CN105978885A - Network security monitoring method and network security monitoring device - Google Patents

Network security monitoring method and network security monitoring device Download PDF

Info

Publication number
CN105978885A
CN105978885A CN201610371409.3A CN201610371409A CN105978885A CN 105978885 A CN105978885 A CN 105978885A CN 201610371409 A CN201610371409 A CN 201610371409A CN 105978885 A CN105978885 A CN 105978885A
Authority
CN
China
Prior art keywords
bag
access request
data access
module
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610371409.3A
Other languages
Chinese (zh)
Inventor
刘华英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610371409.3A priority Critical patent/CN105978885A/en
Publication of CN105978885A publication Critical patent/CN105978885A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Abstract

The invention discloses a network security monitoring method. The network security monitoring method is characterized in that IP packages are acquired by IP addresses, which are reserved in a terminal locally; the IP packages are assembled to generate data access request packages according to the information of the IP packages; the security detection of the data access request packages is carried out, when the result of the detection of the data access request packages is safe, the data access request packages are forwarded; when the result of the detection of the data access request packages is unsafe, interception operation is executed. By adopting the above mentioned network security monitoring method, a conventional way of using servers to carry out the network security monitoring process is replaced, the extra erecting of the servers is not required, and speed of devices accessing the network is faster. The invention also discloses a network security monitoring device.

