CN101068229A - Content filtering gateway realizing method based on network filter - Google Patents

Content filtering gateway realizing method based on network filter Download PDF

Info

Publication number
CN101068229A
CN101068229A CNA2007101003312A CN200710100331A CN101068229A CN 101068229 A CN101068229 A CN 101068229A CN A2007101003312 A CNA2007101003312 A CN A2007101003312A CN 200710100331 A CN200710100331 A CN 200710100331A CN 101068229 A CN101068229 A CN 101068229A
Authority
CN
China
Prior art keywords
packet
module
connection
network
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007101003312A
Other languages
Chinese (zh)
Other versions
CN100558089C (en
Inventor
张建标
孙鸿斌
艾蓉
张正国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CNB2007101003312A priority Critical patent/CN100558089C/en
Publication of CN101068229A publication Critical patent/CN101068229A/en
Application granted granted Critical
Publication of CN100558089C publication Critical patent/CN100558089C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method for realizing content filtering gateway based on network filter includes realizing network content analysis and real time monitor as well as realizing purpose of filtering application layer information at network layer based on Linux system platform, utilizing network filter Net-filter frame to carry out collection and filtering on data packet under kernel state for optimizing network path of data packet and for raising collection efficiency of data, furthermore using shared internal memory technique of user space and kernel space to submit session content from kernel state to content filtering module of user state.

