CN101052046A - Anti-virus method and device for fire-proof wall - Google Patents

Anti-virus method and device for fire-proof wall Download PDF

Info

Publication number
CN101052046A
CN101052046A CNA2007101031596A CN200710103159A CN101052046A CN 101052046 A CN101052046 A CN 101052046A CN A2007101031596 A CNA2007101031596 A CN A2007101031596A CN 200710103159 A CN200710103159 A CN 200710103159A CN 101052046 A CN101052046 A CN 101052046A
Authority
CN
China
Prior art keywords
message
virus
module
fire compartment
compartment wall
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101031596A
Other languages
Chinese (zh)
Inventor
孙然
王刚
胡兆博
任磊磊
肖为剑
宋斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SECWORLD TECHNOLOGY (BEIJING) Co Ltd
Original Assignee
SECWORLD TECHNOLOGY (BEIJING) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SECWORLD TECHNOLOGY (BEIJING) Co Ltd filed Critical SECWORLD TECHNOLOGY (BEIJING) Co Ltd
Priority to CNA2007101031596A priority Critical patent/CN101052046A/en
Publication of CN101052046A publication Critical patent/CN101052046A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention adds the anti-virus function into the firewall using a security policy of the firewall so as to make the binding between the anti-virus function and the other functions of the firewall such that the firewall and anti-virus functions can be executed simultaneously, and the system resources can be greatly reduced.

