Embodiment
The embodiment of the invention provides a kind of data transfer control method and data transfer controller, is used to improve the reliability of blacklist filtering technique, reduces the erroneous judgement probability.
In the present embodiment, after judging that according to data message described main frame satisfies a filtercondition, need to judge again the host address that whether comprises described main frame in the credible address list that presets, when comprising the host address of described main frame in the credible address list, then do not abandon the data message that described main frame sends, and respond this data message, and according to the corresponding operation of this data message execution, so the host address of believable main frame can be put into credible address list, even make these main frames abnormal conditions occur, safety means can not blacklist it yet, therefore can guarantee that these main frames can safeguard safety means, so reduced the erroneous judgement probability, improved the reliability of blacklist filtering technique.
Below in conjunction with Figure of description the data transfer control method embodiment in the embodiment of the invention is described, see also Fig. 1, data transfer control method first embodiment comprises in the embodiment of the invention:
101, receive the data message that main frame sends;
In the present embodiment, the data message that safety means send by system interface reception sources main frame, this data message can mail to destination host, receive by the safety means interception, also can be directly to mail to safety means to be used for safety means are carried out attended operation, carry the host address of source host in this data message, need to prove, address in the present embodiment can (IP, InternetProtocol) address also can be media interviews control (MAC for Internet protocol, MediaAccess Control) address, can also be the address of other types perhaps, not limit herein, be that example describes with the IP address among the following embodiment.
To the safety means request of sending datagram safety means being maintained as example with source host in present embodiment and the subsequent embodiment describes, then in the data message except the IP address that comprises source host, also include user's check information that source host sends, be specifically as follows user name and password.
102, judge whether main frame satisfies filtercondition, if then execution in step 103, if not, then execution in step 105;
Particularly, safety means get access to after the data message of source host transmission, judge according to this data message whether this source host satisfies filtercondition, in the practical application, can determine in the following ways whether source host satisfies filtercondition:
User's check information errors number that A, source host provide reaches preset value:
Particularly, safety means authenticate the user's check information that comprises in the described data message, if authentification failure then writes down the number of times to the data message authentification failure of described main frame transmission;
Whether the number of times of judging described authentification failure reaches the threshold value that presets, if reach, judges that then described main frame satisfies the filtercondition that presets.
In the practical application, concrete threshold value can be set according to the height of level of security, the level of security height, then threshold value can be provided with lower, level of security is low, then threshold value can be provided with than higher, be assumed to be 3 times, if the data message that safety means receive from a certain source host, and the user's check information that is comprised in data message accumulative total errors number reaches 3 times, and then safety means judge that this source host may be illegal host, promptly can't provide correct user name and password, but attempt access security equipment time and again, so determine that this source host satisfies filtercondition.
B, if carry connection request in the described data message, the number of times of the connection request that receives from described main frame of safety records then;
Whether the number of times of the connection request that judgement received from described main frame in the time of presetting reaches the threshold value that presets, if reach, judges that then described main frame satisfies the filtercondition that presets.
In the practical application, in the data message that source host sends if include connection request, the number of times of the connection request that receives from this source host of safety means record accumulative total then, whether the number of times of judging in a certain period time cycle the connection request that receives from this source host afterwards surpasses threshold value, if surpass, determine that then this source host satisfies filtercondition, thereby because tending at short notice to initiate a large amount of connection requests to safety means or other main frames, some illegal host make network paralysis or main frame lose response, therefore can be with the number of times of connection request as judging one of condition that main frame is whether illegal.
The above-mentioned situation that only meets filtercondition with two example explanations is understandable that, according to the difference of practical application, the mode whether specifically definite certain main frame satisfies filtercondition also has other approach, does not do qualification herein.
103, judge the host address that whether comprises main frame in the credible address list, if then execution in step 105, if not, then execution in step 104;
When main frame satisfies filtercondition, promptly tentatively think in the time of to filter the data message that this main frame sends, for preventing erroneous judgement, then need to judge the IP address that whether comprises this source host in the credible address list that presets this locality, this credible address list can be safeguarded by the network management personnel, include some believable network addresss in this tabulation, this tabulation is used for indication: even the data message that the main frame of these network addresss sends exists abnormal conditions (for example to send a large amount of connection requests in the short time, or the input error of user's check information reaches preset value), these main frames are not filtered yet, promptly these main frames are not added in the blacklist.
Need to prove, in actual applications, this credible address list can be Access Control List (ACL) (ACL, Access Control List), also can be the tabulation that is used for recording address of other types, the data in this tabulation can be added according to actual conditions or deleted by the network management personnel.
