| After many years of information technology, the country most of the universities are basically set up their own campus network. At the same time, the inherent insecurity in the network society, but also all the time threatening the healthy development of the campus network; strong curiosity as students, often lead to the internal network from attacks, resulting in the campus network service is not responding and crash, the school often have been leaked confidential information risk. Campus network security has become the primary campus network construction problem.The current mainstream of network information security protection technology has a firewall, intrusion detection, these security technologies are mostly feature-based rule matching, the use of passive security policy, for unknown attacks can not make an effective response, the face of rising growth in new ways and means of attack, always in a passive position. To this end, our campus network requires an active campus network security policy for network protection.This paper mainly studies the content is put forward by using network attack test technology to carry out safety assessment solution to deal with the current situation of campus network information security. Network attack and defense trial is network attack and defense technology as the foundation, so this paper analyses various network attack and defense test technique work and use principle, this paper expounds the advance against detection, scanning loopholes and common network attack technology, through research defense technology puts forward corresponding defensive measures. Finally, the test method of the original attack carries on the analysis comparison, this paper brings forward a new improved test method of attack, And corresponding measures are put forward to avoid attack testing for the test system bring unpredictable circumstances; Finally, as offensive experiment work of great worth reflect, developed a set of relatively complete system. Not only realized the way of network behavior by bypass monitor, and can of illegal network behavior real-time effective control. Through the simulation test, this paper proposes the attack test strategies have achieved better effect. |