Open Access

Research on the Path of Improving Network Attack and Defense Ability of Students in Applied Colleges and Universities Based on Information Security Technology

,  and   
Jun 05, 2025

Cite
Download Cover

Introduction

With the rapid development of big data and cloud computing, especially after the exposure of the Prism Gate incident in the United States, it indicates that the situation in the field of network security has become more severe and complex. China has in recent years introduced information security protection regulations in various fields, involving basic information networks such as telecommunication networks, broadcasting and television networks, and the Internet, as a way to improve the ability to prevent attacks, tampering, and stealing [1-3]. Attack and defense technology as the core skills of network security, it is urgent to cultivate talents who can utilize the existing mainstream technology of information security for network attack and prevention [4-5]. In addition, the demand of enterprises for technicians in this direction is increasing dramatically. Therefore, it is necessary to set up a network attack and defense experimental course, which aims to cultivate students to master the basic knowledge framework in the direction of network and information security, and to have actual network attack, forensic analysis and security protection practical technical ability [6-8].

As the discipline of network attack and defense is characterized by rapid technological update and complicated cross-disciplinary knowledge system, the theory involved covers many aspects such as mathematics, communication technology, cryptography and computer technology. Therefore, our university has also faced this considerable challenge since the introduction of this course [9]. After the discussion of pedagogical activities in the Department of Information Security, active communication with students in general, as well as through the analysis of the course laboratory report, it was found that the network attack and defense experimental teaching faces the problems of failing to mobilize the students’ enthusiasm for learning, demonstration lectures are more than students’ hands-on experiments, and the lack of effective methods of experimental examination and so on [10-12]. In view of the above problems, the teaching mode of network attack and defense experiment is in urgent need of rectification. First of all, the choice of textbooks should be from the selection of the publication time of the newer course materials, so that students can master the cutting-edge technical knowledge, and further improve the quality of teaching [13-15]. Secondly, the arrangement of the theoretical explanation time should be less than the students’ own hands-on time, but it can not affect the complete explanation of the content. Then we should stimulate students’ interest and curiosity in this course, cultivate students’ innovation ability, analysis and problem solving ability, so that they can meet the technical requirements of enterprises for network attack and defense technicians [16-18].

Cybersecurity is a combination of conceptual and practical courses, mainly containing network fundamentals and network attack and penetration techniques, and the common method used in training programs is to utilize network ranges for training professionals and practical exercises [19-21]. The cyber range can simulate a variety of real network environments, and completing specific offensive and defensive tasks can well exercise the practical ability of students, but the cyber range focuses more on the cultivation of practical ability, which requires students to have certain professional skills, which undoubtedly raises the threshold for entry for a college student or beginner who has just started to contact the attack and defense of the network, and it takes a high cost to build a real attack and defense platform [22-25]. Therefore, it is necessary to explore a scientific and reasonable network attack and defense teaching path to support students to observe, analyze and verify the underlying principles of network attack and defense, so that students can learn to use, improve their learning interest, get started quickly, and provide environmental support for the cultivation of network security talents [26-28].

Literature [29] analyzes the smart grid cybersecurity problem across the network and conceptualizes an abstract and unified state space framework to generalize the cyber-physical attack and defense models, and discusses in depth the current advanced cyber information defense models. Literature [30] conceptualizes a stealthy jamming strategy based on deep learning algorithms to jam Zigbee traffic, effectively reducing the negative impact of cross-technology jamming while providing better stealth. Literature [31] systematically reviews the research on intelligent transportation network attack and defense systems and provides valuable insights into the integration of artificial intelligence, autonomous attack and defense systems and intelligent transportation models. Literature [32] dialectically analyzes the network security attack and defense countermeasures based on machine learning algorithms, and focuses on the potential risks of this technical solution, which makes a positive contribution to the research and practice of adversarial learning in network security. Literature [33] analyzes the problems related to distributed denial-of-service (DDoS) attacks in software-defined networks (SDN), and summarizes the key security implications of SDN and the cutting-edge research and practice of SDN security technology, in order to provide decision-making reference for stakeholders. The above research examines and analyzes the current research and practice of network security attack and defense, and deepens the understanding of the future development and practice of network security attack and defense technology, which also provides some important insights and references for the teaching and cultivation of network security attack and defense technology talents.