Description

A kind of anti-virus method and device that is used for fire compartment wall
Technical field
The present invention is a kind of anti-virus method and device that is used for fire compartment wall, belongs to the safe practice field of network firewall.Relate to safety regulation and anti-virus mechanism.
Background technology
Anti-virus has important status in security fields, it focuses on finding virus timely and accurately and making mutually deserved processing, the anti-virus functionality of network security product mainly is at SMTP at present, POP3, FTP, messages such as HTTP carry out virus scan, the condition code of storing in content in the documents and the virus base, and to contain virus file carry out relevant treatment, if the file of transmission is the file of certain compressed format, then virus scan module need be with the compressed file decompress(ion), scanning All Files wherein.Therefore the event data stream amount is bigger, and anti-virus module then can take more processor time and internal memory, and inevitable other function to whole system is produced certain influence.The effective utilization of reduction system.Therefore present most of anti-virus products all are independently systems, have independently hardware or software equipment, and such defective is the cost that has increased considerably the user.Be unfavorable for administering and maintaining.Yet for network security products such as fire compartment walls, data traffic is probably considerably beyond the data traffic of the network interface of common PC, carry the transfer of data of one or several local area network (LAN)s simultaneously, wherein may comprise numerous personnel's mail transmission or World Wide Web (WWW) transmission of Information.
The major function of fire compartment wall is that the data message on the network is carried out the part restriction, only allows user-defined message to pass through.Do not possess the killing ability of virus, PAA then provides the function of anti-virus, but does not have the separating capacity of message, if the user needs this two functions simultaneously, must buy two complete equipments, and is with high costs.
If anti-virus functionality is integrated on the fire compartment wall, use other function of fire compartment wall simultaneously again, the performance burden of increase networking products that will be bigger influences the use of other function.
Summary of the invention
The present invention designs at the problem of depositing in the above-mentioned prior art just a kind of anti-virus method and device that is used for fire compartment wall is provided, its thinking is to utilize the security strategy of fire compartment wall self, anti-virus functionality is added on it, its objective is provides a kind of anti-virus method that is used for fire compartment wall, this method can be utilized the characteristics of fire compartment wall itself, other function setting on anti-virus functionality and the fire compartment wall is bound, the work of fire compartment wall and the work of anti-virus are carried out simultaneously, saved the resource of system significantly, reduced system simultaneously and purchased the cost of building and moving.Another object of the present invention has just provided a kind of device that is applicable to the anti-virus method of above-mentioned fire compartment wall, and when this device used the function of fire compartment wall and anti-virus functionality at the same time, system got the requirement that performance still can reach the user.
The objective of the invention is to realize by following measure:
This kind is used for the anti-virus method of fire compartment wall, it is characterized in that: steps of the method are:
(1) on fire compartment wall, sets up the user-defined safety regulation that packet is checked, comprise requirement in the safety regulation to the five-tuple attribute in the IP message that meets ICP/IP protocol in the packet, the kind that also comprises the application layer protocol type that to carry out the anti-virus processing, and the requirement of the anti-virus processing of these protocol type kind needs;
(2) check the IP message that meets ICP/IP protocol in the packet that enters fire compartment wall, read wherein five-tuple-source address, far distance port, destination address, destination interface, protocol type-attribute, and itself and user-defined safety regulation compared, if meet user-defined safety regulation, then allow this message by this inspection, otherwise, abandon this message;
(3) for the message that passes through, check the data of message inside once more, determine the protocol type of application layer, this moment, processing mode also was divided into following two kinds:
[3-1] if when protocol type is four kinds of FTP, HTTP, POP, SMTP, then message is sent to anti-virus module and carries out anti-virus and handle; If anti-virus module thinks that this message is safe, then sends fire compartment wall with message.Here be meant by network and send to the destination address that the message that writes down in the information of message need arrive.Otherwise, then message is handled according to user's being provided with of anti-virus functionality.
[3-2] sends fire compartment wall if protocol type is not one of above-mentioned four kinds or disappearance with message.
Be applicable to the above-mentioned device that is used for the anti-virus method of fire compartment wall, it is characterized in that; This device comprises:
Protocol stack module: all that flow into fire compartment wall meet the IP message of ICP/IP protocol all will be through this module, the data here refer to the IP message, read 5 tuple information in the IP message that enters fire compartment wall, and itself and user-defined safety regulation are compared;
Data channel module: after protocol stack module allows the IP message to pass through, the IP message will arrive the data channel module, when the IP message need carry out the anti-virus processing, this module can continue to check previously described five-tuple information, and source address is met the message that the user is provided with send to anti-virus module, when if the user does not specify this message to need virus checking, module can send to message other module, perhaps directly sends to the user;
Anti-virus module: this module is carried out virus checking and processing to the IP message that sends over;
Above-mentioned three modules connect successively.
In above-mentioned 3 modules, the performance cost maximum be exactly anti-virus module, generally, anti-virus module will scan all data that enter system, therefore no matter data safety whether, and system all will check one time, caused the wasting of resources, and when in conjunction with the security strategy of fire compartment wall, protocol stack only thinks that with the user unsafe data send to anti-virus module, makes other can guarantee that safe data walk around virus checking.So reduced the amount of information that anti-virus module need be handled to a great extent, promptly guaranteed the safety of data, the problem that has solved stable performance and effectively utilized is arranged.
This kind that technology of the present invention provided is in conjunction with the anti-virus scheme of security strategy, can on the basis of sacrificing security not, save system resource significantly, when accomplishing to use simultaneously the function of fire compartment wall and anti-virus functionality, system gets the requirement that performance still can reach the user.
Description of drawings
Fig. 1 is that the data of the environment for use of technical solution of the present invention constitute schematic diagram
Fig. 2 is a software flow pattern in the technical solution of the present invention
Fig. 3 is the structured flowchart of the device of technical solution of the present invention
Embodiment
In the network environment of reality, unsafe Data Source can be thought the data from internet, and perhaps certain can determine to contain the server of unsafe factor,
Network security product for a company or department, data flow may be from a lot of networks, comprise internet, other department of same company, the VPN network of other places branch company, wherein the data of some network are not need anti-virus scan, for example from the data of other department or from data in server, these network messages of correct differentiation, only scanning needs to take precautions against and vigilant data.
Shown in accompanying drawing 1, a department has a fire compartment wall 4, and several work station 5, one station servers 6 are arranged in the department, a network interface 41 of fire compartment wall 4 connects Internet, interface 42 connects all the other departments of same company, and interface 43 connects the VPN network of distal portion company, and interface 44 connects local work station 5, local work station 5 can pass through VPN access to netwoks remote equipment, visit Internet and other department's swap data also can be visited local server.
