CN108200071A - Support message information extraction and the IPSecNAT traversing methods and system that carry - Google Patents

Support message information extraction and the IPSecNAT traversing methods and system that carry Download PDF

Info

Publication number
CN108200071A
CN108200071A CN201810026146.1A CN201810026146A CN108200071A CN 108200071 A CN108200071 A CN 108200071A CN 201810026146 A CN201810026146 A CN 201810026146A CN 108200071 A CN108200071 A CN 108200071A
Authority
CN
China
Prior art keywords
message
information
ipsec
data
inforheader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810026146.1A
Other languages
Chinese (zh)
Inventor
刘进华
王彩萍
梅丽娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Polytechnic College of Agriculture and Forestry
Original Assignee
Jiangsu Polytechnic College of Agriculture and Forestry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Polytechnic College of Agriculture and Forestry filed Critical Jiangsu Polytechnic College of Agriculture and Forestry
Priority to CN201810026146.1A priority Critical patent/CN108200071A/en
Publication of CN108200071A publication Critical patent/CN108200071A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/256NAT traversal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Abstract

The invention discloses a kind of method and system that message information is supported to extract and carry while IPSec messages NAT is supported to pass through.It may insure that message content extracts before ipsec encryption by this method, sampling arrangement carried out to it, and transmission is carried with message, can very easily get sample information for the sampling server or task equipment set in transmission process.Present invention provides a set of mechanism simultaneously to protect sample information, it is ensured that ESP encrypted contents will not be revealed because of sample information or be tracked by emphasis.It can solve the problems, such as that ipsec encryption message deep analysis cost is high using the system and method for the present invention, strong guarantee is provided for the data source needed for growing big data analysis.

