CN101252576A - Method for detecting virus based on network flow with DFA in gateway - Google Patents

Method for detecting virus based on network flow with DFA in gateway Download PDF

Info

Publication number
CN101252576A
CN101252576A CNA2008100197264A CN200810019726A CN101252576A CN 101252576 A CN101252576 A CN 101252576A CN A2008100197264 A CNA2008100197264 A CN A2008100197264A CN 200810019726 A CN200810019726 A CN 200810019726A CN 101252576 A CN101252576 A CN 101252576A
Authority
CN
China
Prior art keywords
virus
network
dfa
packet
http
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100197264A
Other languages
Chinese (zh)
Inventor
谢炜
刘继明
林恩峰
王东泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ITIBIA TECHNOLOGIES
SUZHOU AIDIBI TECHNOLOGY Co Ltd
Original Assignee
ITIBIA TECHNOLOGIES
SUZHOU AIDIBI TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ITIBIA TECHNOLOGIES, SUZHOU AIDIBI TECHNOLOGY Co Ltd filed Critical ITIBIA TECHNOLOGIES
Priority to CNA2008100197264A priority Critical patent/CN101252576A/en
Publication of CN101252576A publication Critical patent/CN101252576A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a virus detection method based on network flows and taken at gateways by DFA. The virus detection process includes that firstly, network data packets are redirected to a virus detection program in a protocol stack; secondly, the network data packets are organized by the virus detection program according to the network flows; thirdly, the network packets are inputted into a DFA engine by the virus detection program; fourthly, virus detection is taken by the DFA engine according to the pre-compiled virus feature library, a virus warning is sent out to network terminals by the virus detection program and the network flows are cut off if viruses are detected and the network data packets are let to pass if no virus is matched. The network packets in accordance with the features are directly redirected to the virus detection program by the invention so that the data packet delay caused by the protocol stack is largely reduced; the speed of virus detection by DFA is improved by more than 10 times; in addition, a large quantity of TCP connections need no maintenance if the network data packets are organized in the way of network flows, thus CPU and EMS memory resources are saved.