Description

A kind of content filtering gateway implementation method of filter Network Based
Technical field
The invention belongs to communication technical field, specific design kernel state data packet is gathered and is filtered, the session reduction, and user's attitude is communicated by letter with kernel state, the realization of transparent mode etc.Can filter according to the session complete content, stop illegal packet to pass through.
Background technology
The Internet has satisfied the paramount boundary of the breakthrough space-time of " soon " and " without limits " that people try hard to gain for thousands of years, realizes the dream of people's freedom, and he has agreed with people's original person's character, and " freedom " degree that reaches surmounted former people's the imagination.The opening of the Internet, allow people like never before enjoy the freedom of the various information of unfettered acquisition issue speech, but also brought many information security issues simultaneously.
Data show that the teenager spent the time that has been less than online in the time of seeing TV in recent years, network is just becoming the world, the acquire knowledge of teenager understanding, a kind of instrument of amusement and recreation.The information content in the network is multifarious, mostly not through strict checking on and screening, though can satisfy the needs in part education, information and the leisure, but also exist to allow the head of a family, society's headache in a large number, easily obscene pornographic, the websites such as violence is terrified, anti-government and racial discrimination that the teenager is had a negative impact.
The second class safety problem is the threat of virus infections and spam.The harmful code that is hidden in the network is attacked computer by virus, worm, trojan horse program etc., and these viruses are constantly increasing, and development speed is suitable fast, and destructiveness is more and more big.Intellectuality, hommization, hiddenization, variation are also in the development trend that becomes the new century computer virus gradually.A large amount of spams has also had a strong impact on the normal use of user to the Internet, a large amount of spams have reduced network operation efficient and have taken the network bandwidth, cause mail server congested, and then reduce whole network operating efficiency, bring influence for other users on the station server that coexists.
An other category information safety problem is exactly the threat to confidential information.Utilize now network steal or the case of leakage company secret of common occurrence.This behavior has brought huge harm to enterprise.The newest fruits of enterprise, core competitiveness may not exist in a flash, thereby causes enormous economic loss.The enterprise that has is for fear of this phenomenon, even forbids that the employee goes up the Internet, and this has brought very big inconvenience to work undoubtedly.
Information filtering is the new problem of network security, and its task is to filter out non-demand information relatively more fixing in one period from dynamic information source.By in network, adding the content analysis filtering function, internally can help protected network to eliminate the leakage that confidential information is caused by network, externally can filter out unhealthy content and junk information in the network.Both can stop the infringement of flame, adapt to the requirement of society, simultaneously the ideology aspect to people, by standard user's internet behavior, increase work efficiency, rationally utilize Internet resources, reduce the infringement of virus, the basic intension of information filtering technology that Here it is to network.
At present, comprise the packet filtering technology of layer Network Based and based on the agent skill group of application layer in the filtration of network boundary.
The packet filtering technology of layer Network Based, according to the packet header source address, signs such as destination address and port numbers, protocol type determine whether to allow packet to pass through.Have only the packet that satisfies filter logic just to be forwarded to the corresponding target ground port of export, remainder data Bao Ze is abandoned from data flow.But this mode can't be understood application layer message, and most of information filtering is all carried out at application layer, so be difficult to carry out information filtering.When this mode is carried out information filtering in addition, be to carry out single packet filtering,, influence accuracy owing to lack context relation information.
Based on the agent skill group of application layer, also be application gateway, it acts on application layer, and the network traffic flow that has been characterized in complete " obstruct " by to every kind of special Agent of application service establishment, realizes monitoring and the effect of control application layer communication stream.Application level proxy can be understood various application protocols, can easily carry out information filtering, but opaque to the user, is necessary for every kind of application and writes different Agents respectively.And speed is slower, and is bigger to network performance.
Summary of the invention
The objective of the invention is to propose a kind of content filtering gateway implementation method of filter Network Based, can improve the efficient of data acquisition, illegal packet is carried out real-time blocking-up, with transparent way work, efficiently in network layer filtration application layer information.
A kind of content filtering gateway implementation method of filter Network Based, with content filtering gateway transparent be connected on network boundary, in no IP mode, filter the data of all local area network (LAN)s of coming in and going out in network layer, the content filtering gateway of the telling operation Linux kernel of institute 2.4 operating systems, two network interface cards are installed, and every network interface card all is set to promiscuous mode, uses two network interface cards of brctl configuration to realize transparent being connected on the network boundary as bridge.
The invention is characterized in and contain following steps successively:
Step 1, initialization:
Be provided with in the described content filtering Central Shanxi Plain:
The packet capture module, processing data packets module, and packet forwarding module, these modules are operated in the kernel state of linux system, also are provided with content analysis module, are operated in user's attitude; In described these modules:
The packet capture module has been registered the filter function of setting, and for those packets that need transmit, is sent to the packet forwarding module and transmits, and carries out the packet of information filtering for needs, then is sent to the processing data packets module;
The processing data packets module, the tcp data bag that the needs that the packet trapping module is sent carry out content analysis, at first by sequence number order buffer memory in buffering area, when capturing all packets of a connection, restore the application layer data content of this connection, give the content analysis module that is operated in user's attitude and analyze, legally just give all packets that the packet forwarding module is transmitted this connection successively, illegally just block this connection, its treatment step is as follows successively:
Treatment step (1): for each packet is set up an inode structures, structure comprises three: the socket buffer pointer of this bag, the sequence number of this bag, point to the pointer of next packet inode structures, first packet that is a connection is set up the index node header structure, sign as this TCP connection, this structure comprises: the socket buffer pointer of this bag, the sequence number of this bag, source IP address, purpose IP address, source port, destination interface, point to the pointer of next packet inode structures, construct a packet array of indexes again, pointer that points to the index node header structure of each storage in the array, the index of all packets is safeguarded by a two-dimensional chain table like this, laterally store the packet index that same TCP connects, the packet index that vertically storage difference connects, each is initialized as 0 to set affiliated packet array of indexes, and the packet index is inserted in the two-dimensional chain table;
Treatment step (2): when the tcp data bag arrived, whether the data length of judgment data bag was 0, if 0, check whether the Fin flag bit of packet is 1, the Fin flag bit is a TCP johning knot bundle flag, if be not 1, just should wrap forwarding; If 1, show that then the affiliated TCP connection of this packet finishes, and carries out the content reduction to this connection; If the data length of packet is not 0, then need the index node of this packet is inserted in the two-dimensional chain table;
Treatment step (3): whether first element of judgment data bag array of indexes is 0, if be 0, then creates the index node header structure for this packet, and first packet that connects as article one inserts two-dimensional chain table; If be not 0, judge whether this packet belongs to this connection, according to source IP address, purpose IP address, source port, these four unique definite connections of destination interface are not if belong to this connection, then compare with other elements of array successively, it is empty connecting under finding or finding an array element, if array element is empty, then creates the index node header structure for this packet, first packet as a new connection inserts two-dimensional chain table, if found affiliated connection, judge whether to be first packet, if, create the index node header structure, insert this and connect first position; If not, create inode structures and press TCP sequence number insertion tram, and preserve the head pointer of this connection, judge at last whether this packet Fin flag bit is 1, if be not 1, utilize network filter Netfilter framework standard return value NF_STOLEN, tell the operating system protocol stack no longer this packet to be handled; If be 1, carry out the content reduction to connecting under this packet;
Treatment step (4): judge whether to obtain treating the head pointer of content reduction connection,, in array, find this connection if do not have; If obtain, just take out the application layer data that this connects each packet successively, put into shared buffer;
The content analysis filtering module, keeper's designated key speech, and the weight of each keyword, and set all and connect common weight limit of obeying, after receiving the content analysis request that the processing data packets module is sent, from described shared buffer, read the application layer data of this connection, by the QS-DFSA algorithm, be that reverse finite automaton computer step-length string matching algorithm is added up the occurrence number that each sets keyword, calculate the product of each keyword weight and occurrence number, addition summation again obtains the weight of this connection, and all of the weight that will connect and keeper's setting are connected jointly the filtration weight limit of obedience and compare again, surpass weight limit and just think illegal, otherwise be exactly legal;
Step 2, carry out packet content successively according to the following steps and filter:
Step 2.1: the packet capture module after receiving the tcp data bag that network is sent, according to source IP address, purpose IP address, source port, destination interface, protocol type for the packet that needs are transmitted, then sends to the packet forwarding module and transmits; Needs are carried out the packet of information filtering, send to the processing data packets resume module;
Step 2.2: the processing data packets module is after receiving the tcp data bag that need carry out information filtering, handle by described processing data packets step, after finishing, a connection just restores the data of this connection, put into shared buffer, and the content of announcement analysis module removes the shared buffer read data;
Step 2.3: content analysis module is after receiving processing data packets module notice, and read data is analyzed from shared buffer, and the result is returned to the processing data packets module;
Step 2.4: the blocking-up of processing data packets module is illegal to be connected; Giving the packet forwarding module for legal connection transmits.
Described processing data packets module will pass to the information filtering module of user's attitude through the original contents that TCP session reduction obtains by the method for user's space and kernel spacing shared drive.
Described processing data packets module when carrying out TCP session reduction, is buffered in the packet that contains data in this connection in the gateway by the TCP sequence number successively, and replaces receiving terminal to send the affirmation bag to transmitting terminal.
