CN106411944A - Network access management method and apparatus - Google Patents

Network access management method and apparatus Download PDF

Info

Publication number
CN106411944A
CN106411944A CN201611055650.1A CN201611055650A CN106411944A CN 106411944 A CN106411944 A CN 106411944A CN 201611055650 A CN201611055650 A CN 201611055650A CN 106411944 A CN106411944 A CN 106411944A
Authority
CN
China
Prior art keywords
network access
data
critical field
described network
data flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611055650.1A
Other languages
Chinese (zh)
Other versions
CN106411944B (en
Inventor
潘云登
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruijie Networks Co Ltd
Original Assignee
Ruijie Networks Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruijie Networks Co Ltd filed Critical Ruijie Networks Co Ltd
Priority to CN201611055650.1A priority Critical patent/CN106411944B/en
Publication of CN106411944A publication Critical patent/CN106411944A/en
Application granted granted Critical
Publication of CN106411944B publication Critical patent/CN106411944B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management

Abstract

According to the embodiments of the invention, a network access management method and apparatus are provided, which belong to the communication field and solve the problem that the key field corresponding to the type of the network access can not be obtained based on the data accessed by the network when there are multiple types of network accesses available in the prior art. The method comprises the following steps: obtaining the data of network access; determining the data stream rule corresponding to the network access based on the data of network assess; and according to the data stream rule, screening an analytic function; based on the screened analytic function, obtaining the key field of the data of the network access wherein the key field is used for the management of the network access. The invention is applied for the management of network access.