According to above-mentioned principle, the present invention can only scan at the data from some particular ip address, and the individual event scanning of data flow also can be provided, and will save very big performance cost, accelerates the time of data by secure network products such as fire compartment walls.
Fire compartment wall 4 is by comprising 4 self adaptation 100 m ethernet cards, the computer equipment of 41,42,43,44 network interfaces in the accompanying drawing 1 is provided respectively, has wherein moved network enabled and transmit operating system with the firewall security rule process.And in operating system, install and realize the needed computer program file of technical solution of the present invention, the flow process of this computer program is as shown in Figure 2.
Said system adopts the described anti-virus method that is used for fire compartment wall of technical solution of the present invention at work, and its step is as follows:
(1) many safety regulations of definition on fire compartment wall, comprise requirement in the safety regulation to the five-tuple attribute in the IP message that meets ICP/IP protocol in the packet, the kind that also comprises the application layer protocol type that to carry out the anti-virus processing, and the requirement of the anti-virus processing of these protocol type kind needs;
Three safety regulations wherein are as follows:
[1-1] is provided with and allows source address is 202.108.33.32, and protocol type is that the IP message of SMTP can pass through fire compartment wall, and requires fire compartment wall that message is carried out the anti-virus processing.Be set at dropping packets when anti-virus module finds that message contains virus." 202.108.33.32 " wherein is the IP address of the server of the last website of Internet.The effect of this safety regulation is that to allow the address be that the server of 202.108.33.32 sends mail to in-company user.But need carry out anti-virus handles.
[1-2] is provided with and allows destination address is 192.168.10.100, and protocol type is that the IP message of FTP can pass through fire compartment wall, and requires fire compartment wall that message is carried out the anti-virus processing.Be set at dropping packets when anti-virus module finds that message contains virus.192.168.10.100 wherein is the address of server 6.The effect of this safety regulation is to allow the user to download or upload file from server, handles but need carry out anti-virus.
[1-3] is provided with and allows source address is 192.168.20.0, and protocol type is that the IP message of SMTP can pass through fire compartment wall, does not require that fire compartment wall carries out anti-virus to message and handles.The address of " 192.168.20.0 " long-range VPN network wherein.The effect of this safety regulation is that the main frame of long-range VPN network internal can not carry out virus checking to the inner mail that sends of department.
(2) fire compartment wall will begin to check that all enter the IP message of fire compartment wall this moment, read wherein five-tuple-source address, far distance port, destination address, destination interface, protocol type-attribute, and itself and user-defined safety regulation compared, if meet user-defined safety regulation, then allow this message to pass through, otherwise, abandon this message;
The concrete operations that can occur are as follows:
[2-1] then sends to anti-virus module with message if the source address of message is 202.108.33.32.
[2-2] then sends to anti-virus module with message if the destination address of message is 192.168.10.100.
[2-3] then sends the direct slave firewall of message if the source address of message belongs to the 192.168.20.0 network segment.
[2-4] message does not meet above-mentioned any one condition, then abandons.
(3) for the message that passes through, check the data of message inside, determine whether application layer protocol is SMTP or FTP, the processing mode of this moment also is divided into following two kinds:
[3-1] then sends to message anti-virus module and carries out the anti-virus processing if find that protocol type is SMTP or File Transfer Protocol;
[3-2] then sends fire compartment wall with this message if protocol type is not SMTP and FTP or disappearance.
Can see like this, safe because the message on the Internet is not thought, handle so will carry out anti-virus; All to carry out the anti-virus processing so send to the mail of internal network by 202.108.33.32.Equally, in order to protect the safety of server 6, the file that then is sent to server 6 needs anti-virus to handle equally.And that the information of far-end VPN network can be thought is safe, therefore it is not carried out anti-virus and handles, and handles so the mail that all main frames from the VPN network send to department's internal network does not carry out anti-virus.So reached the purpose of only handling non-safety information, saved performance cost.
Below check the setting about anti-virus functionality scope of application attribute of inquiring user, determine whether the user specifies this protocol type need carry out anti-virus and handle, if desired, then anti-virus module writes a temporary file with this message content, continue to accept to belong to it the message that same TCP connects, repeat this step, after all messages that belong to this TCP connection arrive, finish the action of writing of temporary file.Anti-virus module reads the virus signature of virus base and the content of the temporary file that write just now compares, and has occurred some virus signatures in the temporary file, thinks that then there is virus in this temporary file, the deletion temporary file.Otherwise, temporary file is reverted to IP message when entering fire compartment wall, send fire compartment wall.
Be applicable to the above-mentioned device that is used for the anti-virus method of fire compartment wall, it is characterized in that; This device comprises:
Protocol stack module 1: all that flow into fire compartment wall meet the IP message of ICP/IP protocol all will be through this module, the data here refer to the IP message, read 5 tuple information in the IP message that enters fire compartment wall, and itself and user-defined safety regulation compared, and decision being set whether abandoning this message according to the user.
Data channel module 2: after protocol stack module 1 allows the IP message to pass through, the IP message will arrive data channel module 2, when the IP message need carry out the anti-virus processing, this module can continue to check previously described five-tuple information, and source address is met the message that the user is provided with send to anti-virus module, when if the user does not specify this message to need virus checking, module can send to message other module, perhaps directly send to the user, so just accomplish only to send the user and thought the message that need carry out virus checking, thereby saved the unnecessary performance expense greatly.
Anti-virus module 3: this module is carried out virus checking and processing to the IP message that sends over, after message is sent to anti-virus module, module can be carried out virus checking to the data file in the message, because the data that message comprises are limited, so a complete data file needs a lot of messages to transmit usually, module at first will be reassembled into the information in these messages original data file, then virus signature in the database of virus information and data file are compared, if in message, found known virus signature, think that then there is virus in this data file, and with associated packet loss, like this, contain viral data and just can not arrive the user there.
Shown in accompanying drawing 3, above-mentioned three modules connect successively.
At first, all data messages that enter fire compartment wall enter protocol stack module 1, the undefined message of user can not pass through, and in the message that allows to pass through, still can not think it all is safe, for example from internal server and data internal network, or from the data of far-end VPN passage, can think safe, data from Internet are then not all right, this part data will mail to anti-virus module 3 through data channel module 2 and check so, send to internal network afterwards.
Technical solution of the present invention advantage compared with prior art is to determine according to the five-tuple of data message Decide whether carry out virus scan, rather than only for certain agreement data are carried out virus scan, this Sample can reduce the data volume of scanning, and the quickening system gets the reaction time, reduces accounting for of system resource With, can not reduce the security of product simultaneously. Make the safety product unlatching anti-virus functionality such as fire wall After performance reduction amount reduce to minimum.