Description

Support message information extraction and the IPSecNAT traversing methods and system that carry
Technical field
The present invention relates to the data transmission technologies in computer networking technology, particularly computer network, specifically relate to And a kind of IPSec NAT (Network Address Translation, network address translation) traversing method.
Background technology
IPSec (Internet Protocol Security) is IETF (Internet Engineering Task Force) the network security protocol for the one group of opening formulated, it is a series of agreement and service that safety is provided for IP network Set.Wherein, ESP agreements (Encapsulated Security Payload, package safety load) mainly provide encryption, number It is verified according to source, data integrity validation and replay protection.IPSec ESP agreements have two kinds of transmission mode and tunnel mode Mode:Former IP data pack loads and ESP telegram ends is encrypted in transmission mode (Transport mode), as shown in Figure 1, wherein HDR is the abbreviation of Header, represents head;Tunnel mode (Tunnel mode) is to IP heads, load and the ESP of former IP data packets Telegram end is encrypted together, as shown in Figure 2.The both ends of ipsec encryption and decryption are known as peer-to-peer, only know between peer-to-peer Other side's key.
In addition, NAT technologies for another IP address by the IP address conversion in IP datagram text head by providing inside The function of network protection, and the problem of alleviate IPv4 Address Run Shorts to a certain extent.IPSec and NAT cooperate, can be with Realize safe transmission on ip networks between specific communications side, therefore as more and more enterprises or the master of mechanism on-premise network Stream selection.IPSec VPN users generally make ESP packets pass through NAT using NAT-T (NAT Traversal, NAT pass through) to reach Purpose.It is passed through in scene in IPSec NAT, the data between ESP HDR to ESP Auth data form new IP packet and carry Lotus, the load cannot be changed, and otherwise opposite end just can not be by decrypting come restoring data;And NAT is inevitably It modifies to IP address, so when being related to across NAT device scene, existing scheme is typically chosen in the IP heads of IPSec messages Increase by one UDP afterwards ESP messages to be protected to be not modified.The message structure of IPSec passing through NAT is as shown in Figure 3.
Data are transmitted using IPSec ESP agreements, by the way that ciphering user data, the confidentiality of data has been effectively ensured And safety, data is prevented to be ravesdropping in transmission process.Even if data are trapped in transmission process, do not knowing that track data is close In the case of key, Brute Force will face huge data analysis and attempt the time.It expends and very big crack cost and can only also obtain To losing the data that are worth in real time.This effect is exactly that data safety work is desired.
But in the today in big data epoch, effective information is derived from the real-time analysis to mass data and excavates.Internet Data content on each node, all demand there may be data acquisition.And the encrypted message of ipsec encryption agreement is mutual During networking transport, data content is that data resolution server or special analyzing device can not be got easily.Such as It is described above, even if being obtained by Brute Force, huge computing resource and time are also expended, this is big data analysis now Problem urgently to be resolved hurrily.
Invention content
Goal of the invention:For problem of the prior art, the present invention proposes a kind of support message information extraction and carries, simultaneously The method and system that IPSec messages NAT is supported to pass through.
Technical solution:A kind of method that message information is supported to extract and carry while IPSec messages NAT is supported to pass through, packet Include that construction passes through message and parsing is passed through two stages of message, construction passes through message and includes the following steps:It is specified by user Strategy and template are extracted, sort out and are assembled to data packet before encrypting, and the information content is turned further according to data dictionary Justice completes the arrangement of sampled data;To the sampled data after arrangement successively packaging information head InforHeader (Information ) and designated port UDP heads Header;Ipsec encryption is carried out to data packet, after data packet completes encryption, packaged is adopted Sample data are put into after the IP heads of ESP messages.
Parsing is passed through message and is included:UDP port number is parsed, parses InforHeader, obtains sample information length;It is based on Sample information length deletes sampled data;IPSec ESP messages are decrypted.
The IPSec ESP messages encapsulated by this method are in transmission process, once by sampling server or special adopt Sample equipment obtains, it is possible in the case where not decrypted to ciphertext, UDP heads are recognized by UDP port number and InforHeader Sampling can be rapidly completed in the case where not needing to decryption in packet sampling information afterwards.
The disclosure of certain sample information is also Constrained and scope limitation.The information dynamics to sampled data can be passed through Control and information escape are carried out, sensitive information leakage or characteristic information to be avoided to be tracked.In indefinite key message meaning In the case of, IPSec ESP content safeties are protected to a certain extent, while ensure that part carries the encryption message of key message not It can be tracked by emphasis.
Based on above 2 points, which can be divided into trust region and distrusts region: In trust region, sampling server has the template and dictionary of sampled data, can easily get correct sample information;No Sampled data can be accessed by being trusted region, but is not known the clear and definite meaning of information or be can only obtain the clear and definite meaning in part Information.The information content in Simultaneous Sampling Data can also divide safe class as required:Safe class is required minimum Information, content can be without escapes, this partial information is showed with script meaning;Higher report is required for safe class Text, the meaning the fuzzy more deviates script meaning or even the meaning of a word and runs counter to, and needs just obtain by dictionary and information model definite Meaning.