Description

Network security monitoring method and apparatus
Technical field
The present invention relates to field of computer technology, particularly relate to a kind of network security monitoring method and apparatus.
Background technology
Currently, disparate networks is attacked and is emerged in an endless stream, and user is easy to by lawless person by fake site, and the such as mode such as fishing website, network swindle malice steals information, thus brings increasing harm to network security.To this end, for solving the problems referred to above in conventional art, it is common that the data stream of network packet is forced to deliver to server and carries out detection and the forwarding of network security, thus the realization to general network safety system framework serves positive role.
But in conventional art, need additionally to set up server, it is achieved cost is high, and equipment access the speed of network due to server load excessive, speed is low.
Summary of the invention
Based on this, it is necessary to provide a kind of equipment of accelerating to access the network security monitoring method and apparatus of network speed.
A kind of network security monitoring method, comprises the following steps:
By the IP address capture IP bag that terminal local is reserved;
According to the information in described IP bag, described IP bag is assembled, generate data access request bag;
Described data access request bag is carried out safety detection, if the testing result of described data access request bag is safety, then forwards described data access request bag;
If the testing result of described data access request bag is dangerous, then perform to intercept operation.
A kind of network security monitoring device, including:
Trapping module, for the IP address capture IP bag reserved by terminal local;
Assemble module, for described IP bag being assembled according to the information in described IP bag, generate data access request bag;
Detection module, for carrying out safety detection to described data access request bag;
Forwarding module, if the testing result for described data access request bag is safety, then forwards described data access request bag;
Blocking module, if the testing result for described data access request bag is dangerous, then performs to intercept operation.
Above-mentioned network security monitoring method and apparatus, by the IP address capture IP bag that terminal local is reserved, according to the information in IP bag, IP bag is assembled, generate data access request bag, data access request bag is carried out safety detection, if the testing result of data access request bag is safety, then forwards data access request bag, if the testing result of data access request bag is dangerous, then perform to intercept operation.Above-mentioned network security monitoring method instead of the process that tradition utilizes server to carry out network security monitoring, it may not be necessary to additionally set up server, and the speed of equipment access network is more quick.
Accompanying drawing explanation
Fig. 1 is the applied environment figure of network security monitoring method in an embodiment;
Fig. 2 is the cut-away view of terminal in an embodiment;
Fig. 3 is the schematic flow sheet of network security monitoring method in an embodiment;
Fig. 4 is the schematic flow sheet of network security monitoring method in another embodiment;
Fig. 5 is the structural representation of network security monitoring device in an embodiment;
Fig. 6 is the structural representation of the trapping module in an embodiment in network security monitoring device;
Fig. 7 is the structural representation of the assembling module in an embodiment in network security monitoring device;
Fig. 8 is the structural representation of the detection module in an embodiment in network security monitoring device;
Fig. 9 is the structural representation of the blocking module in an embodiment in network security monitoring device.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, by the following examples, and combine accompanying drawing, the detailed description of the invention of inventive network method for safety monitoring and device is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The network security monitoring method that the embodiment of the present invention is provided can be applicable in environment as shown in Figure 1.Refer to shown in Fig. 1, by the local reserved IP address capture IP bag of terminal 102.Wherein, the local reserved IP address of terminal 102 is effectively equivalent to a virtual IP address, a part of space in counterpart terminal 102 caching.Understand for convenience, it is also possible to above-mentioned virtual IP address is interpreted as a virtual router 106.IP bag forces to send in the router 106 virtual to this, by tunneling technique, follow-up assembling and the detection process of carrying out through network interface card.Concrete, IP bag is assembled by the information in IP bag according to capture, generates data access request bag, data access request bag is carried out safety detection, if the testing result of data access request bag is safety, then forward data access request bag to the webserver 104;If the testing result of data access request bag is dangerous, then perform to intercept operation.
Wherein, terminal 102 can but be not limited to have can network personal computer, notebook computer, smart mobile phone, panel computer, portable wearable device etc..
In one embodiment, as shown in Figure 2, additionally provide a kind of terminal 102, this terminal 102 includes processor, Graphics Processing Unit, storage medium, internal memory, network interface, display and the input equipment connected by system bus, in storage medium, storage has operating system and a kind of network security monitoring device, and this network security monitoring device is for a kind of method realizing network security monitoring.This processor is used for improving calculating and control ability, supports the operation of terminal.Graphics Processing Unit in terminal is for providing at the drawing ability at display application operating interface, such as, draw the interface element etc. in the APP pre-set being operated according to networking request, internal memory provides environment for the operation for the network security monitoring device in storage medium, network interface is for carrying out network service with server, receive and send data, such as, the data access request bag of safety being sent to server etc..Touch screen is used for icon and the display at interface of various application, and such as, display connects the successful link information of network or the warning page info etc. of display connection network failure.
Seeing Fig. 3, in an embodiment, it is provided that a kind of network security monitoring method, the method can be applicable to be illustrated in terminal as shown in Figure 1, comprises the following steps:
Step 302, by the IP address capture IP bag that terminal local is reserved.