Claims (2)

1. anti-virus method that is used for fire compartment wall is characterized in that: steps of the method are:
(1) on fire compartment wall, sets up the user-defined safety regulation that packet is checked, comprise requirement in the safety regulation to the five-tuple attribute in the IP message that meets ICP/IP protocol in the packet, the kind that also comprises the application layer protocol type that to carry out the anti-virus processing, and the requirement of the anti-virus processing of these protocol type kind needs;
(2) check the IP message that meets ICP/IP protocol in the packet that enters fire compartment wall, read wherein five-tuple-source address, far distance port, destination address, destination interface, protocol type-attribute, and itself and user-defined safety regulation compared, if meet user-defined safety regulation, then allow this message to pass through, otherwise, abandon this message;
(3) for the message that passes through, check the data of message inside once more, determine the protocol type of application layer, this moment, processing mode also was divided into following two kinds:
[3-1] if when protocol type is four kinds of FTP, HTTP, POP, SMTP, then message is sent to anti-virus module and carries out anti-virus and handle;
[3-2] sends fire compartment wall if protocol type is not one of above-mentioned four kinds or disappearance with message.
2. one kind is applicable to the above-mentioned device that is used for the anti-virus method of fire compartment wall, it is characterized in that; This device comprises:
Protocol stack module (1): all that flow into fire compartment wall meet the IP message of ICP/IP protocol all will be through this module, the data here refer to the IP message, read 5 tuple information in the IP message that enters fire compartment wall, and itself and user-defined safety regulation are compared;
Data channel module (2): after protocol stack module (1) allows the IP message to pass through, the IP message will arrive data channel module (2), when the IP message need carry out the anti-virus processing, this module can continue to check previously described five-tuple information, and source address is met the message that the user is provided with send to anti-virus module, when if the user does not specify this message to need virus checking, module can send to message other module, perhaps directly sends to the user;
Anti-virus module (3): this module is carried out virus checking and processing to the IP message that sends over;
Above-mentioned three modules connect successively.
CNA2007101031596A 2007-05-22 2007-05-22 Anti-virus method and device for fire-proof wall Pending CN101052046A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101031596A CN101052046A (en) 2007-05-22 2007-05-22 Anti-virus method and device for fire-proof wall

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101031596A CN101052046A (en) 2007-05-22 2007-05-22 Anti-virus method and device for fire-proof wall

Publications (1)

Publication Number Publication Date
CN101052046A true CN101052046A (en) 2007-10-10

Family

ID=38783235

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101031596A Pending CN101052046A (en) 2007-05-22 2007-05-22 Anti-virus method and device for fire-proof wall

Country Status (1)