A kind of system that message information is supported to extract and carry while IPSec messages NAT is supported to pass through, including constructing mould Block and parsing module, wherein, then constructing module seals the sampled data after arrangement successively for being arranged to sampled data Information header InforHeader and designated port UDP heads are filled, packaged sampled data is put into after the IP heads of ESP messages.Tool Body, to the arrangement of sampled data respectively by extraction unit, sort out strategy that unit and module units specified based on user and Template is extracted, sorts out and is assembled to data packet before encrypting, then by escape unit according to data dictionary to the information content It carries out escape and completes.Parsing module is used for long to obtain sample information by parsing UDP port number, parsing InforHeader Degree is then based on sample information length and deletes sampled data, obtains IPSec ESP messages and it is decrypted.
Advantageous effect:The invention discloses a kind of support message information extraction and carrying while support IPSec messages NAT The method and system passed through.It may insure that message content extracts before ipsec encryption by this method, it adopted Sample arranges, and carries transmission with message, can be very convenient for the sampling server or task equipment that are set in transmission process Get sample information.Present invention provides a set of mechanism simultaneously to protect sample information, it is ensured that in ESP encryptions Holding will not reveal because of sample information or be tracked by emphasis.Ipsec encryption report can be solved using the system and method for the present invention The problem of literary deep analysis cost is high, strong guarantee is provided for the data source needed for growing big data analysis.
Description of the drawings
Fig. 1 is IPSec ESP message structure schematic diagrames under transmission mode;
Fig. 2 is IPSec ESP message structure schematic diagrames under tunnel mode;
Fig. 3 is the message structure schematic diagram that NAT is passed through under scene;
Fig. 4 is the overview flow chart of the method for the present invention;
Fig. 5 is the application scenarios and operation principle schematic diagram of the present invention;
Fig. 6 is the flow chart that IPSec messages are encapsulated according to the peer-to-peer of the embodiment of the present invention;
Fig. 7 is the InforHeader structure according to the embodiment of the present invention and passes through message organigram;
Fig. 8 is the flow chart that IPSec messages are decapsulated according to the peer-to-peer of further embodiment of this invention;
Fig. 9 is the system global structure schematic diagram of the present invention;
Figure 10 is the system structure diagram according to further embodiment of this invention.
Specific embodiment
Technical scheme of the present invention is described further below in conjunction with the accompanying drawings.
The invention discloses a kind of sides that message information is supported to extract and carry while IPSec messages NAT is supported to pass through Method.As shown in figure 4, IPSec message NAT through method according to embodiments of the present invention includes the following steps:Step 10, construction are worn More message:Data packet before encrypting is extracted, is sorted out, is assembled and escape, then successively packaging information head InforHeader and Then packaged sampled data is put into after the IP heads of ESP messages by designated port UDP heads;Report is passed through in step 20, parsing Text:UDP port number, parsing InforHeader are parsed, obtains sample information length, the deletion of sample information length is then based on and adopts Sample data obtain IPSec ESP messages and it are decrypted.It may insure message content in ipsec encryption by this method It extracts, and is carried with message before, it can be for the sampling server or special equipment that are set in transmission process very easily Sample information is got, so as to provide reliably and effectively data source for big data analysis.While present invention provides A set of mechanism protects sample information, it is ensured that ESP encrypted contents will not be revealed because of sample information or be tracked by emphasis.
Fig. 5 shows application scenarios of the present invention and operation principle schematic diagram, as shown in figure 5, ipsec peer establish with Afterwards, peer-to-peer A and peer-to-peer B are communicated by respective carrier gateway via internet, and sampling server can be to each The data of a network node are sampled.The safety of sample information and agility in order to balance pass through the transmission range of message It is divided into trust region and distrusts region, in trust region, sampling server has the template and dictionary of sampled data, can Easily to get correct sample information;Although sampled data can also be accessed by being not trusted region, letter is not known The clear and definite meaning of breath.The disclosure of sampled data is constrained and has scope limitation, can pass through the informational power to sampled data Degree carries out control and information escape, sensitive information leakage or characteristic information to be avoided to be tracked.In the feelings of indefinite type meaning Under condition, IPSec ESP content safeties are protected to a certain extent, it is ensured that will not be because of the sensitive word in the extraction information of its carrying And it is tracked by packet capture person emphasis.
Information type in Simultaneous Sampling Data can also define safe class as required in data dictionary.For safety The minimum information of class requirement, can be without escape, this partial information is showed with script meaning.Safe class is required to get over High message, the meaning the fuzzy more deviates script meaning or even the meaning of a word and runs counter to, and needs to obtain by dictionary and information model To precise meaning.
To the principle of data template and data dictionary, detailed description are as follows herein:
Data template defines the assembling form of message extraction information, is that user defines and is configured to ipsec peer and sets It is standby upper.For example, in xml form, according to the classification per extract information in extraction information, the content for extracting information is carried out Tissue.There is fixed form, the extraction information that IPSec messages carry is parsed and identified convenient for IPSec opposite equip.s.
Data dictionary contains user-defined sensitive vocabulary and universal word and its corresponding escape content and safety Grade.The structure of data dictionary is shown in Fig. 5.Using data dictionary by escape replacement operation after, the message that gets well construction Extraction information becomes to deviate its original meaning, accordingly even when IPSec messages are intercepted by other equipment and get the extraction letter of its carrying Breath, it is also difficult to its clear and definite real meaning.The safe class of sensitivity vocabulary therein is the sensitivity according to user according to business information Property defines.Such as:The sensitivity lexical information such as userName, password, port can be defined as advanced.Video, audio, The APP such as QQ Type can be defined as middle rank.Universal word popular word such as picture, get can be defined as rudimentary. Universal word can be without escape.