The research on the theme of network security attack and defense teaching reform and innovation mainly involves, the transformation of teaching strategies, such as the introduction of network attack teaching strategies, focusing on practice and hands-on, and the empowerment of information technology tools, such as virtual reality technology simulation practice platforms, convenient isolation of network security hands-on equipment and so on. Literature [34] proposes to promote school-enterprise cooperation to build a network security crime attack and defense research laboratory to promote the cultivation of high-quality network security professional applied talents, and looks forward to the future of school-enterprise cooperation in talent cultivation. Literature [35] examines the obstacles of teachers’ network security attack and defense education, and proposes the introduction of portable isolation equipment has assisted network security attack and defense teaching. Literature [36] reveals that the current network security defense teaching mode is too concerned about the defensive aspects of teaching, unable to effectively respond to modern security attacks, and focuses on the analysis of virtual reality technology in the data asset attack and defense research. Literature [37] suggests that the introduction of network security attack strategies into network security attack and defense teaching is more capable of cultivating high-quality and professional network security attack and defense talents, but the related ethical issues need to be emphasized and prevented. Literature [38] describes that the virtual laboratory plays an important role in the teaching of network attack and defense courses, which can effectively stimulate students’ enthusiasm for learning network attack and defense security while cultivating their practical ability. Literature [39] describes that traditional network security course teaching focuses on theory and ignores practice, and tries to use Emulab to create a controllable, convenient and rapidly deployable security network practice platform for students to improve students’ network security attack and defense practice ability. These pedagogical innovations and reforms have contributed to the quality improvement of cyber security and defense teaching to a certain extent, but the above studies are limited to a certain school and a certain class, and there is still a need to further explore the path to improve the effectiveness of cyber security and defense education with universal applicability.

The main research objective of this paper is to simulate the network attack and defense game for students in colleges and universities through information security technology and to design a network protection system to improve the student network attack and defense capabilities in colleges and universities. For the complexity of student networks, topology extraction of network features is carried out using three methods: degree distribution, average path length and clustering coefficient. According to the topological characteristics of the student network in universities, the WS model is identified as the initial network for the attack and defense simulation, and the “randomized reconnection” rule is abandoned, and the connecting edges in the original network are fixed and “randomized edge addition” is carried out, so as to construct the NW small world network model for the attack and defense simulation. Network model. Based on this model, a network information security protection system can be designed to simulate attack and defense games, including information security assessment, intrusion feature extraction, network access mechanism and other functions. The model is applied to carry out attack and defense simulation experiments to verify the effect of attack and defense capability enhancement, and finally gives the path of attack and defense capability enhancement for high school students’ networks.

Topological feature extraction and simulation methods for complex campus networks
Topological feature extraction approach for complex student networks

Student information network in higher education is a kind of complex network. In order to better parse the structure of this network, this paper uses the following statistical properties to extract features from the student network.

Degree and degree distribution

In an undirected network, the degree is defined as the number of connected edges of the node with other nodes in the network, i.e., the number of nodes with path length 1 to this node. Denote the degree of node i as ki and the average degree as <k>, then: <k>=1Ni=1Nki=2MN$$ < k > = \frac{1}{N}\sum\limits_{i = 1}^N {{k_i}} = \frac{{2M}}{N}$$

Where M is the number of connected edges and N is the number of nodes.

In directed networks, edges are considered as vectors with starting and ending points, and the sum of edges ending at a node is called the in-degree of the node, and vice versa, the sum of edges starting at this node is called the out-degree of the node, which are denoted by kiin$$k_i^{in}$$ and kiout$$k_i^{out}$$, respectively. In various complex directed graphs, although the in-out degree of each node may not be the same, a vector edge must have a starting point and an ending point, so as a whole, the average in-degree of the network <kim>$$ < k_i^m >$$ and the average out-degree of the network <kiout>$$ < k_i^{out} >$$ are the same, and its expression is: <kiin>=<kiout>=MN$$ < k_i^{in} > = < k_i^{out} > = \frac{M}{N}$$

In a weighted undirected network, the degree is defined as the strength of a node, W = (wij) denotes the weight matrix of the network, and the strength of node i is: si=j=1Nwij$${s_i} = \sum\limits_{j = 1}^N {{w_{ij}}}$$

Similarly, in a weighted directed network, the intensity of node i consists of the outgoing intensity and the incoming intensity, two components, i.e.: siout=j=1nwij siin=j=1mwij$$\begin{array}{l} s_i^{out} = \sum\limits_{j = 1}^n {{w_{ij}}} \\ s_i^{in} = \sum\limits_{j = 1}^m {{w_{ij}}} \\ \end{array}$$

Due to the large size of the actual network, the degree of individual nodes does not portray some of the properties of the network well, so the degree distribution is introduced to capture the overall nature of the degree. The degree distribution is the number of nodes in a specific network with a particular degree value of k as a percentage of the total, denoted as P(k) [40].