Description

Utilize DFA to carry out the method for detecting virus of stream Network Based at the gateway place
Technical field
The present invention relates to carry out the technology that virus detects on gateway device, particularly a kind of DFA of utilization carries out the method for detecting virus of stream Network Based at the gateway place, belong to the computer network security technology field.
Background technology
Be accompanied by development of computer, computer virus also generates in a large number; Computer virus is threatening the safety of computer data, is disturbing people to work normally, is seriously perplexing the computer and the network user thereof, has brought the loss that can't estimate to the mankind.The development of Internet technology has also brought bigger facility for the extensive widespread of computer virus bring the unprecedented while easily for the mankind.Computer virus is propagated by the Internet unbridledly, is perplexing the increasing computer user of every field, therefore, and killing computer virus and prevent that the task of its propagation is more and more important.Traditional computer anti-virus method carries out on single computer usually, even computer bit also is that so this method has following shortcoming in the Internet:
At first; the method of unit killing virus can only rush out the file that this machine inside is infected by the virus; and do not handle in time for the viral source of really concealing in Internet Server; if this server is not protected, may be that all users in the whole the Internet and internal network are subjected to virus and attack rapidly and widely.Moreover, may be become new viral source again by the computer of virus infections, it is subjected to the control of virus to attack more computer, bring a series of chain reaction thus, strengthened viral firing area, increased viral harmfulness, finally caused the Internet paralysis, to the loss of bringing on a disaster property of Internet user.Secondly, existing various anti-virus softwares are relevant with the operating platform that it is moved, and it needs frequent separately renewal, upgrading, maintenance and supervision, and this will inevitably cause the waste of plenty of time and resource.In addition, because traditional fire compartment wall only possesses the ability of refusal unauthorized access, and the malicious code (as ActiveXControl and java applet) in e-mail virus and some internet web pages can firewall-penetrating, Intranet is attacked, made the enterprise that is attacked suffer tremendous loss.
At this situation, released the checking and killing virus product of gateway level recent years, interception virus on network boundary, the propagation of control virus, virus can not be propagated, and its harmfulness just reduces greatly.The checking and killing virus product of present gateway level, processing for the HTTP data, all be by in gateway, setting up the Proxy program, with the HTTP data redirection in the Proxy program, the Proxy program is carried out seven layers of reduction to the HTTP data, be reassembled as file, and file imported viral engine carry out checking and killing virus, the Proxy program sends to terminal with the HTTP data then.There is following problem in this mode: 1. the Proxy mode can only be according to 80 port identification http protocols, and there is the under-enumeration problem in the HTTP data for non-standard 80 ports a large amount of on the network; 2. each HTTP packet all will be handled through the Proxy program that protocol stack enters application layer, and network performance sharply descends; 3. Proxy must wait all data to arrive, finish file reorganization and finish after the virus scan, just can send the data to terminal, cause the HTTP access time delay sharply to increase, big file can't be downloaded the problem that successfully waits, and buffer memory can take a large amount of internal memories and disk resource simultaneously; 4. Proxy need be maintained into terminal and is connected with a large amount of TCP to http server, and a large amount of connection foundation and dismounting can expend the cpu resource of gateway, and a large amount of connections also expends the memory source of gateway.
Summary of the invention
The objective of the invention is to overcome the deficiency that prior art exists, provide a kind of DFA that in gateway device, utilizes to carry out the method that stream virus Network Based detects.
Purpose of the present invention is achieved through the following technical solutions:
Utilize DFA to carry out the method for detecting virus of stream Network Based at the gateway place, characteristics are: viral testing process may further comprise the steps---
1) in protocol stack, network packet is redirected to virus checker;
2) virus checker is according to network flow organization network packet;
3) virus checker is imported the DFA engine with network packet;
4) the DFA engine carries out the virus detection according to compiled in advance virus characteristic storehouse, if detect virus, virus checker sends virus warning to the network terminal, and interrupt network stream, if do not match virus, and the network packet of then letting pass.
Further, the above-mentioned DFA that utilizes carries out the method for detecting virus of stream Network Based at the gateway place, described network packet is meant the packet of http protocol, the http data bag is by extracting the http protocol condition code and utilizing the DFA coupling to obtain in protocol stack, described DFA is made up of DFA compiler and DFA engine, and the DFA engine is supported in repeatedly hold mode in the input process.
Further, the above-mentioned DFA that utilizes carries out the method for detecting virus of stream Network Based at the gateway place, described virus checker is the application layer program, and it is directly to be delivered to application layer from inner nuclear layer that network packet is redirected, and does not need in layer to be delivered to application layer through protocol stack.
Further, the above-mentioned method for detecting virus that utilizes DFA to carry out stream Network Based at the gateway place, described network flow are by five-tuple: source IP address, purpose IP address, source port, destination interface and transport layer protocol type are formed; Described being meant according to network flow according to network flow organization network packet divided into groups to network packet, according to the Transmission Control Protocol standard tcp data bag recombinated, and makes the data that are input to the DFA engine orderly.
Again further, the above-mentioned method for detecting virus that utilizes DFA to carry out stream Network Based at the gateway place, described DFA engine are a program library or process independently, and the DFA engine is preserved the last scan state and also recover scanning mode when being scanned next time; Needn't once import all data, can import several times, therefore need before looking into poison, not carry out seven layers file reorganization to the DFA engine.Before network packet is imported the DFA engine, the HTTP packet is analyzed, if having only HTTP HEADER, the network packet of then letting pass if contain HTTP BODY data, is then taken out the BODY data, input DFA engine scans.Before letting pass, by analyzing HTTPHEADER, obtain the type information of BODY, to the BODY of some type, think and can not contain virus, directly let pass.
Again further, the above-mentioned DFA that utilizes carries out the method for detecting virus of stream Network Based at the gateway place, and the described network terminal is meant that the network flow that triggers virus is in local area network (LAN) one side corresponding equipment.