Under this traversing method, data template and dictionary that peer-to-peer both sides use can be updated regularly and know IPSec Sampling server or task equipment can be arrived, sampled data escape part is prevented to be tracked and crack due to long-time service.
Fig. 6 shows the flow chart of peer-to-peer encapsulation IPSec messages according to embodiments of the present invention, when transmitting terminal constructs Processing when IPSec passes through message is as follows:
Step 101, the IPSec pass through the corresponding business of business it is enabled when, perform step 102 and carry out message deep analysis, Otherwise by former flow processing.
Step 102, peer-to-peer carry out deep analysis to message, obtain the key message in load.The process of deep analysis The message deep analysis library that is configured is relied in peer device to carry out.
Step 103, the sample information template and data dictionary for obtaining configuration.Wherein sample information template definition sampling letter The form of construction is ceased, and data dictionary will be used at step 104.
Step 104 constructs the message information that step 102 is extracted according to sample template into row format, then goes to step 105 Processing.
Step 105, the definition in data dictionary carry out escape to the keyword in sample information, then go to step 106 processing.
Step 106, the sample information packaging information head InforHeader to have constructed.Fig. 7 shows according to the present invention The InforHeader structures of embodiment and message composition is passed through, it is crucial that identification field and length word in InforHeader Section, identification field shows whether the data behind UDP are InforHeader, for example, being defined as 0xAA55 in structural scheme The mark of InforHeader, then identification field value is 0xAA55 just it is considered that UDP are followed by InforHeader.Length Field shows the length of sampled data, and the length field shown in Fig. 7 occupies 2Byte, that is, 16bit to store, represents supported Sampled data length is 0-65535Byte.Then 107 processing are gone to step.
Step 107 after completing InforHeader encapsulation, continues as sample information encapsulation UDP heads.Wherein UDP port number is User is configured at ipsec peer both ends, for identifying the message that the IPSec NAT pass through encapsulation, so far sample information structure It makes and finishes.
After step 108, message complete ipsec encryption processing, the sample information data segment that step 107 has constructed is inserted into After the IP heads of IPSec, IPSec passes through message and is so far finished with regard to construction.
As shown in figure 8, opposite end IPSec opposite ends peer-to-peer receives this, to pass through the processing after message as follows:
Step 201, opposite end peer-to-peer are received after the IPSec passes through message, carry out IP and UDP packet parsings first.
Step 202, when parsing the ports of UDP messages and passing through the corresponding port numbers of business for the IPSec, be shown to be and wear More message needs to go to step 203 further determine whether it is sample information;If UDP port number is not belonging to pass through message, press Former flow processing is continued with by UDP packet parsing flows.
Step 203, analytic message InforHeader obtain the identification field and length field of InforHeader.Otherwise By former flow processing.
Step 204 judges by the way that whether the identification field of InforHeader is identical with the value of schema definition Whether InforHeader is legal.If legal go to step 205 processing, otherwise by former flow processing.
Step 205, obtain InforHeader in length field, according to this length+UDP headings length (fixation)+ This body length of InforHeader (fixation), you can know the total length of sample information.
The length of step 206, the sampled data calculated according to step 205, deletion include UDP, InforHeader Whole sampled datas inside.IPSec ESP messages can normally be decrypted below.
As shown in figure 9, the system global structure schematic diagram for the present invention, which includes the constructing module interconnected 100 and parsing module 200, wherein, constructing module 100 passes through message for constructing:Sampled data is arranged, then to whole Sampled data after reason packaging information head InforHeader and designated port UDP heads successively, packaged sampled data is put into After the IP heads of ESP messages.Parsing module 200 is used to parse the message that passes through received:By parsing udp port Number, parsing InforHeader obtain sample information length, be then based on sample information length and delete sampled data, obtain IP Sec ESP messages are simultaneously decrypted it.
Figure 10 is the system structure diagram according to another embodiment of the present invention.The arrangement of sampled data is passed sequentially through and is carried Take unit 110, sort out strategy that unit 120 and module units 130 specified based on user and template to data packet before encrypting into Row extraction is sorted out and is assembled, then carries out escape to the information content according to data dictionary to complete by escape unit 140.Construction Module 100 includes:Extraction unit 110 for doing deep analysis to message before encryption, and extracts message information;Sort out unit 120, for being sorted out according to application type to the message information extracted, such as video data, audio data etc.;Assembling is single Member 130, is assembled and is constructed to the information after extracting, sorting out for the template according to user configuration;Escape unit 140 is used According to data dictionary in the extraction information after assembling keyword carry out escape.
It should be understood by one skilled in the art that realizing all or part of step of above method embodiment can pass through The relevant hardware of program instruction is completed, these programs can be stored in computer readable storage medium, which is performing When, perform step including the steps of the foregoing method embodiments;The computer readable storage medium packet ROM, RAM, disk or CD etc. The various media that can store program code.
The present invention provides a kind of realizations that message information is supported to extract and carry while IPSec messages NAT is supported to pass through Method and system, there are many method and the approach for implementing the technical solution, and the above is only the preferred implementation side of the present invention Formula, it is noted that for those skilled in the art, without departing from the principle of the present invention, may be used also To make several improvements and modifications, these improvements and modifications also should be regarded as falling into protection scope of the present invention.