Average path length

The length of the shortest path between two points in a network is called the distance between these two nodes. However the number of shortest paths between two points is estimated to be multiple, but the distance is certain. The mean of the sum of the distances between all pairs of nodes is the average path length of the network L, which is expressed as: L=1N(N1)/2ijdij$$L = \frac{1}{{N(N - 1)/2}}\sum\limits_{i \geq j} {{d_{ij}}}$$

Network connectivity is a necessary condition for the above equation to hold. If the network is not connected, the result obtained from the above equation will become infinite, and in order to more conveniently represent the average path length L of the network, one defines it as the simple harmonic mean between two points, i.e.: L=1GE,GE=1N(N1)/2ij1dij$$L = \frac{1}{{GE}},GE = \frac{1}{{N(N - 1)/2}}\sum\limits_{i \geq j} {\frac{1}{{{d_{ij}}}}}$$

Although many of the actual network nodes are numerous and structurally complex, their L is generally small.

Clustering coefficients

In a real network, there may also be connections between the neighbors of node i, and the magnitude of this possibility can be expressed by the clustering coefficient, which reflects the degree of connectedness between the neighbors of node i. The maximum number of edges obtained between the neighbors of node i with degree ki by connecting them two by two is (ki(ki − 1))/2. Assuming that the real number of connected edges between its neighbors is Ei(Eiki(ki1)/2)$${E_i}({E_i} \leq {k_i}\left( {{k_i} - 1} \right)/2)$$, the clustering coefficient Ci of node i can be expressed as: Ci=Eiki(ki1)/2=2Eiki(ki1)$${C_i} = \frac{{{E_i}}}{{{k_i}({k_i} - 1)/2}} = \frac{{2{E_i}}}{{{k_i}({k_i} - 1)}}$$

Where ki > 1. The clustering coefficient Ci = 0 when node i has degree ki < 1, i.e., it is an isolated node or has only one node connected to it. The clustering coefficient of the network c refers to the ratio of the clustering coefficient sum of each node individually to the total number of nodes in the network in the overall network, viz: C=1Ni=1NCi$$C = \frac{1}{N}\sum\limits_{i = 1}^N {{C_i}}$$

0 ≤ C ≤ 1 of them.

Model Selection for Student Network Attack and Defense Simulation

There are a variety of models that can be used for network simulation, and in this paper, model selection is based on an analysis of the following models.

Rule networks

There are three main types of common regular networks: global coupling networks, nearest neighbor coupling networks, and star coupling networks [41].

Globally coupled network: every node has a connecting edge to the remaining N − 1 node (where N is the total number of nodes in the network), and a network that is saturated with such a number of edges is called a globally coupled network. From the properties of such a network, it has the closest average path length L = 1, the highest clustering coefficient C = 1, and the largest number of edges of any network N(N − 1)/2. However, many real networks are sparse, and the order of magnitude of the total number of edges in the network is N rather than N2.

Nearest-neighbor coupling network: each node is connected to only K2$$\frac{K}{2}$$ node in its left and right neighborhoods and there is no edge between it and the other nodes in the network, and the network composed of such a rule is called a nearest-neighbor coupling network. Its clustering coefficient is Cnc=3(K2)4(K1)$${C_{nc}} = \frac{{3(K - 2)}}{{4(K - 1)}}$$ and from the expression, as K increases, Cnc also increases and takes the value of 0Cnc<3A$$0 \leq {C_n}c < \frac{3}{A}$$. Overall this type of network has high clustering properties. Its average path length is LncN2K$${L_{n{\text{c}}}} \approx \frac{N}{{2K}}$$, and when N → ∞, Lnc → ∞. Therefore, the nearest neighbor coupling network is basically unable to achieve a fully coordinated synchronous dynamic process.