Description

A kind of management method of network access and device
Technical field
The present invention relates to the communications field, more particularly, to a kind of management method of network access and device.
Background technology
In recent years, developing rapidly with Internet technology and mobile communication technology, network application gradually becomes richer Richness, the thing followed, the mode that user carries out network access also there occurs great variety, is only capable of by webpage from the user of early stage Browse access network, user can be soft by including web search, mail transmission/reception, forum's access, instant messaging by now for development A series of modes such as part communication, network storage conduct interviews to network.Although abundant network application can provide the user more Abundant Web content simultaneously makes customer access network more convenient, but also brings a series of problem simultaneously, for example, work as user When arbitrarily carrying out network access using network application under the scene prohibitting the use of subnetwork application, it is likely to result in partial information Leak or cause communication link blocking so that network access efficiency is reduced.Therefore, Virtual network operator and network manager need basis The demand of itself is managed to the network access of user.
Under normal circumstances network access is managed, can be when getting the data of network access, according in advance The content of the extracting data needs from this network access for the management method setting simultaneously is parsed to obtain critical field, so that In being managed to this network access according to critical field.Wherein, extract the content needing and this content parsed Process typically and network access type strong correlation, if the type of network access occurs to change or there are multiple types simultaneously Network access, then above-mentioned management method set in advance cannot be gone forward side by side from the corresponding content of the extracting data of network access Row is corresponding to be parsed.Although new management method, the mistake being reset can be reset when the problems referred to above occur Journey often takes more, and when also cannot exist concurrently with the network access of multiple types, is obtained according to the data of network access Taking critical field corresponding with the type of network access, thus reducing the efficiency of management network access, and compromising user's body Test.
Content of the invention
The application provides a kind of management method of network access and device, and the network that can exist concurrently with multiple types is visited When asking, the critical field corresponding with the type of network access of the data acquisition according to network access.
For reaching above-mentioned purpose, the application adopts the following technical scheme that:
In a first aspect, The embodiment provides a kind of management method of network access, including:Obtain network access Data, and determine that data flow corresponding with network access is regular according to the data of network access;According to data flow Rules Filtering Analytical function, and the critical field in the data of network access is obtained according to the analytical function filtering out, critical field is used for managing Reason network access.
Second aspect, The embodiment provides a kind of managing device of network access, including:Acquisition module, quilt It is configured to obtain the data of network access;Processing module, is configured to the data according to network access and determines and network access pair The data flow rule answered;Processing module is additionally configured to, according to data flow Rules Filtering analytical function, and according to the solution filtering out Analysis function obtains the critical field in the data of network access, and critical field is used for managing network access.
The embodiment provides a kind of management method of network access and device, by determining and network access pair The data flow rule answered, and according to this data flow Rules Filtering analytical function, network is obtained according to the analytical function filtering out and visits Critical field in the data asked, because this data flow rule can screen analytical function, and screened analytical function can To include the analytical function of correspondence multiple data flow rule, even if therefore there is the network access of multiple types, the present invention simultaneously The data acquisition that the management method of the network access providing still is able to according to network access is corresponding with the type of this network access Critical field, such that it is able to manage this network access according to this critical field, therefore improves the efficiency of management network access, and Improve Consumer's Experience.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, embodiment will be described below In required use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only the present invention some Embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, can also be attached according to these Figure obtains other accompanying drawings.
A kind of indicative flowchart of the management method of network access that Fig. 1 is provided by embodiments of the invention;
A kind of indicative flowchart of the management method of network access that Fig. 2 is provided by another embodiment of the present invention;
A kind of schematic diagram of the managing device of network access that Fig. 3 is provided by embodiments of the invention;
A kind of schematic diagram of the managing device of network access that Fig. 4 is provided by another embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of not making creative work Embodiment, broadly falls into the scope of protection of the invention.
For the ease of clearly describing the technical scheme of the embodiment of the present invention, in an embodiment of the present invention, employ " the One ", the printed words such as " second " identical entry essentially identical to function and effect or similar item make a distinction, and those skilled in the art can To understand that the printed words such as " first ", " second " are not that quantity and execution order are being defined.