When described data forwarding module is transmitted packet successively by the TCP sequence number, contemporary for transmitting terminal confirmation of receipt bag.
Application level proxy is the filtration of carrying out at user's space.After packet is caught by network interface card, flow through each layer in the operating system network protocol stack, arrive application layer at last and filtering.Also have some user's spaces packet capture technology commonly used, they for example utilize the SOCKET raw socket from the packet that data link layer is directly caught, Libpcap etc., but all be to adopt the mode of system call to realize.Packet from kernel state when user's attitude transmits, be with single message driving mechanism, promptly application layer is whenever carried out primary system and is called, and reads a packet from kernel.This method is separated with operating system nucleus, has very big drawback.System call is unusual consume system resources, and each system call all can bring a context to switch, and the hit rate of Cache is had a significant impact.Along with the increase of network traffics, the increase of packet in the network, system call will be very frequent, has a strong impact on systematic function.Add and whenever catch all memory copyings once of a packet, make network data acquisition become the bottleneck of whole contents filtration system from kernel state to user's attitude.
By relatively finding that the solution of the present invention and technology have following characteristics:
Transparent working method makes the easier maintenance of network, is that fire compartment wall is not easy to be attacked.
Optimize network path.Carry out packet filtering at kernel spacing and just there is no need to travel through whole network protocol stack, Netfilter is the packet of catching in network layer, destiny that just can the determination data bag here, and some packets just there is no need flowing to the upper strata.
Reduce the switching of user's space and kernel spacing.For example the SOCKET raw socket has been caught all packets from data link layer, they is delivered to user's space judge.And in the filtration that kernel spacing carries out, be under kernel state, to filter, only transmit the user and want the data that obtain to user's space.
Session is reduced to TCP, avoids the accuracy of the filtration that reduces greatly because session information is imperfect in the filter type packet-by-packet.
During the session reduction, System Agent receives, and sends and confirms, has solved data cached influence to communication, has safeguarded the transparency.
Utilize buffering further to reduce the switching of user's space and kernel spacing.Under kernel state, open up buffering area, in batches transmit data to user's space.
Utilize share memory technology, reduce the data copy and switch with the space.
Description of drawings
Fig. 1 is the network insertion figure of the content filtering gateway of a kind of filter Network Based of the present invention;
Fig. 2 is the overall framework of the content filtering gateway of a kind of filter Network Based of the present invention;
Fig. 3 is the data structure that TCP session reduction is used among the present invention;
Fig. 4 is flow chart of data processing figure among the present invention;
Fig. 5 is the content analysis module workflow diagram;
Fig. 6 is the workflow diagram of the content filtering gateway of a kind of filter Network Based of the present invention.
Embodiment
Below in conjunction with accompanying drawing the present invention is described in further detail.
The present invention, a kind of content filtering gateway of filter frame Network Based, purpose is to realize real-time information filtering at network boundary, in network layer filtration application layer information.Core of the present invention is as Fig. 1, and the gateway of telling (2) is installed two network interface cards, and two network interface cards all are set to promiscuous mode, uses two network interface cards of brctl configuration to be bridge.Network interface card of gateway connects router (1), and this is unique outlet that network leads to internet; Another piece network interface card connects switch (3), and system just filters in network with the transparent way string like this.Equipment on network configuration and the network does not need to make any change like this, just can be in the content filtering system access network; When content filtering system breaks down, also can directly from network, shift out, handle, do not influence the network operate as normal.Core of the present invention also comprises TCP connection carrying out session reduction, gives user's space with the initial data that restores from kernel spacing by shared drive.
As Fig. 2, packet capture module in the described gateway, the processing data packets module, the packet forwarding module is operated in kernel state; Information filtering module and service management unit are operated in user's attitude.Numeral in the figure bracket is according to the execution sequence of time order and function.
In the outlet that is connected on network that the content filtering gateway of filter Network Based is transparent, all flow through his data as lead one spline filter.So the packet capture module in 5 hook points of network filter Netfilter framework, is only selected first hook point, just at NF_IP_PRE_ROUTING, the registration filter function filters the packet of all inflows.According to the source port number of user's appointment, destination slogan, source IP address, purpose IP address, protocol type information is directly transmitted the packet that does not need to carry out information filtering, and what need just passes to the processing function with the sk_buff descriptor pointer and the TCP head pointer of this packet.
In the processing data packets module, carry out TCP session reduction.Packet for carrying out content analysis is buffered in the gateway, adopts the two-dimensional chain table data structure to preserve, and laterally preserves the packet of same connection, vertically preserves different the connection.According to source IP address, purpose IP address, source port number, the unique definite connection of these four signs of destination slogan.Data structure such as Fig. 3.Socket buffer is not advocated and is duplicated, only transfers control in kernel.So, do not duplicate in handling to the packet of buffering yet, be that each packet is created an inode structures, point to its buffering area.Index node is being handled.Define an index node head in addition, point to the inode structures of first packet of each session.
The handling process of packet such as Fig. 4.For example the primary structure of packet is as follows:
Source IP address: 172.21.15.231
Source port number: 9817
Purpose IP address: 202.112.78.101
Destination slogan: 80
Sequence number: 2901378913
Syn is masked as: 0
Fin is masked as: 1
IP header length: 5
TCP header length: 5
When packet arrived, at first buffer memory TCP wrapped.Whether the judgment data bag comprises data then, and the len field deducts IP head length and TCP head length among the sk_buff, and promptly len-4*5-4*5 is exactly an application layer data length, if be the zero free of data of just representing.So will be if having with data pack buffer, with its index node insertion chained list.If no, do not carry out buffer memory.Whether no matter have data all will check the FIN flag bit, the FIN flag bit is 1, and representative connects end, carries out reduction of data.Do not check the SYN flag bit, connection bag in the three-way handshake process and affirmation bag do not comprise data, and just application layer length is 0, all is forwarded.
The synchronization cached data packet is to belong to many connections, must treat with a certain discrimination.Every connects when finishing, and discharges the space of this connection.
Judge at first whether array of pointers is empty, if be empty just with the head node of this node as first connection.If array of pointers is not empty, will with head node reference source port numbers, the destination slogan, source IP address, whether purpose IP address identical with this bag, judges whether it is same connection.If, at first with head node sequence number relatively, if in the head node sequence number less than 2901378913, this packet is exactly new head node so, if greater than, just it is inserted with in the preface chained list by sequence number.Just compare downwards successively if not same connection,, find that perhaps next seat for empty, just rebulids a connection with it as head node up to finding.Finish when inserting index node and withdrawing from, remember the head node of this connection.
This bag FIN flag bit is 1, proves that session content has transmitted to finish.At this moment take out the data content of all cached data packet successively, copy it to shared drive district, the sk_buff structure still keeps, and waits for the judged result of user's space, legal forwarding, and illegal abandons.
Because this packet that has the FIN flag bit is just to have inserted formation, and head pointer is returned, and supposes to be kept among the P, so just can directly reduce.If no, the head node that must be connected with each successively relatively reduces after determining to connect.Last notification protocol stack is forgotten these packets.
As Fig. 5, content analysis module keeper's designated key speech, and each keyword weight, and weight limit is set.After receiving the content analysis request that the processing data packets module is sent, from shared buffer, read the application layer data of this connection.Add up the frequency of occurrences that each sets keyword by the multi-key word matching algorithm, the product that calculates keyword weight frequency add and, weight is compared with the filtration weight limit that the keeper sets, such as: keyword set is combined into { independence for Taiwan, the war in Iraq }, if when the keeper wishes to filter domestic political problem, should give bigger weight for "independence of Taiwan", it is 5 that "independence of Taiwan" is set weight, and " the war in Iraq " sets weight is 1.The "independence of Taiwan" keyword occurs one time, the weight of whole contents increases by 5, and " the war in Iraq " occurs once, and the whole contents weight increases by 1.Suppose that the content weight has surpassed weight limit 15, then should connect illegal.
All need carry out the packet of content analysis, all must be retained in the information filtering fire compartment wall in legal not determining whether.Connect for a TCP, when server sends a packet to client, will send one after client is received and confirm bag to server, if server is not received this affirmation bag, server will retransmit this bag so.When the user end to server end sends data also is like this.If we have caught a packet in the connection, receiving terminal is not received, can not confirm yet, transmitting terminal will retransmit after overtime, and so long-time, connection will be broken, so just destroyed the transparency.In order not influence normal network communication.As Fig. 6, gateway replaces receiving terminal to send affirmation, like this, transmitting terminal will continue to send next bag, when receiving the data of enough carrying out information filtering, gives the filter algorithm analysis with data, confirm legal packet, once sending to receiving terminal, blocking the affirmation bag of receiving terminal simultaneously, because transmitting terminal was received.When we analyzed, this connection was still to keep, because the default time of the keepalive timer of TCP is sufficiently long.
Select the shared drive mode to realize the data interaction of user's space and kernel spacing.(kernel is known the process number of consumer process for pid, sig) routine, just can send signalisation content analysis module data in the internal memory of sharing by kernel to select send_sign.The process of memory-mapped is: kernel buffer memory of application under kernel state, by the proc file system consumer process is passed in the address of this buffer memory; Consumer process is obtained buffer address by reading the proc file system, utilizes mmap that this buffer memory is carried out map addresses, thereby can be from reading of data wherein.
In a word, a kind of content filtering gateway implementation method of filter Network Based has realized real time filtering and monitoring to session content with transparent way at network egress, in network layer filtration application layer information, illegal packet is blocked with being connected at once.The reduction of session has been improved the accuracy of information filtering.Utilize network filter Netfilter framework, data acquisition technology in conjunction with memory-mapped, not only avoided system call, reduced the switching between user's attitude and the kernel mode, and user's attitude program is directly operated shared drive, reduced the copy number of times of data, performance is significantly improved at kernel spacing and user's space.Transparent working method is also strong has avoided malicious attack.