Star-coupled network: In a network with N node, there is a large node with degree N − 1 connected to the remaining N − 1 ordinary nodes, but there is no edge between these N − 1 ordinary nodes, such as the structure of the network we call the star-coupled network. This network has a clustering coefficient of C = 0 and an average path length of Lstar=22(N1)N(N1)$${\mathcal{L}_{star}} = 2 - \frac{{2(N - 1)}}{{N(N - 1)}}$$, when N → ∞, Lnc → 2.

ER Randomized Networks

In order to model the properties of real networks, the ER stochastic model has been proposed with the construction algorithm:

Given N node and a connected edge probability P(P ∈ [0, 1]).

Randomly select two unlike nodes that are not connected to each other and generate a random number r ∈ (0, 1). If r < p, the edges are connected between the selected nodes, otherwise they are not connected. This generates a random graph network with a total number of edges of about pN(N − 1)/2. As the probability of connecting edges p keeps changing, the structure of the network follows [42].

The average path length of the ER network is LERlnNln<k>$${L_{ER}}\infty \frac{{\ln }}{N}\ln < k >$$, which shows that the ER model conforms to the characteristics of a small world. Its clustering coefficient is C=p=<k>N1$$C = p = \frac{{ < k > }}{{N - 1}}$$, which indicates that when the size of the random network is large, its clustering coefficient is small and there is no obvious clustering characteristics. The average degree of the ER model network is <k > = p(N − 1) ≈ pN, and it is also a homogeneous network whose overall degree distribution obeys the Poission distribution, whose expression is: P(k)=( N1 k)pk(1p)N1k<k>kk!e<k>$$P(k) = \left( {\begin{array}{*{20}{c}} {N - 1} \\ k \end{array}} \right){p^k}{(1 - p)^{N - 1 - k}} \approx \frac{{ < k{ >^k}}}{{k!}}{e^{ - < k > }}$$

Small World Network

Many actual networks, despite their large number of nodes and complex structure, not only do not have large average path lengths, but also have relatively small clustering coefficients. Both ER random networks and nearest-neighbor coupling networks do not have the “small average path length” and “large clustering coefficient” characteristics of real networks.

The WS model improves on the shortcomings of the above model with the following construction algorithm:

Generate a regular graph: Generate a regular network with the number of nodes N by the generation rule of the nearest neighbor coupling network.

Random reconnection: select each edge in the network in turn, keep one of the endpoints of the selected edge unchanged, and then randomly select one of the remaining nodes in the network as the second endpoint of this edge, and reconnect between these two nodes with probability p.

In this paper, we improve the WS model based on the WS model to construct the NW small-world network model, and its construction algorithm is as follows:

Given a rule graph: generate a rule network with the number of nodes N by the generation rule of nearest neighbor coupling network.

Randomize edge addition: first randomly select NK2$$\frac{{NK}}{2}$$ pairs of nodes in the network, and then randomly add edges between each pair of nodes with probability p, but there must not be heavy edges and self-loops.

The WS small world network clustering coefficient is: C(p)=3(K2)4(K1)(1p)3$$C(p) = \frac{{3(K - 2)}}{{4(K - 1)}}{(1 - p)^3}$$

The NW small world network clustering coefficient is: C(p)=3(K2)4(K1)+4Kp(p+2)$$C(p) = \frac{{3(K - 2)}}{{4(K - 1) + 4Kp(p + 2)}}$$

The average path length for both WS and NW models can be approximated as: L = 1n(NKp)K2p$$\begin{array}{*{20}{c}} L& = &{\frac{{1{\text{n}}(NKp)}}{{{K^2}p}}} \end{array}$$

The WS small world network degree distribution is:

If kK/2, then: P(k)=n=0min(kK/2,K/2)( K/2 n)(1p)np(K/2)n(pK/2)k(K/2)n(k(K/2)n)!epK/2$$P(k) = \sum\limits_{n = 0}^{\min (k - K/2,K/2)} {\left( \begin{array}{c} K/2 \\ n \\ \end{array} \right)} {(1 - p)^n}{p^{(K/2) - n}}\frac{{{{(pK/2)}^{k - (K/2) - n}}}}{{(k - (K/2) - n)!}}{e^{ - pK/2}}$$

If kK/2, then P(k) = 0. The NW small-world network degree distribution is: P(k)=( N kK)(KpN)k=K(1KpN)Nk+K$$P(k) = \left( {\begin{array}{*{20}{c}} N \\ {k - K} \end{array}} \right){\left( {\frac{{Kp}}{N}} \right)^{k = K}}{\left( {1 - \frac{{Kp}}{N}} \right)^{N - k + K}}$$

The improved model discards the original rule of “randomized reconnection”, and replaces it with fixing the connecting edges in the original regular network, and directly adds “randomized edges” in it, which can simultaneously satisfy the two characteristics of the real network, and realize the attack and defense simulation of the student network [43].

