CN103929336A - High speed data extraction and linear speed analysis method - Google Patents

High speed data extraction and linear speed analysis method Download PDF

Info

Publication number
CN103929336A
CN103929336A CN201310017594.2A CN201310017594A CN103929336A CN 103929336 A CN103929336 A CN 103929336A CN 201310017594 A CN201310017594 A CN 201310017594A CN 103929336 A CN103929336 A CN 103929336A
Authority
CN
China
Prior art keywords
module
data
network
linear speed
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310017594.2A
Other languages
Chinese (zh)
Inventor
余振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310017594.2A priority Critical patent/CN103929336A/en
Publication of CN103929336A publication Critical patent/CN103929336A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to a high speed data extraction and linear speed analysis method. The system comprises a probe module, a storer, a security policy module and an access control management module, wherein the probe module, the storer, the security policy module and the access control management module are embedded into a gigabit Ethernet tester. The high speed data extraction and linear speed analysis method overcomes the defect that data linear speed extraction and processing cannot be achieved in an existing high speed network and can be widely applied to the fields of data analysis, instruments and meters.

Description

A kind of high-speed data extracts and linear speed analytical method
Technical field
The present invention relates to a kind of high-speed data and extract and linear speed analytical method, especially a kind of high-speed data based on hand-hold type gigabit Ethernet tester extracts and linear speed analytical method.
Background technology
In the work that is people at network and life constantly bring many benefits, also constantly bring new worry to the network user.The network user constantly suffers network hacker and viral invasion.All-pervasive gateway, server or the online computer of threatening of hacker and virus.When illegal invasion and computer virus are sustained a great loss society, also wake people's awareness of safety up, accelerated the development of network security marketplace.
Network security relies on no longer merely single equipment and monotechnics and realizes and become industry common recognition.Particularly as the virus attack problem the most easily causing in network, and the moment be among illegal invasion and viral encirclement, safe condition is very passive, but lacks the instrument product for this class quick diagnosis and real-time analysis equipment in existing market.
Based on the above, be badly in need of a kind of effectively high-speed data and extract and linear speed information analysis method.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of network information high-speed data extraction and linear speed analytical method of identification fast.
For solving the problems of the technologies described above, the technical solution adopted in the present invention is: provide a kind of high-speed data to extract and linear speed analytical method, this system comprises the probe module, memory, security strategy module and the access administration module that are embedded in gigabit Ethernet handheld instrument instrument.Wherein, data flow in local network is in the time of probe module, part information is stored in memory, external reference management system is to the data analysis in memory and realize the monitoring to network operation state, probe module judges data according to the requirement of security strategy module, and executes control according to the cause for gossip of judged result opposite end.
The further improvement of technique scheme is: wherein external reference management system further comprises analysis engine module, information monitoring mechanism module, information log administration module and monitoring display module.The access checking of analysis engine module and authentication binding characteristic, form subscriber terminal equipment and user's binding function, realizes the trackability of the network information.Probe module comprises active and passive type mode of operation, and active mode is that all network informations of flowing through are scanned, and finds potential security threat, and the passive mode driving of transmission data Network Based is analyzed.
For solving the problems of the technologies described above, another technical scheme of the present invention is: provide a kind of high-speed data to extract and linear speed analytical method, comprise the following steps:
Step 1, local network data flow are through probe module, and security strategy module compares judgement and according to result, port controlled it;
Step 2, memory are preserved a part of data, and by analysis engine module, produce network analysis data, realize the monitoring to network operation state.
The invention has the beneficial effects as follows: because the present invention is by the monitoring to network operation state to the data analysis in memory realization of external reference management system, probe module judges data according to the requirement of security strategy module, and execute control according to the cause for gossip of judged result opposite end, this system is had on local area network (LAN) across three layers of exchange, the function of intrusion detection and the anti-three aspects: that kills the virus.
Brief description of the drawings
Fig. 1 is the structure chart of active probe virus protection system of the present invention.
1. probe modules in figure, 2. memory module, 3. security strategy module, 4. analysis engine module, 5. information control
Module 6. information log modules, 7. monitoring display module, 8. access information management, 9. system applies interface
Embodiment
High-speed data extraction of the present invention and linear speed analytical method are based on hand-hold type ethernet test platform, identify weak reality for current network information, high-speed data extraction of the present invention and linear speed analytical method can realize the safe practice of network information identification and access track.It is comprehensively integrated broadband access, security control and access track, has solved the problem that ethernet test instrument cann't be solved in the past.Especially be applicable to the occasions such as network on-line analysis, network field conduct.
As shown in Figure 1, high-speed data extraction of the present invention and linear speed analytical method are mainly by being embedded in probe module (1), memory (2), the security strategy module (3) (being mainly security strategy mechanism storehouse) in hand-hold type gigabit Ethernet tester and being arranged on the external reference management system (8) in information monitoring server, and external reference management system mainly comprises analysis engine module (4), information monitoring module (5) (being mainly information monitoring knowledge base), information log administration module (6) and monitoring display module (7).
Security strategy module (3) system of being mainly provides security strategy, comprises tactful preservation, renewal, interpolation.Analysis engine module (4) is mainly by checking network data information; in detection system, run counter to security strategy or jeopardize behavior or the activity of system safety; thereby the resource of protection information system is not subject to Denial of Service attack, prevent system data leakage, distort and destroy.Information monitoring module (5) is mainly to network traffics, user's running status dynamic surveillance.Information log administration module (6) mainly records in good time and inquires by classification Operation Log, system running log, fault log.Monitoring display module (7) is mainly monitored terminal use with real-time display mode.
When data flow in local area network (LAN) is passed through probe module (1), some key messages in data are stored in data storage (2) on the one hand, the information exchange of having preserved is crossed the analysis engine module (4) in information monitoring server, produce network analysis data, realize the monitoring to network operation state.On the other hand, probe module (1) compares judgement according to the strategy of security strategy module (3) to data, and require the port of information exchange/route to implement to control according to security strategy module (3), blocking-up or warning prompt have the port of virus or spam.
Probe module (1) mode of operation is divided into active mode and passive mode, active mode is that the user terminal on all Layer 2 switch below three-tier switch is scanned, to produce the extremely potential security threat of system of terminal use moving in network, as security breaches, back door port etc.Passive mode is exactly the driving of transmission data Network Based, do not send probe to network, but stream of packets in monitoring network is inferred the situation of network, monitor network with passive mode, collection comes from the statistics of all topologys, virtual circuit, application and agreement, has realized the each layer analysis of data link layer to application layer.
Analysis engine module (4) in information monitoring server is to realize the core of network traffics, user's running status dynamic surveillance.The data that probe module (1) gathers, by the processing of analysis engine module (4), produce corresponding form or graphic file, hold in time network operation situation and implement corresponding management strategy for network management personnel.Analysis engine module (4) can also be controlled moving (1) state sampling of probe module and gather user terminal screen picture, to realize the monitoring that the network user is used to state.
Access checking in analysis engine module (4) is combined with authentication, forms subscriber terminal equipment and user's binding function, has realized the trackability of the network information.Before connection device is verified, access to netwoks power is prohibited completely.After being verified, user can be provided the 3rd layer of filtration, rate limit and the 4th layer of filtration.
Advantage of the present invention is just the environment such as field, spatial limitation, can rapid extraction and analyze network carrying information, be beneficial to Quick-return and the reliability service of network.