Claims (3)

1, a kind of content filtering gateway implementation method of filter Network Based, it is characterized in that, this method with content filtering gateway transparent be connected on network boundary, in no IP mode, filter the data of all local area network (LAN)s of coming in and going out in network layer, described content filtering gateway operation Linux kernel 2.4 operating systems, two network interface cards are installed, every network interface card all is set to promiscuous mode, use two network interface cards of brctl configuration to realize transparent being connected on the network boundary as bridge, described content filtering gateway is realized information filtering successively according to the following steps:
Step 1, initialization:
Be provided with in the described content filtering Central Shanxi Plain:
The packet capture module, processing data packets module, and packet forwarding module, these modules are operated in the kernel state of linux system, also are provided with content analysis module, are operated in user's attitude; In described these modules:
The packet capture module has been registered the filter function of setting, and for those packets that need transmit, is sent to the packet forwarding module and transmits, and carries out the packet of information filtering for needs, then is sent to the processing data packets module;
The processing data packets module, the tcp data bag that the needs that the packet trapping module is sent carry out content analysis, at first by sequence number order buffer memory in buffering area, when capturing all packets of a connection, restore the application layer data content of this connection, give the content analysis module that is operated in user's attitude and analyze, legally just give all packets that the packet forwarding module is transmitted this connection successively, illegally just block this connection, its treatment step is as follows successively:
Treatment step (1): for each packet is set up an inode structures, structure comprises three: the socket buffer pointer of this bag, the sequence number of this bag, point to the pointer of next packet inode structures, first packet that is a connection is set up the index node header structure, sign as this TCP connection, this structure comprises: the socket buffer pointer of this bag, the sequence number of this bag, source IP address, purpose IP address, source port, destination interface, point to the pointer of next packet inode structures, construct a packet array of indexes again, pointer that points to the index node header structure of each storage in the array, the index of all packets is safeguarded by a two-dimensional chain table like this, laterally store the packet index that same TCP connects, the packet index that vertically storage difference connects, each is initialized as 0 to set affiliated packet array of indexes, and the packet index is inserted in the two-dimensional chain table;
Treatment step (2): when the tcp data bag arrived, whether the data length of judgment data bag was 0, if 0, check whether the Fin flag bit of packet is 1, the Fin flag bit is a TCP johning knot bundle flag, if be not 1, just should wrap forwarding; If 1, show that then the affiliated TCP connection of this packet finishes, and carries out the content reduction to this connection; If the data length of packet is not 0, then need the index node of this packet is inserted in the two-dimensional chain table;
Treatment step (3): whether first element of judgment data bag array of indexes is 0, if be 0, then creates the index node header structure for this packet, and first packet that connects as article one inserts two-dimensional chain table; If be not 0, judge whether this packet belongs to this connection, according to source IP address, purpose IP address, source port, these four unique definite connections of destination interface are not if belong to this connection, then compare with other elements of array successively, it is empty connecting under finding or finding an array element, if array element is empty, then creates the index node header structure for this packet, first packet as a new connection inserts two-dimensional chain table, if found affiliated connection, judge whether to be first packet, if, create the index node header structure, insert this and connect first position; If not, create inode structures and press TCP sequence number insertion tram, and preserve the head pointer of this connection, judge at last whether this packet Fin flag bit is 1, if be not 1, utilize network filter Netfilter framework standard return value NF_STOLEN, tell the operating system protocol stack no longer this packet to be handled; If be 1, carry out the content reduction to connecting under this packet;
Treatment step (4): judge whether to obtain treating the head pointer of content reduction connection,, in array, find this connection if do not have; If obtain, just take out the application layer data that this connects each packet successively, put into shared buffer;
The content analysis filtering module, keeper's designated key speech, and the weight of each keyword, and set all and connect common weight limit of obeying, after receiving the content analysis request that the processing data packets module is sent, from described shared buffer, read the application layer data of this connection, by the QS-DFSA algorithm, be that reverse finite automaton computer step-length string matching algorithm is added up the occurrence number that each sets keyword, calculate the product of each keyword weight and occurrence number, addition summation again obtains the weight of this connection, and all of the weight that will connect and keeper's setting are connected jointly the filtration weight limit of obedience and compare again, surpass weight limit and just think illegal, otherwise be exactly legal;
Step 2, carry out packet content successively according to the following steps and filter:
Step 2.1: the packet capture module after receiving the tcp data bag that network is sent, according to source IP address, purpose IP address, source port, destination interface, protocol type for the packet that needs are transmitted, then sends to the packet forwarding module and transmits; Needs are carried out the packet of information filtering, send to the processing data packets resume module;
Step 2.2: the processing data packets module is after receiving the tcp data bag that need carry out information filtering, handle by described processing data packets step, after finishing, a connection just restores the data of this connection, put into shared buffer, and the content of announcement analysis module removes the shared buffer read data;
Step 2.3: content analysis module is after receiving processing data packets module notice, and read data is analyzed from shared buffer, and the result is returned to the processing data packets module;
Step 2.4: the blocking-up of processing data packets module is illegal to be connected; Giving the packet forwarding module for legal connection transmits.
2, the content filtering gateway implementation method of a kind of filter Network Based according to claim 1, it is characterized in that, described processing data packets module will pass to the information filtering module of user's attitude through the original contents that TCP session reduction obtains by the method for user's space and kernel spacing shared drive.
3, the content filtering gateway implementation method of a kind of filter Network Based according to claim 1, it is characterized in that, described processing data packets module, when carrying out TCP session reduction, the packet that contains data in this connection is buffered in the gateway successively by the TCP sequence number, and replaces receiving terminal to send the affirmation bag to transmitting terminal;
When described packet forwarding module is transmitted packet successively by the TCP sequence number, contemporary for transmitting terminal confirmation of receipt bag.
CNB2007101003312A 2007-06-08 2007-06-08 A kind of content filtering gateway implementation method of filter Network Based Expired - Fee Related CN100558089C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2007101003312A CN100558089C (en) 2007-06-08 2007-06-08 A kind of content filtering gateway implementation method of filter Network Based