In recent years, developing rapidly with Internet technology and mobile communication technology, network application gradually becomes richer Richness, this makes the way of act of people's online also there occurs great variety, is only capable of accessing by web page browsing from the user of early stage Network, user can be by including web search, mail transmission/reception, forum's access, MSN communication, net by now for development A series of modes such as network storage conduct interviews to network.And the arrival with the mobile Internet epoch, these application type and The behavior that quantity and the network user show on the internet more tends to variation.This trend is enriching in network While appearance, also bring many drawbacks, such as enterprise's confidential information leaks, staffing effectiveness reduces etc..Therefore, network operation Business and network provider have become as more and more urgent demand to the management of the network access that user is carried out.This demand meaning Taste the network access not only needing identifying user, is controlled with greater need for the illegal act in network access.
Network access management techniques in fast development process in recent years, the number of the network access that can identify and control According to day by day enriching.Wherein pass through identification and record Internet source purpose procotol (English full name:Internet Protocol, English abbreviation:IP) information, transport layer protocol, source destination interface information etc., can accomplish have record can look into afterwards, in combination with IP address of internal network can divide or Verification System in organizational structure distinguish different user types, and can be according to transport layer Source destination interface information is simple to distinguish different application types, such as HTML (Hypertext Markup Language) (English full name:HyperText Transfer Protocol, English abbreviation:HTTP), Simple Mail Transfer protocol (English full name:Simple Mail Transfer Protocol, English abbreviation:SMTP), file transfer protocol (FTP) (English full name:File Transfer Protocol, English abbreviation:FTP) etc., thus customizing different internet behavior strategies.
URL (English full name:Uniform Resource Locator, English abbreviation:URL it is) a kind of Position to the resource obtaining on the Internet and a kind of succinct expression of access method, are the ground of standard resource on the Internet Location.Each file on the Internet has a unique URL, and the information that it comprises points out that the position of file and browser should How this processes it.Basic URL comprises pattern (or claiming agreement), server name (or IP address), path and filename, such as " agreement:// mandate/path?Inquiry ".URL classification is to distinguish different application types according to mandate/path field, such as new The illegal type such as news, forum, mailbox, bank or pornographic, gambling.Deep packet detects (English full name:Deep Packet Inspection, English abbreviation:DPI) technology is a kind of new detection technique for relatively common packet check, that is, to network Layer 7, namely the content (payload) of application layer carries out depth analysis, thus identifying its application according to the payload characteristic of application layer Type or content.If traditional port type identification is only that to be gone out according to 80 port identification of transport layer Transmission Control Protocol be http protocol Web page browsing is applied, and DPI technology then can be according to the feature string in http protocol load, and such as mail.163.com (knows Wei webpage mailbox), identify concrete application type.With the development of URL classification and DPI technology, the generic web page of user is clear The behavior of looking at can further be segmented, and identifies news category, scientific and technological class, social class, mailbox class and various illegal classification, non-net Page class application, the such as behavior such as game, office, download, video also can be identified further, by the subdivision of application layer message, on Net behavior management equipment can be directed to user different behavior custom strategies, thus audit and control Internet user legal and non- Judicial act.Further, for same application type, the different behaviors of user and content of the act requirement can be by thin further Point, such as social microblogging class application, thus distinguish browse, post, replying, the different behaviors such as adnexa uploads, such as mailbox class should With identifying sender, addressee, mail header, text, adnexa etc., different contents of the act can mate specific spy Levy storehouse keyword, then define corresponding clearance or blocking strategy.
Although network log-in management technology develops into today, have been able to be finely controlled very much and manage the online row of user For, but it is as WEB3.0 and the arrival in mobile Internet epoch, network log-in management technology starts to face various new challenges, Various applications there occurs that (for example same application has been likely to occur PC end, Android mobile edition, IOS shifting for earth-shaking change The multi-forms such as dynamic version), application protocol, data form also occur in that large-scale renewal and change (for example traditional WEB mailbox Attachment version is progressively changed into the attachment version of Dropbox class), the quantity of application develops rapidly, and the requirement of people improves constantly (example As user wishes not only to can recognize that the IP address of a certain behavior, and want to know user account number, the ID of this behavior Deng virtual identity information).In the face of this situation, because the management method that existing network accesses is getting the data of network access When according to presetting the field needing from the extracting data of this network access and protocol analysis can be carried out, in order to according to solution Field after analysis is managed to this network access, wherein extracts the field of needs and the process that field is carried out with protocol analysis Typically and network access type strong correlation, if the type of network access changes, then the pipe of above-mentioned network access Reason method cannot according to the corresponding field information of the extracting data of the network access presetting after type changes simultaneously Parsed accordingly.Although can again enter to the field extracted and for the agreement of parsing when the problems referred to above occur Row sets, but the process being reset often takes more, reduces the efficiency of management network access, and compromises user Experience.
For the problems referred to above, The embodiment provides a kind of management method of network access, can be according to network The data accessing determines that data flow corresponding with network access is regular, and according to this data flow Rule Extraction and parses and extracted Critical field in the data of network access is such that it is able to extracting and parsing the key in the data of different types of network access Field, in order to manage different types of network access according to this critical field, improves the efficiency of management network access and changes It has been apt to Consumer's Experience.