Claims (10)

1. a high-speed data extracts and linear speed analytical method, it is characterized in that: this system comprises the probe module, memory, security strategy module and the access information management that are embedded in gigabit Ethernet tester, wherein, data flow in local network is in the time of probe module, part information is stored in memory, management system is to the data analysis in memory and realize the monitoring to network operation state, probe module judges data according to the requirement of security strategy module, and executes control according to the cause for gossip of judged result opposite end.
2. high-speed data as claimed in claim 1 extracts and linear speed analytical method, it is characterized in that: this access information management further comprises analysis engine module, information monitoring module, information log administration module and monitoring display module, wherein, data are after engine modules is analyzed by analysis, realize dynamic monitoring by information monitoring module, then via log management module and monitoring display module management or demonstration.
3. high-speed data as claimed in claim 2 extracts and linear speed analytical method, it is characterized in that: the access checking of this analysis engine module and remote user authentication system identity certification combination, form subscriber terminal equipment and user's binding function, realize the trackability of the network information.
4. high-speed data as claimed in claim 3 extracts and linear speed analytical method, it is characterized in that: this remote user authentication system be a kind of between network access server and shared certificate server the agreement of certified transmission, mandate and configuration information.
5. active probe virus protection system as claimed in claim 4, is characterized in that: this remote customer dialing authentication system is used UDP as its host-host protocol.
6. high-speed data as claimed in claim 5 extracts and linear speed analytical method, it is characterized in that: this remote customer dialing authentication system is responsible for transmitting the charge information between network access server and shared accounting server.
7. high-speed data as claimed in claim 3 extracts and linear speed analytical method, it is characterized in that: IEEE802.1x is a kind of link layer authentication mechanism agreement, and controlling access to netwoks port is the access of network connection point.
8. high-speed data as claimed in claim 7 extracts and linear speed analytical method, it is characterized in that: physical exchange port or logic port that this access to netwoks port is access point.
9. high-speed data as claimed in claim 1 extracts and linear speed analytical method, it is characterized in that: this probe module comprises active and passive type mode of operation, active mode is that the user terminal on all Layer 2 switch below three-tier switch is scanned, find potential security threat, the passive mode driving of transmission data Network Based is analyzed.
10. high-speed data extracts and a linear speed analytical method, it is characterized in that comprising the following steps:
Step 1, local network data flow are through probe module, and security strategy module compares judgement and according to result, port controlled it;
Step 2, memory are preserved a part of data, and by analysis engine module, produce network analysis data, realize the monitoring to network operation state.
CN201310017594.2A 2013-01-16 2013-01-16 High speed data extraction and linear speed analysis method Pending CN103929336A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310017594.2A CN103929336A (en) 2013-01-16 2013-01-16 High speed data extraction and linear speed analysis method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310017594.2A CN103929336A (en) 2013-01-16 2013-01-16 High speed data extraction and linear speed analysis method