In the present embodiment, the IP address that terminal local is reserved is effectively equivalent to a virtual IP address, a part of space in counterpart terminal caching.Understand for convenience, it is also possible to above-mentioned virtual IP address is interpreted as a virtual router.The IP address capture IP bag reserved by terminal local forces to send in the router virtual to this, by tunneling technique, follow-up assembling and the detection process of carrying out through network interface card.
Wherein, IP bag is according to preset protocol, such as a bag transmitted on internet of ICP/IP protocol definition.In the present embodiment, IP bag at least one, and IP bag is made up of capital and data two parts, the front portion of stem is regular length, totally 20 bytes, it is the information that must have of all IP bags, such as, the skew of version information, protocol information, identification information, flag information, sheet, raw address information and destination address information;Stem standing part be followed by some Optional Fields, its length is variable.
Further, the step of the IP address capture IP bag reserved by terminal local is specifically included: is forcibly fed in the IP address that terminal local is reserved by the data stream of the IP bag of local network by tunneling technique, obtains IP bag from the IP address that terminal local is reserved.Wherein, tunneling technique is by the way of a kind of infrastructure by using internet transmits data between networks.The data (or load) using tunnel to transmit can be Frame or the IP bag of different agreement.Then Frame or the bag Reseal of other agreement are sent by tunnel protocol by tunnel.New frame head provides routing iinformation, in order to transmit packed load data by the Internet.
Step 304, assembles IP bag according to the information in IP bag, generates data access request bag.
In the present embodiment, judge to be intended to be assembled into TCP(Transmission Control Protocol according to information such as the identification information of stem, flag information and sheet skews in IP bag, transmission control protocol) bag still UDP(User Datagram Protocol, User Datagram Protocol) bag.Further, it is judged that after TCP bag to be assembled or UDP bag, carry out assembling according to the form of TCP bag or UDP bag.
Step 306, carries out safety detection to data access request bag.
In the present embodiment, the step that data access request bag carries out safety detection specifically includes: the TCP bag that is assembled in above-described embodiment is carried out safety detection, forwards being assembled into UDP bag in above-described embodiment.Further, TCP bag is being carried out in safety detection, needing to obtain the destination address of data access request bag, destination address is being sent to safety database, carries out safety detection.Wherein, safety database prestores multiple safe network destination address, when the destination address of data access request bag is in safety database, then judge that the destination address of data access request bag, as secure address, i.e. can carry out follow-up forwarding networking operation.
Step 308, if the testing result of data access request bag is safety, then forwards data access request bag.
Step 310, if the testing result of data access request bag is dangerous, then performs to intercept operation.
In the present embodiment, the step performing to intercept operation specifically includes: data access request redirects to the warning page preset, thus has ensured when user has access to dangerous website, such as fishing website, during swindle webpage, user browses the beneficial effect that webpage behavior is terminated in time.Further, it is also possible to grasp the harm of website further by being directed to the information of prompting on the warning page preset, there is stronger safety.
Above-mentioned network security monitoring method, by the IP address capture IP bag that terminal local is reserved, according to the information in IP bag, IP bag is assembled, generate data access request bag, data access request bag is carried out safety detection, if the testing result of data access request bag is safety, then forwards data access request bag, if the testing result of data access request bag is dangerous, then perform to intercept operation.The present embodiment instead of tradition by the network security monitoring method introducing tunneling technique and utilizes server to carry out the process of network security monitoring, it may not be necessary to additionally set up server, and the speed of equipment access network is more quick.
In one embodiment, by the step of the IP address capture IP bag that terminal local is reserved, including: by tunneling technique, the data stream of the IP bag of local network is forcibly fed in the IP address that terminal local is reserved, from the IP address that terminal local is reserved, obtains IP bag.
In one embodiment, according to the information in IP bag, IP bag is assembled, generate the step of data access request bag, including: according to the header message in IP bag, IP bag is assembled, generate TCP bag or UDP bag;Data access request bag carries out the step of safety detection, including: TCP bag is carried out safety detection, UDP bag is forwarded.
In one embodiment, data access request bag is carried out the step of safety detection, including: obtain the destination address of data access request bag, be sent to destination address in safety database carry out safety detection.
In one embodiment, perform to intercept the step of operation, including: data access request is redirected to the warning page preset.
As shown in Figure 4, in one embodiment, it is provided that a kind of network security monitoring method, the method, to be applied in terminal as shown in Figure 1 be illustrated, comprises the following steps:
Step 402, by the IP address capture IP bag that terminal local is reserved.
In the present embodiment, the IP address that terminal local is reserved is effectively equivalent to a virtual IP address, a part of space in counterpart terminal caching.Understand for convenience, it is also possible to above-mentioned virtual IP address is interpreted as a virtual router.The IP address capture IP bag reserved by terminal local forces to send in the router virtual to this, by tunneling technique, follow-up assembling and the detection process of carrying out through network interface card.Wherein, terminal includes that at least one APP, an APP can have one or more IP bag.
Step 404, assembles IP bag according to the header message in IP bag, generates TCP bag or UDP bag.
In the present embodiment, judge to be intended to be assembled into TCP bag or UDP bag according to information such as the identification information of stem, flag information and sheet skews in IP bag.Further, it is judged that after TCP bag to be assembled or UDP bag, carry out assembling according to the form of TCP bag or UDP bag.
Step 406, carries out safety detection to TCP bag, if the testing result of TCP bag is safety, then forwards TCP bag, if the testing result of TCP bag is dangerous, then performs to intercept operation.
In the present embodiment, obtain the destination address of TCP bag, be sent to destination address in safety database carry out safety detection.Wherein, safety database prestores multiple safe network destination address, when the destination address of TCP bag is in safety database, then judge that the destination address of TCP bag, as secure address, i.e. can carry out follow-up forwarding networking operation.Further, if the testing result of TCP bag is dangerous address, then performs to intercept operation, be specially the warning page redirecting to data access request preset.