Claims (7)

1. a kind of IPSec NAT through method that message information is supported to extract and carry passes through message including construction and parsing is worn More two stages of message, which is characterized in that the construction passes through message and includes:The strategy and template specified by user are to encryption Preceding data packet is extracted, sorts out and is assembled, and is carried out escape to the information content further according to data dictionary, is completed sampled data It arranges;It is complete in data packet to the UDP heads of the sampled data after arrangement successively packaging information head InforHeader and designated port Into after encryption, packaged sampled data is put into after the IP heads of ESP messages;
The parsing is passed through message and is included:The message received is parsed, sample information length is obtained, based on sample information Length deletes sampled data, obtains IPSec ESP messages and it is decrypted.
2. IPSec NAT through method according to claim 1, which is characterized in that the data dictionary is determined comprising user The sensitive vocabulary and universal word of justice and its corresponding escape content and safe class.
3. IPSec NAT through method according to claim 1, which is characterized in that described information head InforHeader packets Include identification field and length field, wherein the identification field show data behind UDP whether be InforHeader, the length field are used to show the length of sampled data.
4. IPSec NAT through method according to claim 1, which is characterized in that the construction passes through message by sending Peer-to-peer is held to complete, is included the following steps:
11) transmitting terminal peer-to-peer carries out deep analysis to message, obtains the key message in load;
12) preconfigured sample information template and data dictionary are obtained;
13) message information of step 11) extraction is constructed, and determined in data dictionary according to sample template into row format Justice carries out escape to the keyword in sample information;
14) it is the sample information packaging information head InforHeader constructed, encapsulates UDP heads, so far sample information has constructed Finish;
15) after message completes ipsec encryption processing, the sample information data segment that step 14) has constructed is inserted into the IP of IPSec After head, IPSec passes through message construction and finishes.
5. IPSec NAT through method according to claim 1, which is characterized in that the parsing passes through message by receiving Peer-to-peer is held to complete, is included the following steps:
21) receiving terminal peer-to-peer carries out IP and UDP packet parsings, when business pair is passed through in the port for parsing UDP messages for IPSec During the port numbers answered, go to step and 22) handle;Otherwise by former flow processing;
22) analytic message InforHeader obtains the identification field and length field of InforHeader, if identification field is closed Method goes to step and 23) handles, otherwise by former flow processing;
23) length field in InforHeader is obtained, according to this height of this length+UDP heading length+InforHeader Degree obtains the total length of sample information;
24) according to the total length of sample information, whole sampled datas including UDP, InforHeader are deleted, then right Remaining IPSec ESP messages are normally decrypted.
6. a kind of IPSec NAT ride through system that message information is supported to extract and carry, which is characterized in that including:
Constructing module, for being arranged to sampled data, then to the sampled data after arrangement successively packaging information head Packaged sampled data is put into after the IP heads of ESP messages by the UDP heads of InforHeader and designated port;
Parsing module for obtaining sample information length by parsing UDP port number, parsing InforHeader, is then based on Sample information length deletes sampled data, obtains IPSec ESP messages and it is decrypted;
Wherein, the strategy and template specified to the collation pass of sampled data based on user put forward data packet before encrypting It takes, sort out and assembles, escape is carried out to the information content further according to data dictionary and is completed.
7. IPSec NAT ride through system according to claim 6, which is characterized in that the constructing module includes:
Extraction unit for doing deep analysis to message before encryption, and extracts message information;
Sort out unit, for sorting out according to application type to the message information extracted;
Module units is assembled and is constructed to the information after extracting, sorting out for the template according to user configuration;
Escape unit, for carrying out escape to the keyword in the extraction information after assembling according to data dictionary.
CN201810026146.1A 2018-01-11 2018-01-11 Support message information extraction and the IPSecNAT traversing methods and system that carry Pending CN108200071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810026146.1A CN108200071A (en) 2018-01-11 2018-01-11 Support message information extraction and the IPSecNAT traversing methods and system that carry

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810026146.1A CN108200071A (en) 2018-01-11 2018-01-11 Support message information extraction and the IPSecNAT traversing methods and system that carry