Substantive distinguishing features and obvious improvement that technical solution of the present invention is outstanding are mainly reflected in: directly be redirected to virus checker by the network packet that will meet feature in protocol stack, compare with traditional gateway gas defence technology, significantly reduced the packet time-delay that protocol stack brings.The present invention carries out virus by DFA and detects in virus checker, and viral detection speed improves more than 10 times than traditional gateway gas defence technology.And, in virus checker,, do not need to safeguard that a large amount of TCP connect with the mode organization network packet of network flow, saved CPU and memory source.In addition,, significantly reduced the time-delay that viral detection brings, improved user's network and experienced carrying out sending packet when virus detects.
Description of drawings
Below in conjunction with accompanying drawing technical solution of the present invention is described further:
Fig. 1: utilize DFA to carry out the framework of the viral detection system of stream Network Based at the gateway place;
Fig. 2: virus detects the flow chart of application program.
The implication of each Reference numeral sees the following form among the figure:
Reference numeral Implication English name
1 Network packet Packets
2 Lan interfaces LAN
3 Kernel Kernel
4 The formation of kernel data bag Ipq
5 Kernel and user's attitude communication link Netlink
6 User's attitude virus checker FUM
7 Package is knitted and three layers of processing module PSM
8 The core packet handing module PPM
9 Function call Call
10 The DFA engine DFA Engine
Reference numeral Implication English name
11 Kernel and user's attitude communication link Netlink
12 The formation of kernel data bag Ipq
13 Wide Area Network interface Wan
Embodiment
Gateway device of the present invention is looked into malicious method and be may further comprise the steps: the network packet that 1. will meet feature in protocol stack directly is redirected to virus checker; 2. virus checker will be according to network flow organization network packet; 3. virus checker is imported the DFA engine with network packet; 4. the DFA engine carries out virus and detects according to compiled in advance virus characteristic storehouse; If detect, virus checker sends virus warning to the network terminal, and interrupt network stream, if do not match virus, and the network packet of then letting pass.
It should be noted that the HTTP data utilize DFA to discern by HTTP packet feature, do not discern, therefore do not have the under-enumeration problem by port numbers.The HTTP data are directly to be redirected to the application layer virus checker, rather than upwards are delivered to application layer layer by layer by protocol stack, have significantly reduced the time-delay that protocol stack brings.The HTTP data are organized according to the mode of network flow in application layer, do not need the TCP that is maintained into terminal and http server to be connected, and have significantly reduced the resource occupation to gateway, have reduced the hardware requirement of gateway.The HTTP data, are directly imported the DFA engine and are carried out checking and killing virus through after the data recombination in application layer, do not need to wait for that all data arrive, and do not need buffer memory, have saved internal memory and disk resource, have significantly reduced HTTP visit time-delay.By buffer memory HTTP visit information, when terminal next time same URL being initiated the HTTP request, notice terminal Virus Info.Virus checker does not send virus warning to terminal immediately after detecting virus, but the buffer memory Virus Info, and when this terminal is initiated same HTTP request once more, send virus warning to terminal.
Method for detecting virus of the present invention does not rely on specific hardware or software platform, if but select the Linux platform for use, utilize the existing module of platform, implement more convenient, below be example just with the Linux platform, introduce embodiment.
As Fig. 1 is to utilize DFA to carry out the system architecture of the virus detection of stream Network Based at the gateway place, after network packet 1 enters lan interfaces (LAN) 2, after kernel (Kernel) 3 carries out the http protocol feature identification, network packet 1 is gone into kernel data bag formation (Ipq) 4, be redirected to user's attitude virus checker (FUM) 6 by kernel and user's attitude communication link (Netlink) 5, the submodule package of user's attitude virus checker 6 knit with three layers of processing module (PSM) 7 from kernel and user's attitude communication link 5 receiving network data bags 1, according to five-tuple organization network packet 1, then network packet 1 is delivered to core packet handing module (PPM) 8, core packet handing module 8 calls DFA engine 10 and carries out virus scan, if there is not virus, just by kernel and user's attitude communication link (Netlink) 11 network packet 1 is redirected to kernel 3, kernel 3 then sends to internet with network packet 1 by Wide Area Network interface (Wan) 13.
Fig. 2 is the inter-process flow process of user's attitude virus checker FUM, comprises---
The submodule PSM of S11:FUM (user's attitude virus checker) (package is knitted and three layers of processing module) is stored in the buffering area from Netlink (kernel and user's attitude communication link) receiving network data bag;
S12:PSM extracts five-tuple from network packet: source IP address, purpose IP address, source port number, destination slogan, four layer protocol types.According to five-tuple, in the network flow form of system, mate, if the match is successful, then enter S14, if it fails to match, enter S13;
S13:PSM creates new network flow record, and this record is a major key with the five-tuple, and is inserted in the network flow form;
S14: judge that whether network packet only contains HTTP Header information, is then to enter S15, otherwise enters S16;
S15:HTTP Header can not contain virus, the network packet of directly letting pass;
S16: judge whether to be packed data, be then to enter S17, otherwise enter S23;
S17:, detect the compressed file type according to the information of HTTP Header information and several leading network packet;
S18: judge whether this compressed file type supports segmentation to decompress, RAR, ZIP type commonly used all is to support what segmentation decompressed, is then to enter S19, otherwise enters S20;
S19: carry out segmentation and decompress;
S20: judge that whether this network packet is the final stage data, is then to enter S22, otherwise enters S21;
S21: the copy network packet is to system cache, and the clearance network packet;
S22: the system buffer data are taken out, form compressed file, and decompress;
S23: the data input DFA engine with network packet or after decompressing carries out virus characteristic and detects, if virus is arranged, enters S25, does not have virus to enter S24;
S24: the clearance network packet, PPM (core packet handing module) is redirected to kernel by Netlink (kernel and user's attitude communication link) with network packet;
S25:PPM cuts off this data flow.
On probation show that the present invention will meet feature in protocol stack network packet directly is redirected to virus checker, significantly reduced the packet time-delay that protocol stack brings.In virus checker, to carry out virus by DFA and detect, the speed that DFA virus detects can improve more than 10 times.Also have, in virus checker,, do not need to safeguard that a large amount of TCP connect, saved CPU and memory source with the mode organization network packet of network flow.In addition,, significantly reduced the time-delay that viral detection brings, improved user's network and experienced carrying out sending packet when virus detects.
Below only be concrete exemplary applications of the present invention, protection scope of the present invention is not constituted any limitation.All employing equivalents or equivalence are replaced and the technical scheme of formation, all drop within the rights protection scope of the present invention.

