risk management and control, and improve the overall security protection level.

For more industry application examples, please refer to the case link of Software's official website: 1610766c93496e https://www.hightopo.com/demos/index.html


hightopo
5.5k 声望3k 粉丝

Everything you need to create cutting-edge 2D and 3D visualization