Country Link
CN (1) CN101052046A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714958B (en) * 2009-10-31 2011-11-30 福建伊时代信息科技股份有限公司 Multifunctional comprehensive security gateway system
CN102289614A (en) * 2010-06-18 2011-12-21 三星Sds株式会社 Anti-malware system and operating method thereof
CN102497371A (en) * 2011-12-13 2012-06-13 曙光信息产业(北京)有限公司 Sampling equipment based on quintuple and load contents
CN102594623A (en) * 2011-12-31 2012-07-18 成都市华为赛门铁克科技有限公司 Data detection method and device for firewalls
CN101795267B (en) * 2009-12-30 2012-12-19 成都市华为赛门铁克科技有限公司 Method and device for detecting viruses and gateway equipment
CN102891855A (en) * 2012-10-16 2013-01-23 北京神州绿盟信息安全科技股份有限公司 Method and device for securely processing network data streams
CN103746996A (en) * 2014-01-03 2014-04-23 汉柏科技有限公司 Packet filtering method for firewall
CN104022998A (en) * 2013-03-01 2014-09-03 北京瑞星信息技术有限公司 Network transmission data virus detection processing method
CN104519065A (en) * 2014-12-22 2015-04-15 北京卓越信通电子股份有限公司 Implementation method of industrial control firewall supporting Modbus TCP protocol filtering
CN104539600A (en) * 2014-12-22 2015-04-22 北京卓越信通电子股份有限公司 Industrial control firewall implementing method for supporting filtering IEC 104 protocol
CN104702584A (en) * 2013-12-10 2015-06-10 中国科学院沈阳自动化研究所 Modbus communication access control method based on rule self-learning
CN105099821A (en) * 2015-07-30 2015-11-25 北京奇虎科技有限公司 Flow monitoring method and apparatus based on cloud virtual environment
CN105117647A (en) * 2015-08-18 2015-12-02 国家计算机网络与信息安全管理中心广东分中心 Trojan behavior recovery method
CN105407106A (en) * 2015-12-23 2016-03-16 北京奇虎科技有限公司 Access control method and device
CN107342969A (en) * 2016-05-03 2017-11-10 阿里巴巴集团控股有限公司 System, the method and apparatus of message identification
CN107786500A (en) * 2016-08-25 2018-03-09 北京计算机技术及应用研究所 Terminal security module centralized management system
CN112351014A (en) * 2020-10-28 2021-02-09 武汉思普崚技术有限公司 Firewall security policy compliance baseline management method and device between security domains
CN112751839A (en) * 2020-12-25 2021-05-04 江苏省未来网络创新研究院 Anti-virus gateway processing acceleration strategy based on user traffic characteristics