104, abandon the data message that described main frame sends, and process ends;
If the IP address of source host is not comprised in the credible address list, determine that then this source host is an illegal host, and do not belong to special case situation (being credible address), so this source host is added blacklist, promptly abandon the data message that this source host sends.
After this source host is added blacklist, can also monitor the data message of this source host, be tending towards normally then it to be deleted from blacklist if judge the data message of its transmission, idiographic flow is a prior art, repeats no more herein.
105, carry out corresponding the processing according to this data message.
If source host does not satisfy filtercondition, promptly this source host is not to be illegal host, or this source host tentatively is defined as illegal host, but its address belongs to credible address list, then directly respond this data message, and handle accordingly according to the data message that this source host sends, for example the source host request of sending datagram is safeguarded safety means, then safety means carry out relevant maintaining operation according to this data message, and detailed process is not done qualification.
In the said process, because before source host is added blacklist, earlier judge whether the IP address of this source host belongs to credible address list, if belong to, then it is not added blacklist, still the data message of its transmission is handled accordingly, therefore can be avoided effectively believable main frame is added blacklist, thereby can improve the reliability of blacklist filtering technique.
In the foregoing description, because concrete credible address list can upgrade according to network management personnel's demand, the IP address that then might appearance itself be placed in the main frame in the blacklist is described this situation below by the situation that the network management personnel adds credible address list:
See also Fig. 2, data transfer control method second embodiment comprises in the embodiment of the invention:
201, receive the data message that main frame sends;
In the present embodiment, the data message that safety means send by system interface reception sources main frame, this data message can mail to destination host, receive by the safety means interception, also can be directly to mail to safety means to be used for safety means are carried out attended operation, carry the host address of source host in this data message, need to prove, address in the present embodiment can be the IP address, it also can be MAC Address, can also be the address of other types perhaps, not limit herein, be that example describes with the IP address among the following embodiment.
To the safety means request of sending datagram safety means being maintained as example with source host in present embodiment and the subsequent embodiment describes, then in the data message except the IP address that comprises source host, also include user's check information that source host sends, be specifically as follows user name and password.
202, judge the host address that whether comprises main frame in the blacklist list, if comprise, then execution in step 204, if do not comprise, then execution in step 203;
After safety means receive the data message of source host transmission, judge whether the IP address of this source host lists in the blacklist.
203, judge whether main frame satisfies filtercondition, if then execution in step 204, if not, then execution in step 206;
If the IP address of this source host is not listed in the blacklist, then safety means judge according to this data message whether this source host satisfies filtercondition, in the practical application, can determine in the following ways whether source host satisfies filtercondition:
User's check information errors number that A, source host provide reaches preset value:
Particularly, safety means authenticate the user's check information that comprises in the described data message, if authentification failure then writes down the number of times to the data message authentification failure of described main frame transmission;
Whether the number of times of judging described authentification failure reaches the threshold value that presets, if reach, judges that then described main frame satisfies the filtercondition that presets.
In the practical application, concrete threshold value can be set according to the height of level of security, the level of security height, then threshold value can be provided with lower, level of security is low, then threshold value can be provided with than higher, be assumed to be 3 times, if the data message that safety means receive from a certain source host, and the user's check information that is comprised in data message accumulative total errors number reaches 3 times, and then safety means judge that this source host may be illegal host, promptly can't provide correct user name and password, but attempt access security equipment time and again, so determine that this source host satisfies filtercondition.
B, if carry connection request in the described data message, the number of times of the connection request that receives from described main frame of safety records then;
Whether the number of times of the connection request that judgement received from described main frame in the time of presetting reaches the threshold value that presets, if reach, judges that then described main frame satisfies the filtercondition that presets.
In the practical application, in the data message that source host sends if include connection request, the number of times of the connection request that receives from this source host of safety means record accumulative total then, whether the number of times of judging in a certain period time cycle the connection request that receives from this source host afterwards surpasses threshold value, if surpass, determine that then this source host satisfies filtercondition, thereby because tending at short notice to initiate a large amount of connection requests to safety means or other main frames, some illegal host make network paralysis or main frame lose response, therefore can be with the number of times of connection request as judging one of condition that main frame is whether illegal.
The above-mentioned situation that only meets filtercondition with two example explanations is understandable that, according to the difference of practical application, the mode whether specifically definite certain main frame satisfies filtercondition also has other approach, does not do qualification herein.