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2007101003312A CN100558089C (en) 2007-06-08 2007-06-08 A kind of content filtering gateway implementation method of filter Network Based

Publications (2)

Publication Number Publication Date
CN101068229A true CN101068229A (en) 2007-11-07
CN100558089C CN100558089C (en) 2009-11-04

Family

ID=38880666

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2007101003312A Expired - Fee Related CN100558089C (en) 2007-06-08 2007-06-08 A kind of content filtering gateway implementation method of filter Network Based

Country Status (1)

Country Link
CN (1) CN100558089C (en)

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009115002A1 (en) * 2008-03-20 2009-09-24 成都市华为赛门铁克科技有限公司 Method for buffering and forwarding data packets on a gateway device and the gateway device thereof
CN101582822A (en) * 2008-05-14 2009-11-18 3柯姆公司 Open network connection
CN101827102A (en) * 2010-04-20 2010-09-08 中国人民解放军理工大学指挥自动化学院 Data prevention method based on content filtering
CN101827070A (en) * 2009-03-06 2010-09-08 英华达股份有限公司 Portable communication device
CN101345687B (en) * 2008-08-21 2010-10-27 北京星网锐捷网络技术有限公司 Method and system for packet transmission in Linux network bridge mode
CN101877704A (en) * 2010-06-02 2010-11-03 中兴通讯股份有限公司 Network access control method and service gateway
CN101252527B (en) * 2008-04-09 2011-01-26 腾讯科技(深圳)有限公司 Method for transferring network, network transfer server and inner core managing module
CN102098289A (en) * 2010-12-17 2011-06-15 天津曙光计算机产业有限公司 Network security accessing and sealing method based on FPGA (field programmable gate array)
CN102340428A (en) * 2011-09-29 2012-02-01 哈尔滨安天科技股份有限公司 URL (Uniform Resource Locator) detection and interception method and system based on network packet loss
CN102480437A (en) * 2010-11-23 2012-05-30 中兴通讯股份有限公司 Method and device for controlling internet surfing data of home gateway
CN101848190B (en) * 2009-03-23 2012-08-08 北京鼎信高科信息技术有限公司 Data packet matched processing method based on IP (Internet Protocol) address set and port set
WO2012103846A2 (en) * 2012-04-05 2012-08-09 华为技术有限公司 Network security processing method, system, and network card
CN102695049A (en) * 2012-05-09 2012-09-26 浙江宇视科技有限公司 Transmission method and apparatus of code stream
CN102761517A (en) * 2011-04-25 2012-10-31 工业和信息化部电信传输研究所 Content reduction method for high-speed network
CN102821100A (en) * 2012-07-25 2012-12-12 河南省信息中心 Method for realizing streaming file system based on security gateway of network application layer
CN101651672B (en) * 2008-08-14 2012-12-19 鸿富锦精密工业(深圳)有限公司 Network device and method for processing encapsulated packet
CN101783786B (en) * 2009-01-19 2013-01-16 中兴通讯股份有限公司 Method and device for filtering data packets
CN103001958A (en) * 2012-11-27 2013-03-27 北京百度网讯科技有限公司 Exception transmission control protocol (TCP) message processing method and device
CN103023914A (en) * 2012-12-26 2013-04-03 北京神州绿盟信息安全科技股份有限公司 Firewall system and implementation method thereof
CN103414725A (en) * 2013-08-21 2013-11-27 北京网秦天下科技有限公司 Method and device used for detecting and filtering data message
CN103428216A (en) * 2013-08-12 2013-12-04 深圳市吉祥腾达科技有限公司 Method and system for improving firewall performance
CN103763150A (en) * 2014-01-02 2014-04-30 中国人民解放军装甲兵工程学院 Data acquisition system
CN103929418A (en) * 2014-03-28 2014-07-16 汉柏科技有限公司 Wireless Internet access method and system based on network safety equipment
CN103973476A (en) * 2013-02-06 2014-08-06 上海杰之能信息科技有限公司 Gateway, and gateway hot backup system and method
WO2014180397A1 (en) * 2013-12-16 2014-11-13 中兴通讯股份有限公司 Network data packet sending method and device
CN104184659A (en) * 2013-05-22 2014-12-03 上海贝尔股份有限公司 Method and device for obtaining data packet in network
CN104205727A (en) * 2012-01-27 2014-12-10 诺基亚通信公司 Session termination in a mobile packet core network
CN104202315A (en) * 2014-08-25 2014-12-10 山东超越数控电子有限公司 Network data package filtering method based on Power PC hardware frame
CN104243107A (en) * 2013-06-06 2014-12-24 深圳市腾讯计算机系统有限公司 Data transmission method, device, terminal, server and system
CN104348656A (en) * 2013-08-07 2015-02-11 中国移动通信集团北京有限公司 Data acquisition method and device
CN104468417A (en) * 2014-12-16 2015-03-25 上海斐讯数据通信技术有限公司 Stacking switch message transmission method and system and stacking switch
CN104796413A (en) * 2015-04-02 2015-07-22 哈尔滨工程大学 Grouping dynamic storage method facing Web firewall
CN105162796A (en) * 2015-09-24 2015-12-16 上海上讯信息技术股份有限公司 Data transmission method and equipment
CN106454837A (en) * 2016-08-25 2017-02-22 上海斐讯数据通信技术有限公司 Access point switching device and switching method thereof
CN106487945A (en) * 2016-09-09 2017-03-08 中国互联网络信息中心 A kind of DNS forwarding inquiries method
CN106487797A (en) * 2016-10-25 2017-03-08 腾讯科技(深圳)有限公司 A kind of network data processing method and system
CN106649036A (en) * 2016-11-24 2017-05-10 北京瑞星信息技术股份有限公司 Method and device for Linux network access monitoring
CN106850565A (en) * 2016-12-29 2017-06-13 河北远东通信系统工程有限公司 A kind of network data transmission method of high speed
CN107395619A (en) * 2017-08-17 2017-11-24 深圳市盛路物联通讯技术有限公司 A kind of safety communicating method and system
CN107633380A (en) * 2017-08-30 2018-01-26 北京明朝万达科技股份有限公司 The task measures and procedures for the examination and approval and system of a kind of anti-data-leakage system
CN107659511A (en) * 2017-08-16 2018-02-02 华为技术有限公司 A kind of overload controlling method, main frame and storage medium and program product
CN107809377A (en) * 2016-09-09 2018-03-16 卡斯柯信号有限公司 The realization device and method of a kind of universal gateway
CN108200026A (en) * 2017-12-27 2018-06-22 山东华软金盾软件股份有限公司 The method that rst blocking packets are sent based on ipv6
CN108965061A (en) * 2018-08-03 2018-12-07 上海欣诺通信技术股份有限公司 Packet capture device and method, reduction apparatus and method, system and medium
CN109298931A (en) * 2017-07-25 2019-02-01 迈普通信技术股份有限公司 The on-demand method for releasing in buffer area and the network equipment
CN109510795A (en) * 2017-09-14 2019-03-22 蓝盾信息安全技术股份有限公司 A kind of intelligent DDOS defense technique based on isolated device
CN109587082A (en) * 2019-01-10 2019-04-05 烽火通信科技股份有限公司 A kind of asynchronous repeater system of message based on (SuSE) Linux OS and method
CN109951425A (en) * 2017-12-21 2019-06-28 张家界航空工业职业技术学院 TCP flow state integrity detection method based on FPGA
CN109962885A (en) * 2017-12-22 2019-07-02 北京安天网络安全技术有限公司 The network safety protection method and internet of things equipment of internet of things equipment
CN111327645A (en) * 2018-11-28 2020-06-23 鸿合科技股份有限公司 Network sharing method and device and electronic equipment
WO2020151030A1 (en) * 2019-01-22 2020-07-30 网宿科技股份有限公司 Method and apparatus for processing data message
CN112084494A (en) * 2020-09-21 2020-12-15 百度在线网络技术(北京)有限公司 Sensitive information detection method, device, equipment and storage medium
CN112769716A (en) * 2021-01-12 2021-05-07 烽火通信科技股份有限公司 Data forwarding method and device of virtual switch based on hybrid virtual network bridge
CN112953833A (en) * 2021-03-25 2021-06-11 全讯汇聚网络科技(北京)有限公司 Method, system and gateway equipment for realizing three-layer route forwarding based on network bridge
WO2021121123A1 (en) * 2019-12-16 2021-06-24 中兴通讯股份有限公司 Media stream distribution method, cdn node server, cdn system, and readable storage medium
CN115174206A (en) * 2022-07-01 2022-10-11 江苏深网科技有限公司 User mode application safety detection method and detection system under transparent network bridge mode