Claims (6)

1. utilize DFA at the method for detecting virus that the gateway place carries out stream Network Based, it is characterized in that: viral testing process may further comprise the steps---
1) in protocol stack, network packet is redirected to virus checker;
2) virus checker is according to network flow organization network packet;
3) virus checker is imported the DFA engine with network packet;
4) the DFA engine carries out the virus detection according to compiled in advance virus characteristic storehouse, detects virus, and virus checker sends virus warning to the network terminal, and interrupt network stream, does not match virus, the network packet of then letting pass.
2. the DFA of utilization according to claim 1 carries out the method for detecting virus of stream Network Based at the gateway place, it is characterized in that: described network packet is meant the packet of http protocol, the http data bag is by extracting the http protocol condition code and utilizing the DFA coupling to obtain in protocol stack, described DFA is made up of DFA compiler and DFA engine, and the DFA engine is supported in repeatedly hold mode in the input process.
3. the DFA of utilization according to claim 1 is characterized in that at the method for detecting virus that the gateway place carries out stream Network Based: described virus checker is the application layer program, and it is directly to be delivered to application layer from inner nuclear layer that network packet is redirected.
4. the DFA of utilization according to claim 1 is characterized in that at the method for detecting virus that the gateway place carries out stream Network Based: described network flow is by five-tuple: source IP address, purpose IP address, source port, destination interface and transport layer protocol type are formed; Described being meant according to network flow according to network flow organization network packet divided into groups to network packet, according to the Transmission Control Protocol standard tcp data bag recombinated, and makes the data that are input to the DFA engine orderly.
5. the DFA of utilization according to claim 1 carries out the method for detecting virus of stream Network Based at the gateway place, it is characterized in that: described DFA engine is a program library or process independently, and the DFA engine is preserved the last scan state and also recover scanning mode when being scanned next time; Before network packet is imported the DFA engine, the HTTP packet is analyzed, have only the HTTP HEADER network packet of then letting pass, contain HTTP BODY data and then take out BODY data input DFA engine and scan.
6. the DFA of utilization according to claim 1 is characterized in that at the method for detecting virus that the gateway place carries out stream Network Based: the described network terminal is meant that the network flow that triggers virus is in local area network (LAN) one side corresponding equipment.
CNA2008100197264A 2008-03-13 2008-03-13 Method for detecting virus based on network flow with DFA in gateway Pending CN101252576A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100197264A CN101252576A (en) 2008-03-13 2008-03-13 Method for detecting virus based on network flow with DFA in gateway