Step 408, forwards UDP bag.
In the present embodiment, only need data access request bag to be assembled into TCP bag and carry out safety detection, UDP bag is assembled into for data access request bag and the most directly carries out forwarding operation.
Above-described embodiment, by setting up a tunneled network in terminal, forces to deliver to the IP address that terminal local is reserved by the data stream of IP bag, by this IP address, capture data to be tested bag, then, carries out safety detection based on the safety detection data base packet to being captured.If it find that the packet captured is dangerous, then packet discard, reach the purpose of safety filtering;If the packet captured meets safety condition, then forward packet.
Further, a kind of method of network security monitoring that above-described embodiment provides efficient, general, low cost, do not affected by customer volume.Thus the safety of Logistics networks, prevent user by the infringement of the modes such as fishing website, network swindle.Wherein, above-described embodiment realizes capture IP bag by tunnel universal technology, and versatility is preferable, and the restriction of platform is low.
Based on same inventive concept, in one embodiment, it is also proposed that a kind of network security monitoring device.Such as Fig. 5, this network security monitoring device 10 includes trapping module 100, assembles module 200, detection module 300, forwarding module 400 and blocking module 500.
Wherein, trapping module 100 is for the IP address capture IP bag reserved by terminal local;Assemble module 200 to be used for according to the information in IP bag, IP bag being assembled, generate data access request bag;Detection module 300 is for carrying out safety detection to data access request bag;If forwarding module 400 is safety for the testing result of data access request bag, then forward data access request bag;If blocking module 500 is dangerous for the testing result of data access request bag, then perform to intercept operation.
Additionally, such as Fig. 6, in one embodiment, trapping module 100 includes sending module 210.Wherein, sending module 210, for being forcibly fed in the IP address that terminal local is reserved by the data stream of the IP bag of local network by tunneling technique, obtains IP bag from the IP address that terminal local is reserved.
In the present embodiment, the IP address that terminal local is reserved is effectively equivalent to a virtual IP address, a part of space in counterpart terminal caching.Understand for convenience, it is also possible to above-mentioned virtual IP address is interpreted as a virtual router.The IP address capture IP bag reserved by terminal local forces to send in the router virtual to this, by tunneling technique, follow-up assembling and the detection process of carrying out through network interface card.
It addition, as it is shown in fig. 7, in one embodiment, assemble module 200 and include generation module 210.Wherein, generation module 210, for assembling IP bag according to the header message in IP bag, generates TCP bag or UDP bag.
In the present embodiment, judge to be intended to be assembled into TCP bag or UDP bag according to information such as the identification information of stem, flag information and sheet skews in IP bag.Further, it is judged that after TCP bag to be assembled or UDP bag, carry out assembling according to the form of TCP bag or UDP bag.
Further, as shown in Figure 8, in one embodiment, detection module 300 includes destination address detection module 310, TCP bag detection module 320 and UDP packet forward module 330.Wherein, destination address, for obtaining the destination address of data access request bag, is sent and carries out safety detection to safety database by destination address detection module 310;TCP bag detection module 320 is for carrying out safe inspection to TCP bag;UDP packet forward module 330 is for forwarding UDP bag.
In the present embodiment, obtain the destination address of TCP bag, be sent to destination address in safety database carry out safety detection.Wherein, safety database prestores multiple safe network destination address, when the destination address of TCP bag is in safety database, then judge that the destination address of TCP bag, as secure address, i.e. can carry out follow-up forwarding networking operation.Further, if the testing result of TCP bag is dangerous address, then performs to intercept operation, be specially the warning page redirecting to data access request preset.And, in the present embodiment, only need data access request bag to be assembled into TCP bag and carry out safety detection, UDP bag is assembled into for data access request bag and the most directly carries out forwarding operation.
Further, as it is shown in figure 9, in one embodiment, blocking module 500 includes orientation module 510.Wherein, orientation module 510 for redirecting to the warning page preset by data access request.
Above-mentioned network security monitoring device, the IP address capture IP bag reserved by terminal local by trapping module 100, IP bag is assembled according to the information in IP bag by assembling module 200 again, generate data access request bag, then by detection module 300, data access request bag is carried out safety detection, if the testing result eventually through forwarding module 400 data access request bag is safety, then forward data access request bag;If the testing result of blocking module 500 data access request bag is dangerous, then perform to intercept operation.The present embodiment instead of tradition by the network security monitoring method introducing tunneling technique and utilizes server to carry out the process of network security monitoring, it may not be necessary to additionally set up server, and the speed of equipment access network is more quick.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, can be by computer program and complete to instruct relevant hardware, described program can be stored in a computer read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory Or random store-memory body (Random Access Memory, RAM) etc. ROM).
Each technical characteristic of embodiment described above can combine arbitrarily, for making description succinct, the all possible combination of each technical characteristic in above-described embodiment is not all described, but, as long as the combination of these technical characteristics does not exist contradiction, all it is considered to be the scope that this specification is recorded.
Embodiment described above only have expressed the several embodiments of the present invention, and it describes more concrete and detailed, but therefore can not be interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that, for the person of ordinary skill of the art, without departing from the inventive concept of the premise, it is also possible to make some deformation and improvement, these broadly fall into protection scope of the present invention.Therefore, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (10)