Design of network information security protection system based on attack and defense game
Network information security assessment

In the process of designing the network information security protection system based on attack and defense game, the information security risk should be assessed regularly, and the inevitable connection between different network information risks should be reasonably assessed, and the relationship between the network information risk assessment elements is shown in Fig. 1, which includes the security threat, information vulnerability, riskiness, security and other links.

Figure 1.

Relationship of network information risk assessment elements

Through the above analyzed contents, the system will control the hidden dangers of network information security risks by calculating the value of loss generated after encountering the threat of external factors, and the calculation formula is shown in Equation (15): M=fs/i$$M = \frac{f}{{\sqrt {s/i} }}$$

In equation (15), f represents network information vulnerability, M represents security threat coefficient, s represents network information security risk data, and i represents network asset amount.

According to Eq. (15), the attack and defense game model is used to predict the attack behaviors used by attackers in the future, comprehensively analyze the important factors affecting the network security threat, and scientifically assess the network security risk, and the calculation formula is shown in Eq. (16): K=A/Ri$$K = A/{R_i}$$

In Eq. (16), K denotes the economic benefit received by the attacker, A denotes the impact on the operation of the system after encountering a cybersecurity information event, and Rt denotes the probability of cybersecurity risk occurrence.

Network intrusion feature extraction

It is necessary to comprehensively study the characteristics of network intrusion, determine the security coefficients of network information specifically generated, use anomaly detection means to count the contents of the user’s session, and calculate the coincidence degree of the different ways of intrusion. Therefore, when extracting network intrusion data, it is necessary to operate according to the following requirements:

Describe the user’s daily behavior and analyze various measurement information into the measurement by vector analysis method.

Actively analyze various intrusion information, measure relevant weight information, and calculate intrusion means elements based on behavioral information.

Analyze the actual information in each picture, calculate the relevant vectors in the user behavior, and analyze it against the threshold vectors.

After comparing the behavioral information, if the error of its information is higher than the measurement standard, it means that the behavior is a wrong behavior.

It will concentrate the anomaly coefficients in the content of the session and determine the intrusive characteristics based on the value of the anomaly coefficients. At the same time, when calculating the data generated in the user characteristics, it is necessary to judge the initial value and adjust the relevant data according to the analysis results and user information to ensure that the system can operate normally.

Establishment of network access mechanisms

When using the network to transmit information and data, it is necessary to further improve the network information access mechanism, safeguard the security of network information in all aspects, scientifically assess the characteristics of network intrusion, and avoid the transmission of network information being affected by external factors. The current network information security protection system is a static configuration control mode, when the campus network managers found the vulnerability, only to take corresponding measures to deal with, seriously affecting the solution effect. To address this situation, campus network administrators need to build a sound dynamic mechanism and set up a permission management mechanism to improve the effectiveness of daily management.

When a user accesses information resources, in addition to verifying the user’s permission to use, but also to play the function of dynamic management, and users need to meet the rules set between the system. Campus network managers should use the access mechanism to comprehensively analyze the user’s actual access to the environment, and further standardize the user access process, the user should not only set up the user’s access mechanism when accessing. Also want to control the number of accesses in a predetermined time node. If the frequency of attacks in this stage is too frequent, the path of the attack in a certain network area should be calculated, and sound preventive measures should be formulated. Currently, the following types of network intrusion alert information fusion techniques are available:

Utilizing the connection between the attack sequence alarm information in the data to effectively fuse network intrusion alarm information to achieve the role of automatic alarm. Among the deficiencies are: insufficient scalability, flexibility, accuracy, the system can not cover all the sequences of computer network attacks, and can not realize the comprehensive alarm work.