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100197264A CN101252576A (en) 2008-03-13 2008-03-13 Method for detecting virus based on network flow with DFA in gateway

Publications (1)

Publication Number Publication Date
CN101252576A true CN101252576A (en) 2008-08-27

Family

ID=39955762

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100197264A Pending CN101252576A (en) 2008-03-13 2008-03-13 Method for detecting virus based on network flow with DFA in gateway

Country Status (1)

Country Link
CN (1) CN101252576A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469450A (en) * 2010-11-08 2012-05-23 中国移动通信集团广东有限公司 Method and device for identifying virus characteristics of mobile phone
CN102893580A (en) * 2012-07-04 2013-01-23 华为技术有限公司 Anti-virus method and device and firewall device
CN103546448A (en) * 2012-12-21 2014-01-29 哈尔滨安天科技股份有限公司 Network virus detection method and system based on format parsing
CN104022924A (en) * 2014-07-02 2014-09-03 浪潮电子信息产业股份有限公司 Method for detecting HTTP (hyper text transfer protocol) communication content
CN104424438A (en) * 2013-09-06 2015-03-18 华为技术有限公司 Anti-virus file detection method, anti-virus file detection device and network equipment
CN104767710A (en) * 2014-01-02 2015-07-08 中国科学院声学研究所 DFA (Determine Finite Automaton)-based transmission load extraction method for HTTP (Hyper Text Transfer Protocol) chunked transfer encoding
CN105119943A (en) * 2015-09-21 2015-12-02 上海斐讯数据通信技术有限公司 Network virus prevention method, network virus prevention router and network virus prevention system
CN106657277A (en) * 2016-11-24 2017-05-10 上海携程商务有限公司 Http proxy service method and server and system
CN107306264A (en) * 2016-04-25 2017-10-31 腾讯科技(深圳)有限公司 Network security monitoring method and apparatus
CN109150649A (en) * 2018-06-07 2019-01-04 武汉思普崚技术有限公司 Network performance test method and system
CN109981629A (en) * 2019-03-19 2019-07-05 杭州迪普科技股份有限公司 Antivirus protection method, apparatus, equipment and storage medium
CN111565131A (en) * 2020-04-22 2020-08-21 烽火通信科技股份有限公司 Speed measuring method and system for household gateway CPU
CN112769790A (en) * 2020-12-30 2021-05-07 杭州迪普科技股份有限公司 Traffic processing method, device, equipment and storage medium
CN116743885A (en) * 2023-08-15 2023-09-12 深圳华锐分布式技术股份有限公司 UDP engine-based data transmission method, device, equipment and medium