1. a network security monitoring method, it is characterised in that comprise the following steps:
By the IP address capture IP bag that terminal local is reserved;
According to the information in described IP bag, described IP bag is assembled, generate data access request bag;
Described data access request bag is carried out safety detection, if the testing result of described data access request bag is safety, then forwards described data access request bag;
If the testing result of described data access request bag is dangerous, then perform to intercept operation.
Method the most according to claim 1, it is characterized in that, the step of the described IP address capture IP bag reserved by terminal local, including: by tunneling technique, the data stream of the IP bag of local network is forcibly fed in the IP address that described terminal local is reserved, from the IP address that described terminal local is reserved, obtains IP bag.
Method the most according to claim 1, it is characterized in that, described according to the information in IP bag, IP bag is assembled, generate the step of data access request bag, including: according to the header message in described IP bag, described IP bag is assembled, generate TCP bag or UDP bag;
The described step that data access request bag is carried out safety detection, including: described TCP bag is carried out safety detection, described UDP bag is forwarded.
Method the most according to claim 1, it is characterised in that the described step that data access request bag is carried out safety detection, including:
Obtain the destination address of described data access request bag, be sent in safety database carry out safety detection by described destination address.
Method the most according to claim 1, it is characterised in that described execution intercepts the step of operation, including: data access request is redirected to the warning page preset.
6. a network security monitoring device, it is characterised in that including:
Trapping module, for the IP address capture IP bag reserved by terminal local;
Assemble module, for described IP bag being assembled according to the information in described IP bag, generate data access request bag;
Detection module, for carrying out safety detection to described data access request bag;
Forwarding module, if the testing result for described data access request bag is safety, then forwards described data access request bag;
Blocking module, if the testing result for described data access request bag is dangerous, then performs to intercept operation.
Device the most according to claim 6, it is characterized in that, described trapping module includes: sending module, for being forcibly fed in the IP address that described terminal local is reserved by the data stream of the IP bag of local network by tunneling technique, obtains IP bag from the IP address that described terminal local is reserved.
Device the most according to claim 6, it is characterised in that described assembling module includes:
Generation module, for assembling described IP bag according to the header message in described IP bag, generates TCP bag or UDP bag;
Described detection module includes: TCP bag detection module and UDP packet forward module;
Described TCP bag detection module, for carrying out safe inspection to described TCP bag;
Described UDP packet forward module, for forwarding described UDP bag.
Device the most according to claim 6, it is characterised in that described detection module includes: destination address detection module, for obtaining the destination address of described data access request bag, sends described destination address and carries out safety detection to safety database.
Device the most according to claim 6, it is characterised in that described blocking module includes: orientation module, for redirecting to the warning page preset by data access request.
CN201610371409.3A 2016-05-30 2016-05-30 Network security monitoring method and network security monitoring device Pending CN105978885A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610371409.3A CN105978885A (en) 2016-05-30 2016-05-30 Network security monitoring method and network security monitoring device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610371409.3A CN105978885A (en) 2016-05-30 2016-05-30 Network security monitoring method and network security monitoring device