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110309184B (en) * 2019-07-10 2021-05-25 中国民航信息网络股份有限公司 Caching method and system for aviation freight rate data

Cited By (90)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9413547B2 (en) 2005-05-03 2016-08-09 Hewlett Packard Enterprise Development Lp Open network connections
WO2009115002A1 (en) * 2008-03-20 2009-09-24 成都市华为赛门铁克科技有限公司 Method for buffering and forwarding data packets on a gateway device and the gateway device thereof
CN101252527B (en) * 2008-04-09 2011-01-26 腾讯科技(深圳)有限公司 Method for transferring network, network transfer server and inner core managing module
CN101582822A (en) * 2008-05-14 2009-11-18 3柯姆公司 Open network connection
CN101582822B (en) * 2008-05-14 2014-10-29 惠普公司 open network connection
CN101651672B (en) * 2008-08-14 2012-12-19 鸿富锦精密工业(深圳)有限公司 Network device and method for processing encapsulated packet
CN101345687B (en) * 2008-08-21 2010-10-27 北京星网锐捷网络技术有限公司 Method and system for packet transmission in Linux network bridge mode
CN101783786B (en) * 2009-01-19 2013-01-16 中兴通讯股份有限公司 Method and device for filtering data packets
CN101827070A (en) * 2009-03-06 2010-09-08 英华达股份有限公司 Portable communication device
CN101848190B (en) * 2009-03-23 2012-08-08 北京鼎信高科信息技术有限公司 Data packet matched processing method based on IP (Internet Protocol) address set and port set
CN101827102A (en) * 2010-04-20 2010-09-08 中国人民解放军理工大学指挥自动化学院 Data prevention method based on content filtering
CN101827102B (en) * 2010-04-20 2013-01-30 中国人民解放军理工大学指挥自动化学院 Data prevention method based on content filtering
WO2011150692A1 (en) * 2010-06-02 2011-12-08 中兴通讯股份有限公司 Method for controlling network access and service gateway thereof
CN101877704A (en) * 2010-06-02 2010-11-03 中兴通讯股份有限公司 Network access control method and service gateway
CN102480437A (en) * 2010-11-23 2012-05-30 中兴通讯股份有限公司 Method and device for controlling internet surfing data of home gateway
CN102098289B (en) * 2010-12-17 2014-08-27 曙光信息产业股份有限公司 Network security accessing and sealing method based on FPGA (field programmable gate array)
CN102098289A (en) * 2010-12-17 2011-06-15 天津曙光计算机产业有限公司 Network security accessing and sealing method based on FPGA (field programmable gate array)
CN102761517A (en) * 2011-04-25 2012-10-31 工业和信息化部电信传输研究所 Content reduction method for high-speed network
CN102761517B (en) * 2011-04-25 2015-06-24 工业和信息化部电信传输研究所 Content reduction method for high-speed network
CN102340428B (en) * 2011-09-29 2014-01-15 哈尔滨安天科技股份有限公司 URL (Uniform Resource Locator) detection and interception method and system based on network packet loss
CN102340428A (en) * 2011-09-29 2012-02-01 哈尔滨安天科技股份有限公司 URL (Uniform Resource Locator) detection and interception method and system based on network packet loss
CN104205727B (en) * 2012-01-27 2019-08-30 诺基亚通信公司 Session termination in mobile packet core network
CN104205727A (en) * 2012-01-27 2014-12-10 诺基亚通信公司 Session termination in a mobile packet core network
US10382360B2 (en) 2012-01-27 2019-08-13 Nokia Solutions And Networks Oy Session termination in a mobile packet core network
CN102986194A (en) * 2012-04-05 2013-03-20 华为技术有限公司 Network security processing method, system, and network card
CN102986194B (en) * 2012-04-05 2015-08-19 华为技术有限公司 Network security processing method, system and network interface card
WO2012103846A3 (en) * 2012-04-05 2013-03-07 华为技术有限公司 Network security processing method, system, and network card
WO2012103846A2 (en) * 2012-04-05 2012-08-09 华为技术有限公司 Network security processing method, system, and network card
CN102695049A (en) * 2012-05-09 2012-09-26 浙江宇视科技有限公司 Transmission method and apparatus of code stream
CN102695049B (en) * 2012-05-09 2015-06-10 浙江宇视科技有限公司 Transmission method and apparatus of code stream
CN102821100B (en) * 2012-07-25 2014-10-29 河南省信息中心 Method for realizing streaming file system based on security gateway of network application layer
CN102821100A (en) * 2012-07-25 2012-12-12 河南省信息中心 Method for realizing streaming file system based on security gateway of network application layer
CN103001958A (en) * 2012-11-27 2013-03-27 北京百度网讯科技有限公司 Exception transmission control protocol (TCP) message processing method and device
CN103001958B (en) * 2012-11-27 2016-03-16 北京百度网讯科技有限公司 Abnormal T CP message processing method and device
CN103023914A (en) * 2012-12-26 2013-04-03 北京神州绿盟信息安全科技股份有限公司 Firewall system and implementation method thereof
CN103023914B (en) * 2012-12-26 2015-07-01 北京神州绿盟信息安全科技股份有限公司 Firewall system and implementation method thereof
CN103973476A (en) * 2013-02-06 2014-08-06 上海杰之能信息科技有限公司 Gateway, and gateway hot backup system and method
CN104184659A (en) * 2013-05-22 2014-12-03 上海贝尔股份有限公司 Method and device for obtaining data packet in network
CN104184659B (en) * 2013-05-22 2017-08-25 上海贝尔股份有限公司 A kind of method and apparatus for being used to obtain packet in network
CN104243107A (en) * 2013-06-06 2014-12-24 深圳市腾讯计算机系统有限公司 Data transmission method, device, terminal, server and system
CN104348656A (en) * 2013-08-07 2015-02-11 中国移动通信集团北京有限公司 Data acquisition method and device
CN103428216B (en) * 2013-08-12 2016-12-28 深圳市吉祥腾达科技有限公司 A kind of method and system improving fire wall performance
CN103428216A (en) * 2013-08-12 2013-12-04 深圳市吉祥腾达科技有限公司 Method and system for improving firewall performance
CN103414725A (en) * 2013-08-21 2013-11-27 北京网秦天下科技有限公司 Method and device used for detecting and filtering data message
WO2014180397A1 (en) * 2013-12-16 2014-11-13 中兴通讯股份有限公司 Network data packet sending method and device
CN103763150A (en) * 2014-01-02 2014-04-30 中国人民解放军装甲兵工程学院 Data acquisition system