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714958B (en) * 2009-10-31 2011-11-30 福建伊时代信息科技股份有限公司 Multifunctional comprehensive security gateway system
CN101795267B (en) * 2009-12-30 2012-12-19 成都市华为赛门铁克科技有限公司 Method and device for detecting viruses and gateway equipment
CN102289614B (en) * 2010-06-18 2015-07-29 三星Sds株式会社 Anti-malware system and method for operating thereof
CN102289614A (en) * 2010-06-18 2011-12-21 三星Sds株式会社 Anti-malware system and operating method thereof
CN102497371A (en) * 2011-12-13 2012-06-13 曙光信息产业(北京)有限公司 Sampling equipment based on quintuple and load contents
WO2013097475A1 (en) * 2011-12-31 2013-07-04 华为技术有限公司 Data detecting method and device for firewall
CN102594623A (en) * 2011-12-31 2012-07-18 成都市华为赛门铁克科技有限公司 Data detection method and device for firewalls
US9398027B2 (en) 2011-12-31 2016-07-19 Huawei Technologies Co., Ltd. Data detecting method and apparatus for firewall
CN102594623B (en) * 2011-12-31 2015-07-29 华为数字技术(成都)有限公司 The data detection method of fire compartment wall and device
CN102891855A (en) * 2012-10-16 2013-01-23 北京神州绿盟信息安全科技股份有限公司 Method and device for securely processing network data streams
CN102891855B (en) * 2012-10-16 2015-06-03 北京神州绿盟信息安全科技股份有限公司 Method and device for securely processing network data streams
CN104022998A (en) * 2013-03-01 2014-09-03 北京瑞星信息技术有限公司 Network transmission data virus detection processing method
CN104022998B (en) * 2013-03-01 2016-12-28 北京瑞星信息技术股份有限公司 Transmitted data on network Viral diagnosis processing method
CN104702584B (en) * 2013-12-10 2017-11-28 中国科学院沈阳自动化研究所 A kind of Modbus communications access control methods based on self-learning-ruler
CN104702584A (en) * 2013-12-10 2015-06-10 中国科学院沈阳自动化研究所 Modbus communication access control method based on rule self-learning
CN103746996A (en) * 2014-01-03 2014-04-23 汉柏科技有限公司 Packet filtering method for firewall
CN104519065B (en) * 2014-12-22 2018-05-01 北京卓越信通电子股份有限公司 A kind of industry control method of realizing fireproof wall for supporting filtering Modbus Transmission Control Protocol
CN104539600A (en) * 2014-12-22 2015-04-22 北京卓越信通电子股份有限公司 Industrial control firewall implementing method for supporting filtering IEC 104 protocol
CN104519065A (en) * 2014-12-22 2015-04-15 北京卓越信通电子股份有限公司 Implementation method of industrial control firewall supporting Modbus TCP protocol filtering
CN105099821A (en) * 2015-07-30 2015-11-25 北京奇虎科技有限公司 Flow monitoring method and apparatus based on cloud virtual environment
CN105099821B (en) * 2015-07-30 2020-05-12 奇安信科技集团股份有限公司 Method and device for monitoring flow in virtual environment based on cloud
CN105117647A (en) * 2015-08-18 2015-12-02 国家计算机网络与信息安全管理中心广东分中心 Trojan behavior recovery method
CN105407106A (en) * 2015-12-23 2016-03-16 北京奇虎科技有限公司 Access control method and device
CN107342969A (en) * 2016-05-03 2017-11-10 阿里巴巴集团控股有限公司 System, the method and apparatus of message identification
CN107342969B (en) * 2016-05-03 2021-04-20 阿里巴巴集团控股有限公司 Message identification system, method and device
CN107786500A (en) * 2016-08-25 2018-03-09 北京计算机技术及应用研究所 Terminal security module centralized management system
CN112351014A (en) * 2020-10-28 2021-02-09 武汉思普崚技术有限公司 Firewall security policy compliance baseline management method and device between security domains
CN112351014B (en) * 2020-10-28 2022-06-07 武汉思普崚技术有限公司 Firewall security policy compliance baseline management method and device between security domains
CN112751839A (en) * 2020-12-25 2021-05-04 江苏省未来网络创新研究院 Anti-virus gateway processing acceleration strategy based on user traffic characteristics

Similar Documents

Publication Publication Date Title
CN101052046A (en) Anti-virus method and device for fire-proof wall
CA2594020C (en) Method, systems, and computer program products for implementing function-parallel network firewall
US10735379B2 (en) Hybrid hardware-software distributed threat analysis
US7725938B2 (en) Inline intrusion detection
US20170250953A1 (en) Hybrid hardware-software distributed threat analysis
DE60308260T2 (en) A method and apparatus for efficiently comparing responses to previously communicated requests by a network node
US20130254766A1 (en) Offloading packet processing for networking device virtualization
CN1406351A (en) System, device and method for rapid packet filtering and preocessing
JP2004503146A (en) How to prevent denial of service attacks
CN1838592A (en) Firewall method and system based on high-speed network data processing platform
Fulp An independent function-parallel firewall architecture for high-speed networks (short paper)
CN101060521A (en) Information packet filtering method and network firewall
CN1708959A (en) Method, router or switch for software and hardware packet flow forwarding
CN1384639A (en) Distributed dynamic network security protecting system
CN1905555A (en) Fire wall controlling system and method based on NGN service
CN101051891A (en) Method and device for safety strategy uniformly treatment in safety gateway
CN112367278B (en) Cloud gateway system based on programmable data switch and message processing method thereof
US20020131364A1 (en) Handling of data packets
US8191132B1 (en) Scalable transparent proxy
CN100339845C (en) Chain path layer location information filtering based on state detection
CN1777148A (en) Routing table next-hop IP address to MAC address analytic method
CN1741473A (en) A network data packet availability deciding method and system
KR101275709B1 (en) Packet processing system for network based data loss prevention capable of distributed processing depending on application protocol and method thereof
CN1881938A (en) Method and system for preventing and detecting proxy
CN1848795A (en) Method for realizing large data packet quick retransmission in real-time communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20071010