Publications (1)

Publication Number Publication Date
CN105978885A true CN105978885A (en) 2016-09-28

Family

ID=57009892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610371409.3A Pending CN105978885A (en) 2016-05-30 2016-05-30 Network security monitoring method and network security monitoring device

Country Status (1)

Country Link
CN (1) CN105978885A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245858A (en) * 2020-01-19 2020-06-05 世纪龙信息网络有限责任公司 Network flow interception method, system, device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114932A (en) * 2006-07-27 2008-01-30 华为数字技术有限公司 Method and system for implementing remote capturing packet
CN102035847A (en) * 2010-12-14 2011-04-27 成都市华为赛门铁克科技有限公司 User access behavior processing method and system and client
CN107306264A (en) * 2016-04-25 2017-10-31 腾讯科技(深圳)有限公司 Network security monitoring method and apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114932A (en) * 2006-07-27 2008-01-30 华为数字技术有限公司 Method and system for implementing remote capturing packet
CN102035847A (en) * 2010-12-14 2011-04-27 成都市华为赛门铁克科技有限公司 User access behavior processing method and system and client
CN107306264A (en) * 2016-04-25 2017-10-31 腾讯科技(深圳)有限公司 Network security monitoring method and apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245858A (en) * 2020-01-19 2020-06-05 世纪龙信息网络有限责任公司 Network flow interception method, system, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US9954873B2 (en) Mobile device-based intrusion prevention system
CN105430011B (en) A kind of method and apparatus detecting distributed denial of service attack
CN106936791B (en) Method and device for intercepting malicious website access
CN106063229B (en) Method and system for forwarding data
CN102904959B (en) Network accelerating method and gateway
KR101272670B1 (en) Apparatus, method and computer readable recording medium of distinguishing access network of a user terminal
CN110519265B (en) Method and device for defending attack
CN105635073B (en) Access control method and device and network access equipment
EP3338396A1 (en) Device and method for establishing connection in load-balancing system
US20220263823A1 (en) Packet Processing Method and Apparatus, Device, and Computer-Readable Storage Medium
US10616271B2 (en) System and method for mitigating distributed denial of service attacks
CN103561036A (en) Request intercepting method and device in white-list internet surfing environment
US20110320589A1 (en) Method and device for processing data in a network
CN102739684A (en) Portal authentication method based on virtual IP address, and server thereof
CN104518968B (en) The method and Transparent proxy server of a kind of Message processing
CN108173810B (en) Method and device for transmitting network data
WO2016008212A1 (en) Terminal as well as method for detecting security of terminal data interaction, and storage medium
US10721250B2 (en) Automatic tunnels routing loop attack defense
CN108737413B (en) Data processing method and device of transmission layer and computer readable storage medium
CN110022319A (en) Attack security isolation method, device, computer equipment and the storage equipment of data
CN109495362A (en) A kind of access authentication method and device
CN105978885A (en) Network security monitoring method and network security monitoring device
TW201312369A (en) Method for filetring web page content and network equipment
CN107306264B (en) Network security monitoring method and apparatus
CN103139205B (en) Message processing method, device and the webserver

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160928