CN103763150B (en) * 2014-01-02 2017-09-22 中国人民解放军装甲兵工程学院 Data collecting system
CN103929418A (en) * 2014-03-28 2014-07-16 汉柏科技有限公司 Wireless Internet access method and system based on network safety equipment
CN104202315A (en) * 2014-08-25 2014-12-10 山东超越数控电子有限公司 Network data package filtering method based on Power PC hardware frame
CN104468417A (en) * 2014-12-16 2015-03-25 上海斐讯数据通信技术有限公司 Stacking switch message transmission method and system and stacking switch
CN104468417B (en) * 2014-12-16 2018-05-01 上海斐讯数据通信技术有限公司 A kind of stacked switch message transmitting method, system and stacked switch
CN104796413A (en) * 2015-04-02 2015-07-22 哈尔滨工程大学 Grouping dynamic storage method facing Web firewall
CN104796413B (en) * 2015-04-02 2018-04-24 哈尔滨工程大学 A kind of packet dynamic storage method of web oriented fire wall
CN105162796A (en) * 2015-09-24 2015-12-16 上海上讯信息技术股份有限公司 Data transmission method and equipment
CN106454837A (en) * 2016-08-25 2017-02-22 上海斐讯数据通信技术有限公司 Access point switching device and switching method thereof
WO2018036218A1 (en) * 2016-08-25 2018-03-01 上海斐讯数据通信技术有限公司 Access point switching device and switching method therefor
CN107809377B (en) * 2016-09-09 2021-06-08 卡斯柯信号有限公司 Device and method for realizing universal gateway
CN106487945A (en) * 2016-09-09 2017-03-08 中国互联网络信息中心 A kind of DNS forwarding inquiries method
CN106487945B (en) * 2016-09-09 2019-05-17 中国互联网络信息中心 A kind of DNS forwarding inquiries method
CN107809377A (en) * 2016-09-09 2018-03-16 卡斯柯信号有限公司 The realization device and method of a kind of universal gateway
CN106487797A (en) * 2016-10-25 2017-03-08 腾讯科技(深圳)有限公司 A kind of network data processing method and system
CN106649036B (en) * 2016-11-24 2019-03-12 北京瑞星网安技术股份有限公司 Linux network access monitoring method and device
CN106649036A (en) * 2016-11-24 2017-05-10 北京瑞星信息技术股份有限公司 Method and device for Linux network access monitoring
CN106850565B (en) * 2016-12-29 2019-06-18 河北远东通信系统工程有限公司 A kind of network data transmission method of high speed
CN106850565A (en) * 2016-12-29 2017-06-13 河北远东通信系统工程有限公司 A kind of network data transmission method of high speed
CN109298931B (en) * 2017-07-25 2022-04-08 迈普通信技术股份有限公司 Buffer on-demand release method and network equipment
CN109298931A (en) * 2017-07-25 2019-02-01 迈普通信技术股份有限公司 The on-demand method for releasing in buffer area and the network equipment
CN107659511A (en) * 2017-08-16 2018-02-02 华为技术有限公司 A kind of overload controlling method, main frame and storage medium and program product
CN107395619B (en) * 2017-08-17 2020-03-17 深圳市盛路物联通讯技术有限公司 Secure communication method and system
CN107395619A (en) * 2017-08-17 2017-11-24 深圳市盛路物联通讯技术有限公司 A kind of safety communicating method and system
CN107633380A (en) * 2017-08-30 2018-01-26 北京明朝万达科技股份有限公司 The task measures and procedures for the examination and approval and system of a kind of anti-data-leakage system
CN109510795A (en) * 2017-09-14 2019-03-22 蓝盾信息安全技术股份有限公司 A kind of intelligent DDOS defense technique based on isolated device
CN109951425B (en) * 2017-12-21 2021-03-23 张家界航空工业职业技术学院 TCP (Transmission control protocol) flow state integrity detection method based on FPGA (field programmable Gate array)
CN109951425A (en) * 2017-12-21 2019-06-28 张家界航空工业职业技术学院 TCP flow state integrity detection method based on FPGA
CN109962885A (en) * 2017-12-22 2019-07-02 北京安天网络安全技术有限公司 The network safety protection method and internet of things equipment of internet of things equipment
CN108200026A (en) * 2017-12-27 2018-06-22 山东华软金盾软件股份有限公司 The method that rst blocking packets are sent based on ipv6
CN108965061A (en) * 2018-08-03 2018-12-07 上海欣诺通信技术股份有限公司 Packet capture device and method, reduction apparatus and method, system and medium
CN108965061B (en) * 2018-08-03 2024-02-02 上海欣诺通信技术股份有限公司 Data packet capturing device and method, restoring device and method, system and medium
CN111327645B (en) * 2018-11-28 2023-11-21 鸿合科技股份有限公司 Network sharing method and device and electronic equipment
CN111327645A (en) * 2018-11-28 2020-06-23 鸿合科技股份有限公司 Network sharing method and device and electronic equipment
CN109587082B (en) * 2019-01-10 2020-12-29 烽火通信科技股份有限公司 Message asynchronous forwarding system and method based on Linux operating system
CN109587082A (en) * 2019-01-10 2019-04-05 烽火通信科技股份有限公司 A kind of asynchronous repeater system of message based on (SuSE) Linux OS and method
WO2020151030A1 (en) * 2019-01-22 2020-07-30 网宿科技股份有限公司 Method and apparatus for processing data message
WO2021121123A1 (en) * 2019-12-16 2021-06-24 中兴通讯股份有限公司 Media stream distribution method, cdn node server, cdn system, and readable storage medium
CN112084494A (en) * 2020-09-21 2020-12-15 百度在线网络技术(北京)有限公司 Sensitive information detection method, device, equipment and storage medium
CN112769716A (en) * 2021-01-12 2021-05-07 烽火通信科技股份有限公司 Data forwarding method and device of virtual switch based on hybrid virtual network bridge
CN112953833B (en) * 2021-03-25 2022-04-15 全讯汇聚网络科技(北京)有限公司 Method, system and gateway equipment for realizing three-layer route forwarding based on network bridge
CN112953833A (en) * 2021-03-25 2021-06-11 全讯汇聚网络科技(北京)有限公司 Method, system and gateway equipment for realizing three-layer route forwarding based on network bridge
CN115174206A (en) * 2022-07-01 2022-10-11 江苏深网科技有限公司 User mode application safety detection method and detection system under transparent network bridge mode
CN115174206B (en) * 2022-07-01 2024-04-02 江苏深网科技有限公司 User mode application security detection method and detection system in transparent network bridge mode