Attack premise. If the wrongdoers want to launch an attack, there must be prerequisites, if the attack alarm information can be fused in the pre-attack, so as to make good preparations for the later stage, it can improve the flexibility of prevention, and is conducive to the campus network managers to stand in the attack perspective to analyze the basic results.

Alarm Trigger Probability. The main purpose of this method is to cooperate with the alarm system to propose a unified formula to calculate the probability, by analyzing the degree of things attacked and the connection between each attack step to calculate the specific probability. The calculation expression is shown in equation (17): Y=A|f|j/w$$Y = A|f|j/w$$

In equation (17), A|f| is the participant of the attacker and the defender, w indicates the protection function of the participant, and j is the actual function of the attacker and the defender.

Through the campus network managers comprehensively analyze the security of autonomous protection network information, and take reasonable solution measures for the protection security, so as to establish the network information security protection system for college students based on the attack and defense game model.

Network attack simulation experiments
Complex network attack and defense simulation
Simulation strategy

In order to verify the protection effectiveness of the information security protection system against multi-layer network simulation attacks, the complex student information network coupled with the physical network (including servers, routers, switches, etc.) and the information network (including the student management system, library system, campus social platforms, etc.) of a university is selected as an experimental object, and the attack and defense simulation is carried out on the complex student network, and the changes of the complex network and sub-network are observed. In order to compare and analyze the structural characteristics and anti-destruction characteristics of the complex student information network of the university, this paper mainly uses the complex student information network and the library system to simulate the attack and defense.

In this paper, the attack and defense simulation mainly adopts the complex network attack mode, which is to simulate the attack on the nodes of the complex network as a whole, and the attack parameters are set as follows: the number of preset attack rounds is set to 50, the attack mode is selected as the complex network attack mode, the target of attack is selected as the complex network, the number of attacks is set to 3, and the attack strategy is selected as the degree of centrality.

Multilayer Network Attack and Defense Simulation Steps

In the information security protection system for multi-layer network attack static experiments in this information security protection system operating steps are as follows:

Enter the multilayer network experiment interface, select the experimental network, click the load network button, after loading the completion of each sub-network, click the fusion network button, the visualization display module displays each sub-network and complex student network topology.

Set the attack parameters, including the preset number of attack rounds, attack mode, attack target, attack quantity, and attack strategy.

Click the Static Experiment button to realize the dynamic evolution of the network topology for multi-layer network attacks until the preset number of attack rounds or network collapse is reached and the experiment ends.

Click Generate File button to generate the data file.

Analysis of simulation results

In this section, maximum connectivity, network efficiency, number of connected slices and maximum connected slice size are selected as network evaluation metrics to attack the complex network through the complex network attack pattern, and the changes of network evaluation metrics are analyzed graphically.

Figure 2 demonstrates the change of network efficiency under the degree centrality strategy attack, where the horizontal coordinate is the number of attack rounds and the vertical coordinate is the network evaluation index value. It can be seen that under the degree centrality descending attack, the network efficiency of complex student network, information network and physical network decreases with the increase of the number of attack rounds, which is due to the fact that with the increase of the number of attack rounds, the connecting edges between nodes and nodes are reduced, and the shortest paths between the nodes will become longer, which leads to the decrease of network efficiency. The decreasing trend of network efficiency of physical network is more obvious than the decreasing trend of complex student network and information network, this is due to the fact that the physical network basically disintegrates in the early stage of the attack, while the decreasing trend of network efficiency of complex student network and information network is similar, and their resistance to the attack is similar, which indicates that the information network is dominant in the complex student network.

Figure 2.

Variation of net work efficiency under betweenness centrality strategy attacks

The variation of maximum connectivity degree under degree centrality strategy attack is shown in Fig. 3. Under the degree centrality descending attack, the maximum connectivity of the complex student network, information network and physical network decreases with the increase of the number of attack rounds, and after the 1st round of attack, the maximum connectivity of the physical network decreases from 1 to about 0.68, while the complex student network and information network decrease from 1 to about 0.98. After the 7th round of attack, the maximum connectivity of the physical network decreases to 0.09, at this time, there are only a few isolated nodes and small connectivity slices in the physical network, and the physical network is basically disintegrated. After the 15th round of attack, the maximum connectivity of complex student network and information network drops to about 0.09, and the change of maximum connectivity of complex student network and information network tends to flatten out in the subsequent attacks, and the complex student network, information network, and physical network basically disintegrate. Overall the information network’s maximum connectivity decreasing trend is similar to that of the complex student network, and its ability to resist attacks is similar, reflecting the dominant position of the information network in the student network.