Publications (1)

Publication Number Publication Date
CN108200071A true CN108200071A (en) 2018-06-22

Family

ID=62589056

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810026146.1A Pending CN108200071A (en) 2018-01-11 2018-01-11 Support message information extraction and the IPSecNAT traversing methods and system that carry

Country Status (1)

Country Link
CN (1) CN108200071A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109361590A (en) * 2018-12-25 2019-02-19 杭州迪普科技股份有限公司 It is a kind of to solve the obstructed method and apparatus of business access
WO2021037216A1 (en) * 2019-08-29 2021-03-04 华为技术有限公司 Message transmission method and device, and computer storage medium
CN112910729A (en) * 2021-01-27 2021-06-04 江苏农林职业技术学院 Method for supporting IPSec VPN data monitoring

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1445693A (en) * 2002-03-19 2003-10-01 微软公司 Safety digital data form and code forced implement policy
CN1697452A (en) * 2005-06-17 2005-11-16 中兴通讯股份有限公司 Method for protecting access security of IP multimedia subsystem based on IPSec passing through NAT
CN101543001A (en) * 2006-11-30 2009-09-23 艾利森电话股份有限公司 Packet handling in a mobile IP architecture
US20170104850A1 (en) * 2015-10-13 2017-04-13 Cisco Technology, Inc. Multi-hop wan macsec over ip

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1445693A (en) * 2002-03-19 2003-10-01 微软公司 Safety digital data form and code forced implement policy
CN1697452A (en) * 2005-06-17 2005-11-16 中兴通讯股份有限公司 Method for protecting access security of IP multimedia subsystem based on IPSec passing through NAT
CN101543001A (en) * 2006-11-30 2009-09-23 艾利森电话股份有限公司 Packet handling in a mobile IP architecture
US20170104850A1 (en) * 2015-10-13 2017-04-13 Cisco Technology, Inc. Multi-hop wan macsec over ip

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109361590A (en) * 2018-12-25 2019-02-19 杭州迪普科技股份有限公司 It is a kind of to solve the obstructed method and apparatus of business access
WO2021037216A1 (en) * 2019-08-29 2021-03-04 华为技术有限公司 Message transmission method and device, and computer storage medium
CN112910729A (en) * 2021-01-27 2021-06-04 江苏农林职业技术学院 Method for supporting IPSec VPN data monitoring

Similar Documents

Publication Publication Date Title
Dyer et al. Protocol misidentification made easy with format-transforming encryption
CN110011931B (en) Encrypted flow type detection method and system
US7398386B2 (en) Transparent IPSec processing inline between a framer and a network component
CN102300210B (en) LTE Non-Access Stratum ciphertext decryption methods and its monitoring signaling device
CY1108561T1 (en) PACKAGE DATA ARCHITECTURE SAFE ARCHITECTURE
CN108200071A (en) Support message information extraction and the IPSecNAT traversing methods and system that carry
Lucena et al. Syntax and semantics-preserving application-layer protocol steganography
EP3693859B1 (en) Method and system of latency assessment in a packet data network
CN102347870A (en) Flow rate security detection method, equipment and system
CN107666486A (en) A kind of network data flow restoration methods and system based on message protocol feature
CN110392044B (en) Information transmission method and device based on video networking
CN103441983A (en) Information protection method and device based on link layer discovery protocol
CN103227742B (en) A kind of method of ipsec tunnel fast processing message
CN110011786A (en) A kind of IP secret communication method of high safety
Anderson et al. Limitless http in an https world: Inferring the semantics of the https protocol without decryption
CN107124385A (en) A kind of SSL/TLS agreement clear data acquisition methods based on mirror image stream
CN106161386A (en) A kind of method and apparatus realizing that IPsec shunts
CN105979513B (en) A kind of decryption method and system of VoLTE network SGI interface
CN112104589B (en) End-to-end encryption method with width integration
CN114826748B (en) Audio and video stream data encryption method and device based on RTP, UDP and IP protocols
Pluskal et al. Netfox Detective: A tool for advanced network forensics analysis
CN115834026A (en) Safety encryption method based on industrial protocol
Wagner et al. Retrofitting Integrity Protection into Unused Header Fields of Legacy Industrial Protocols
CN110572415B (en) Safety protection method, equipment and system
Luo et al. Behavior-based method for real-time identification of encrypted proxy traffic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180622