204, judge the host address that whether comprises main frame in the credible address list, if then execution in step 206, if not, then execution in step 205;
When main frame satisfies filtercondition, or when main frame is listed in the blacklist, promptly tentatively think in the time of to filter the data message that this main frame sends, for preventing erroneous judgement, then need to judge the IP address that whether comprises this source host in the credible address list that presets this locality, this credible address list can be safeguarded by the network management personnel, include some believable network addresss in this tabulation, this tabulation is used for indication: even the data message that the main frame of these network addresss sends exists abnormal conditions (for example to send a large amount of connection requests in the short time, or the input error of user's check information reaches preset value), these main frames are not filtered yet, promptly these main frames are not added in the blacklist.
Need to prove, in actual applications, this credible address list can be Access Control List (ACL) (ACL, Access Control List), also can be the tabulation that is used for recording address of other types, the data in this tabulation can be added according to actual conditions or deleted by the network management personnel.
205, abandon the data message that described main frame sends, and process ends;
If the IP address of source host is not comprised in the credible address list, determine that then this source host is an illegal host, and do not belong to special case situation (being credible address), so this source host is added blacklist, promptly abandon the data message that this source host sends.
After this source host is added blacklist, can also monitor the data message of this source host, be tending towards normally then it to be deleted from blacklist if judge the data message of its transmission, idiographic flow is a prior art, repeats no more herein.
206, carry out corresponding the processing according to this data message.
If source host is not listed in the blacklist, or source host does not satisfy filtercondition, or this source host tentatively is defined as illegal host, but its address belongs to credible address list, then directly respond this data message, and handle accordingly according to the data message that this source host sends, for example the source host request of sending datagram is safeguarded safety means, then safety means carry out relevant maintaining operation according to this data message, and detailed process is not done qualification.
In the said process, if certain main frame is placed in the blacklist, but the network management personnel is added into its address in the credible address list, then safety means do not abandon the data message of the follow-up transmission of this main frame, and handle accordingly according to these data messages, therefore the main frame that can make mistake be added into blacklist still can send datagram safety means are safeguarded, thereby can improve the reliability of blacklist filtering technique.
See also Fig. 3, the data transfer controller embodiment in the embodiment of the invention comprises:
Message receiving element 301 is used to receive the data message that main frame sends, and carries the host address of described main frame in the described data message;
Filter verification unit 302, be used for judging according to described data message whether described main frame satisfies a filtercondition;
Access control unit 303, whether the host address that is used for judging the main frame that satisfies described filtercondition is at a credible address list;
Performance element 304 is used to respond the data message that the main frame that satisfies condition sends, and carries out and handles operation, and the described main frame that satisfies condition is the main frame that the address is judged in described credible address list through described access control unit 303.
Data transfer controller in the present embodiment can further include:
Exception processing unit 306 is used for abandoning the data message that described main frame sends when described access control unit 303 judges that the credible address list that presets does not comprise the host address of described main frame.
Data transfer controller in the present embodiment can further include:
Blacklist verification unit 305, be used for judging whether the blacklist address list that presets comprises the host address of described main frame, if comprise, then indicate described access control unit 303 to carry out and judge the step that whether comprises the host address of described main frame in the credible address list that presets.
Above-mentioned address is the IP address, or MAC Address, and above-mentioned described credible address list is ACL.
In the present embodiment, after judging that according to data message described main frame satisfies the filtercondition that presets, need to judge again the host address that whether comprises described main frame in the credible address list that presets, when comprising the host address of described main frame in the credible address list, then do not abandon the data message that described main frame sends, and carry out corresponding operation according to this data message, so the host address of believable main frame can be put into credible address list, even make these main frames abnormal conditions occur, safety means can not blacklist it yet, therefore can guarantee that these main frames can safeguard safety means, so reduced the erroneous judgement probability, improved the reliability of blacklist filtering technique.
One of ordinary skill in the art will appreciate that all or part of step that realizes in the foregoing description method is to instruct relevant hardware to finish by program, described program can be stored in a kind of computer-readable recording medium, this program comprises the steps: when carrying out
Receive the data message that main frame sends, carry the host address of described main frame in the described data message;
Judge according to described data message whether described main frame satisfies a filtercondition, if satisfy,
Judge described address whether in a credible address list, if,
Then respond described data message, carry out operation accordingly.
The above-mentioned storage medium of mentioning can be a read-only memory, disk or CD etc.
More than a kind of data transfer control method provided by the present invention and data transfer controller are described in detail, for one of ordinary skill in the art, thought according to the embodiment of the invention, part in specific embodiments and applications all can change, in sum, this description should not be construed as limitation of the present invention.