Figure 3.

Variation of max connectivity under betweenness centrality strategy attacks

Fig. 4 reflects the variation of the number of connectivity slices under the degree centrality strategy attack. Under the degree centrality descending attack, the number of connectivity slices of complex network, information network and physical network shows a trend of increasing and then decreasing with the increase in the number of attack rounds, and as the number of attack rounds increases, the complex student network, the information network, and the physical network generates many isolated nodes and connectivity slices, which leads to the increase in the number of connectivity slices. The physical network only has isolated nodes and small connected slices left in the physical network after the 6th round of attack, and the physical network is basically disintegrated, while the maximum number of connected slices of the information network is more similar to the trend of the complex network changes, showing the dominant position occupied by the information network.

Figure 4.

Variation of the number of connected components under attacks

Fig. 5 depicts the variation of maximum connectivity slice size under degree centrality strategy attack. Under degree centrality descending attack, the maximum connectivity slice size of complex, information and physical networks is negatively correlated with the number of attack rounds, which is due to the fact that as the number of attack rounds increases, the maximum connectivity slice disintegrates to produce isolated nodes and small connectivity slices, and the number of nodes in the maximum connectivity slice is decreasing until the end of the attack when the complex student network disintegrates, and the physical and information networks disintegrate with it. Overall, the size of the maximum connectivity slice of the information network is similar to the decreasing trend of the complex student network, and its ability to resist attacks is similar, again indicating the dominance of the information network.

Figure 5.

Variation of size of the largest connected components under attacks

Based on the above complex student network attack pattern, it can be shown that the change trend of network evaluation indexes of complex student network and information network is more similar to that of physical network than that of physical network based on the degree centrality strategy attack of complex network attack pattern, and the results show that information network dominates in the composition of complex student network. The structure and function of the complex student network are still maintained to a certain extent after the information network is disintegrated, and the structure and function of the complex student network decreases to a smaller extent after the physical network is disintegrated, which indicates that the complex student network is more capable of resisting the attack than the single information network and physical network.

Network information security protection system attack and defense experiments

The purpose of the attack and defense experiment is to verify the rationality and feasibility of this designed network information security protection system. In order to ensure the rigor of the experiment, the experiment set the attack information for the external network, the use of firewalls to separate the internal network from the external network, the external network in the experiment can only access the mail server and the web server, while the internal network can be accessed and operated through the web server, mail server and file server.

Experimental content

Setting the attack content, attacking the internal network information, comparing the protection ability of the two network information security protection systems, the attack content in the experiment is shown in Table 1.

Experimental attacks

Serial number Attacks Number of attacks
1 Account stealing 25
2 Trojan plating 15
3 Rebound attack 20
4 Web attack 40
5 Data monitoring 25

Each attack content contains 220 network information, compare this paper protection system and the traditional system in these five kinds of attacks, the network information in the system was successfully attacked information. The more successful information is attacked, the worse the security protection function of the system is, and vice versa, the better the protection ability of the system is. The experimental process lasts for a total of 10h, and the experimental data collection is carried out every 2h, and the network defense strength is gradually enhanced.

Analysis of experimental results

The comparison results of this designed network information security protection system based on attack and defense game model with the traditional system are shown in Table 2. As can be seen from Table 2, the number of attacked information of the system designed in this paper is 198, 106, 126, 182 and 168 less than the traditional system in account stealing attack, planting Trojan horse attack, rebound attack, web page attack and data listening attack, respectively.

The result of experiment

Attacks The quantity of attacks on information
Tradition system Our system
Account stealing 223 25
Trojan plating 129 23
Rebound attack 170 44
Web attack 211 29
Data monitoring 186 18

The simulation and comparison experiment software is further used to simulate the network information system environment, and add strong attack strategy, weak attack strategy, strong defense strategy and weak defense strategy in this environment to defend the network information by using the method of this paper and the traditional defense method respectively, and set them as the experimental group and the control group respectively. In the experimental process, the simulation step size is 0.05 to simulate the strategy evolution process of both attack and defense under different conditions, and record the experimental results, which are plotted into the experimental results comparison diagram shown in Fig. 6.