Also Published As

Publication number Publication date
CN100558089C (en) 2009-11-04

Similar Documents

Publication Publication Date Title
CN100558089C (en) A kind of content filtering gateway implementation method of filter Network Based
US7486673B2 (en) Method and system for reassembling packets prior to searching
JP4743894B2 (en) Method and apparatus for improving security while transmitting data packets
CN101036369B (en) Offline analysis of packets
US9009830B2 (en) Inline intrusion detection
US8769681B1 (en) Methods and system for DMA based distributed denial of service protection
CN1836245A (en) Integrated circuit apparatus and method for high throughput signature based network applications
CN101083563A (en) Method and apparatus for preventing distributed refuse service attack
CN101465855B (en) Method and system for filtrating synchronous extensive aggression
CN100454895C (en) Method for raising network security via message processing
CN101460983A (en) Malicious attack detection system and an associated method of use
JP4774307B2 (en) Unauthorized access monitoring device and packet relay device
CN102067532A (en) Processing of packet fragments
CN1822593A (en) Network safety protective method for preventing reject service attack event
CN101056306A (en) Network device and its access control method
TWI360978B (en) Network message processing using inverse pattern m
CN111797371A (en) Switch encryption system
KR20050002604A (en) System and method for message-based scalable data transport
CN1741504A (en) Flow controlling method based on application and network equipment for making applied flow control
CN1992595A (en) Terminal and related computer implemented method for detecting malicious data for computer network
CN1741473A (en) A network data packet availability deciding method and system
CN1567900A (en) A method for implementing message forwarding control in routing equipment
CN101582880B (en) Method and system for filtering messages based on audited object
CN106790310A (en) Distributed denial of service attack protects the method and system integrated with load balancing
CN1291567C (en) A high-performance multi-service network security processing equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091104

Termination date: 20110608