Publications (1)

Publication Number Publication Date
CN103929336A true CN103929336A (en) 2014-07-16

Family

ID=51147420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310017594.2A Pending CN103929336A (en) 2013-01-16 2013-01-16 High speed data extraction and linear speed analysis method

Country Status (1)

Country Link
CN (1) CN103929336A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022129A (en) * 2016-05-17 2016-10-12 北京江民新科技术有限公司 File data characteristic extraction method and device and virus characteristic detection system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040003284A1 (en) * 2002-06-26 2004-01-01 Microsoft Corporation Network switches for detection and prevention of virus attacks
CN1905471A (en) * 2005-07-28 2007-01-31 深圳市世纪大吉网络通讯有限公司 Active virus detecting protecting system and protecting method thereof
CN101052020A (en) * 2007-05-21 2007-10-10 中兴通讯股份有限公司 Monitor method and system for automatically measuring executing process
CN101127638A (en) * 2007-06-07 2008-02-20 飞塔信息科技(北京)有限公司 Active virus automatic prevention and control system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040003284A1 (en) * 2002-06-26 2004-01-01 Microsoft Corporation Network switches for detection and prevention of virus attacks
CN1905471A (en) * 2005-07-28 2007-01-31 深圳市世纪大吉网络通讯有限公司 Active virus detecting protecting system and protecting method thereof
CN101052020A (en) * 2007-05-21 2007-10-10 中兴通讯股份有限公司 Monitor method and system for automatically measuring executing process
CN101127638A (en) * 2007-06-07 2008-02-20 飞塔信息科技(北京)有限公司 Active virus automatic prevention and control system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022129A (en) * 2016-05-17 2016-10-12 北京江民新科技术有限公司 File data characteristic extraction method and device and virus characteristic detection system
CN106022129B (en) * 2016-05-17 2019-02-15 北京江民新科技术有限公司 Data characteristics extracting method, device and the virus characteristic detection system of file

Similar Documents

Publication Publication Date Title
Premaratne et al. An intrusion detection system for IEC61850 automated substations
CN111092869B (en) Security management and control method for terminal access to office network and authentication server
CN109660526A (en) A kind of big data analysis method applied to information security field
KR101375813B1 (en) Active security sensing device and method for intrusion detection and audit of digital substation
CN106131023A (en) A kind of Information Security Risk strength identifies system
CN100435513C (en) Method of linking network equipment and invading detection system
JP6833672B2 (en) How to detect attacks on the work environment connected to the communication network
CN107347047A (en) Attack guarding method and device
CN108270716A (en) A kind of audit of information security method based on cloud computing
CN107295010A (en) A kind of enterprise network security management cloud service platform system and its implementation
CN106685984A (en) Network threat analysis system and method based on data pocket capture technology
Gandhi et al. Packet sniffer–a comparative study
CN106878339A (en) A kind of vulnerability scanning system and method based on internet-of-things terminal equipment
Neu et al. Lightweight IPS for port scan in OpenFlow SDN networks
CN106209902A (en) A kind of network safety system being applied to intellectual property operation platform and detection method
CN111131332A (en) Network service interconnection and flow acquisition, analysis and recording system
Toker et al. Mitre ics attack simulation and detection on ethercat based drinking water system
Ali et al. Detection and prevention cyber-attacks for smart buildings via private cloud environment
KR20150026345A (en) Apparatus and method for creating whitelist with network traffic
Araújo et al. EICIDS-elastic and internal cloud-based detection system
Yakin et al. Security threats and service degradation detection in LoRaWAN networks
Vokorokos et al. Network security on the intrusion detection system level
CN103929336A (en) High speed data extraction and linear speed analysis method
CN115801441A (en) Safety protection system and method of train communication network
Liu et al. The dynamic honeypot design and implementation based on Honeyd

Legal Events

Date Code Title Description
DD01 Delivery of document by public notice

Addressee: Yu Zhenhua

Document name: Notification of Passing Preliminary Examination of the Application for Invention

C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: Yu Zhenhua

Document name: the First Notification of an Office Action

DD01 Delivery of document by public notice

Addressee: Yu Zhenhua

Document name: Decision of Rejection

DD01 Delivery of document by public notice
RJ01 Rejection of invention patent application after publication

Application publication date: 20140716

RJ01 Rejection of invention patent application after publication