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469450A (en) * 2010-11-08 2012-05-23 中国移动通信集团广东有限公司 Method and device for identifying virus characteristics of mobile phone
CN102469450B (en) * 2010-11-08 2014-06-04 中国移动通信集团广东有限公司 Method and device for recognizing virus characteristics of mobile phone
CN102893580A (en) * 2012-07-04 2013-01-23 华为技术有限公司 Anti-virus method and device and firewall device
WO2014005303A1 (en) * 2012-07-04 2014-01-09 华为技术有限公司 Anti-virus method and apparatus and firewall device
CN103546448A (en) * 2012-12-21 2014-01-29 哈尔滨安天科技股份有限公司 Network virus detection method and system based on format parsing
CN104424438B (en) * 2013-09-06 2018-03-16 华为技术有限公司 A kind of antivirus file detection method, device and the network equipment
CN104424438A (en) * 2013-09-06 2015-03-18 华为技术有限公司 Anti-virus file detection method, anti-virus file detection device and network equipment
CN104767710A (en) * 2014-01-02 2015-07-08 中国科学院声学研究所 DFA (Determine Finite Automaton)-based transmission load extraction method for HTTP (Hyper Text Transfer Protocol) chunked transfer encoding
WO2015101152A1 (en) * 2014-01-02 2015-07-09 中国科学院声学研究所 Method for extracting transmission payload of dfa-based http chunked transfer encoding
CN104767710B (en) * 2014-01-02 2018-08-07 中国科学院声学研究所 The transmission payload extracting method of HTTP block transmissions coding based on DFA
CN104022924A (en) * 2014-07-02 2014-09-03 浪潮电子信息产业股份有限公司 Method for detecting HTTP (hyper text transfer protocol) communication content
CN105119943A (en) * 2015-09-21 2015-12-02 上海斐讯数据通信技术有限公司 Network virus prevention method, network virus prevention router and network virus prevention system
CN107306264A (en) * 2016-04-25 2017-10-31 腾讯科技(深圳)有限公司 Network security monitoring method and apparatus
CN107306264B (en) * 2016-04-25 2019-04-02 腾讯科技(深圳)有限公司 Network security monitoring method and apparatus
CN106657277B (en) * 2016-11-24 2020-06-12 上海携程商务有限公司 Http proxy service method, server and system
CN106657277A (en) * 2016-11-24 2017-05-10 上海携程商务有限公司 Http proxy service method and server and system
CN109150649A (en) * 2018-06-07 2019-01-04 武汉思普崚技术有限公司 Network performance test method and system
CN109150649B (en) * 2018-06-07 2021-04-23 武汉思普崚技术有限公司 Network performance test method and system
CN109981629A (en) * 2019-03-19 2019-07-05 杭州迪普科技股份有限公司 Antivirus protection method, apparatus, equipment and storage medium
CN111565131A (en) * 2020-04-22 2020-08-21 烽火通信科技股份有限公司 Speed measuring method and system for household gateway CPU
CN112769790A (en) * 2020-12-30 2021-05-07 杭州迪普科技股份有限公司 Traffic processing method, device, equipment and storage medium
CN112769790B (en) * 2020-12-30 2022-06-28 杭州迪普科技股份有限公司 Traffic processing method, device, equipment and storage medium
CN116743885A (en) * 2023-08-15 2023-09-12 深圳华锐分布式技术股份有限公司 UDP engine-based data transmission method, device, equipment and medium
CN116743885B (en) * 2023-08-15 2023-10-13 深圳华锐分布式技术股份有限公司 UDP engine-based data transmission method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN101252576A (en) Method for detecting virus based on network flow with DFA in gateway
JP3794491B2 (en) Attack defense system and attack defense method
KR100612452B1 (en) Apparatus and Method for Detecting Malicious Code
CN103634315B (en) The front-end control method and system of name server
CN101436958B (en) Method for resisting abnegation service aggression
US7904959B2 (en) Systems and methods for detecting and inhibiting attacks using honeypots
CN1838670A (en) System safety protection method using multi processing unit structure and related device
CN100558089C (en) A kind of content filtering gateway implementation method of filter Network Based
GB2357939A (en) E-mail virus detection and deletion
US7865474B2 (en) Data processing system
CN100531213C (en) Network safety protective method for preventing reject service attack event
US20060288418A1 (en) Computer-implemented method with real-time response mechanism for detecting viruses in data transfer on a stream basis
US20040107361A1 (en) System for high speed network intrusion detection
US20140223558A1 (en) Method and device for integrating multiple threat security services
CN101572700A (en) Method for defending HTTP Flood distributed denial-of-service attack
CN107979581B (en) Detection method and device for zombie characteristics
CN101213812A (en) Method for defending against denial of service attacks in IP networks by target victim self-identification and control
CN101213813A (en) Method for defending against denial of service attacks in IP networks by target victim self-identification and control
CN1960246A (en) Method for filtering out harmfulness data transferred between terminal and destination host in network
US8336092B2 (en) Communication control device and communication control system
KR20070103774A (en) Communication control device and communication control system
CN103248609A (en) System, device and method for detecting data from end to end
JP2007325293A (en) System and method for attack detection
CN1152517C (en) Method of guarding network attack
CN1992595A (en) Terminal and related computer implemented method for detecting malicious data for computer network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080827