Figure 6.

The comparison of experimental results

From the experimental results in Figure 6, it can be seen that in 50 samples, the experimental group’s effective defense of network information is significantly higher than that of the control group, and at the same time, it can be seen from the magnitude of the change of the two curves, the fluctuation of the experimental group is basically the same as the amount of network information that is attacked by the attacking strategy added in the experimental process of this paper, which indicates that the experimental group can choose different strengths of the defense strategy based on the attacking party’s attacking strategy strength, the Targeting is stronger. Therefore, through comparative experiments, it is proved that the security protection protection method proposed in this paper can effectively increase the amount of effective defense information, higher defense rate, and more in line with the needs of network information security transmission.

Comprehensive results of the above comparisons show that the network information security protection system designed in this paper has a stronger protection ability for students’ network information, which significantly reduces the number of attacks on information than the traditional system, and is more targeted in the face of different attack strategies. Therefore, it can be proved that the protection ability of the network information security protection system based on the attack and defense game model designed in this study is better than that of the traditional system, which enhances the security of students’ network information in colleges and universities.

Paths for improving the cyber attack and defense capabilities of higher education students

Combined with the information security application scenarios and security status quo of university student networks, to build a security guarantee system with operational platform, management integration, situational awareness, event warning, accident traceability, technology integration, and closed-loop security, and to enhance the offensive and defensive capabilities of university student networks, the following paths can be followed mainly to carry out related work:

Defense in depth, situational awareness

It establishes multi-level technical means for physical security, network security, platform security, data security and application security, and builds a deep defense system with key protection, traffic monitoring, intelligent research and judgment, rapid response and effective blocking. It collects the status and network traffic of all elements of the entire network, carries out data analysis and abnormality detection through dynamic analysis, comparison and correlation, senses and identifies abnormal events and behaviors, and supports the capabilities of early warning and notification, rapid response, and collaborative disposal.

Autonomous, controllable, secure and trustworthy

Implementing the strategic layout of localization, in the construction process, it should strengthen the ability of independent control, safety and reliability, and adopt domestic independent core technology in hardware equipment, chip trusted, operating system, database, middleware, cryptographic algorithms, etc., to ensure that the security system is controllable, manageable and trustworthy.

Compacting the foundations and building capacity

With “physical security, environmental security, autonomous and controllable, safe and trustworthy, collaborative linkage” as the cornerstone of security, policy and standard guidelines and organizational talents as the support and guarantee, the network information system around the university students continues to build security macro decision-making capability, monitoring and security incident notification and early-warning capability, security unified management capability, security deep defense capability, security supervision and operation and maintenance capability to form a systematic security countermeasures capability to meet the needs of e-government security in the new era. Defense capability, security supervision and operation and maintenance capability, forming systematic security countermeasures to meet the security needs of e-government affairs in the new period.

Network Security Collaboration and Integrated Security

Using network equipment, security equipment, and flow probes as detection and execution points, it collects the fullest possible information on network traffic, security logs, vulnerability scanning logs, host security, and other security threat events, carries out unified and comprehensive research and judgment, improves the accuracy rate of security analysis, and drills into the depth of network behavioral data to discover potential threats in a timely manner. Through the controller scheduling network and security equipment collaborative disposal, accelerate the threat response speed, prevent the threat from spreading in the governmental extranet, for the violation of the main body immediately blocked nearby, to realize the net security integrated protection.

Conclusion

In this study, we applied information security related technologies such as topological feature extraction, NW small-world attack and defense model, and security protection system to explore the path to improve the attack and defense capabilities of university students’ networks. The NW model accurately simulates the attack process of degree-centrality attack strategy on the network efficiency, maximal connectivity, the number of connected slices, and maximal size of connected slices, and it is found that the information subnetwork in the students’ network shows higher resistance to the attack capability. Attack ability. Conducting attack and defense experiments on the security protection system, in the network attacks such as account stealing attack, planting Trojan horse attack, rebound attack, web page attack, data listening attack, the security protection system suffered 198, 106, 126, 182 and 168 fewer attack messages than the previous system respectively. Adding different levels of attacks and defense strategies respectively in the test, the amount of effective defense information of the new system is always greater than that of the comparison system and is more targeted. This shows that the work in this paper provides an effective path to improve students’ network attack and defense capabilities.

Language:
English