As shown in Figure 1, The embodiment provides a kind of management method of network access is it is characterised in that wrap Include:
101st, obtain the data of network access.
Specifically, when the data of described network access can carry out network access for user using application, this application and net The data of interaction between network.Exemplary, when user is by Sina weibo application issuing microblog, Sina weibo is applied to corresponding The data that server end is transmitted is considered the data of network access.
102nd, the data according to network access determines data flow rule corresponding with network access.
Wherein data flow rule is for indicating the critical field in the data of network access and being used for parsing critical field Analysis protocol.
Specifically, the data according to network access determines data flow rule corresponding with network access, can be according to net The data that network accesses determines the type of the corresponding application of this network access, carries out network access by the data of this network access Application type, and determine data flow corresponding with the type rule.
Critical field in the data of network access can be field specific in the data of network access, data flow rule This critical field can be indicated by indicating field information, data type (integer, character type) or the length of this specific fields. The analysis protocol of parsing critical field can be the agreement that this critical field can resolve to specified format.
Exemplary, when the network access that network access is carried out by the application of mailbox type, data flow rule is permissible Determine specific fields such as sender's field, recipients fields, title in the data of network access by retrieving designated character Field, additional fields etc., simultaneously data flow rule can also respectively specify that specific fields data type (integer, character type) or Length is in order to determine specific fields further in the data of network access.
Further, the specific fields indicated by data flow rule can include three classes, and each of which class specific fields need Being capable of specified data type (integer, character type) and length.In order to ensure the succinct of description information, can be specific using instruction The mode of the length prefix of the type of field and specific fields, the length of specific fields generally can pre-set it is not necessary to Display description.
Exemplary, specific fields can include key application field, message relevant information fields and common variabless word Section, wherein, key application field is to need to carry out auditing to be stored in data base or carry out the application message of policy control that becomes more meticulous, Title that such as forum posts, text etc., exemplary, key application field can be:$str_title、$str_ content.Message relevant information fields can for Link Layer MAC address information, network layer IP address information, transport layer protocol, Port information, application layer load, length etc., message relevant information fields can be considered constant, does not typically make an amendment.Exemplary, Message relevant information fields can be:@str_smac、@int_sip、@int_proto、@int_sport、@str_ payload、@int_payloadlen.Common variabless field can be integer variable, string variable, common variabless field one As uses as information temporary in critical field extraction process, preservation ephemeral data or result of calculation, also can as conditional judgment, The temporary variable of loop control.Exemplary, common variabless field can be int0, int1, str0, str1.
It should be noted that the length of the specific fields indicated by data flow rule can be corresponding according to data flow rule The decision of network access type, the length of such as message relevant information fields is usually fixed, the length energy of common variabless field Enough it is preset.Embodiments of the invention are not specifically limited to the type of organization of data flow rule, data flow rule Type of organization can include key-value pair, extensible markup language (English full name:Extensible Markup Language, English abbreviation:) or JavaScript object representation (English full name XML:JavaScript Object Notation, English Referred to as:JSON) etc.
103rd, the data of network access according to data flow Rules Filtering analytical function, is obtained according to the analytical function filtering out In critical field and critical field is parsed.
Specifically, due to according to data flow rule can obtain for obtain described network access data in keyword Section and the analysis protocol for parsing described critical field, therefore can also according to the analytical function that data flow Rules Filtering goes out It is interpreted as the content indicated by data flow rule, this analytical function is used for corresponding to from the extracting data of corresponding network access Critical field and parse corresponding critical field it is understood that will data flow rule indicated by process logic taken out As defining the analytical function that semantic independent function filters out one by one, this analytical function is used for visiting from corresponding network The corresponding critical field of extracting data asked simultaneously parses corresponding critical field.According to data flow Rules Filtering analytical function, Can be that the analytical function selecting needs is deleted from default multiple analytical functions according to data flow rule, this default multiple solution Analysis function can consider that, including technology function corresponding with multiple data flows rule, the analytical function filtering out can consider and net Network accesses and corresponds to, and the analytical function filtering out from the data that the extracting data of network access needs and can be parsed to obtain Take the critical field after parsing, the analytical function filtering out can also by the data of network access carry out parsing and analytically after The part that the extracting data of network access needs is to obtain the critical field after parsing.
It should be noted that the critical field obtaining after independent parsing can also be conceptualized as by independent parsing letter Number is realized, and the critical field for obtaining after multiple parsings may be considered that patrolling including one or more independent analytical function Collect combination.
Exemplary, the analytical function filtering out extract the needs in the data of network access partly after, can be to institute The part extracted carries out URL and decodes to obtain critical field.
The embodiment provides a kind of management method of network access, by determining number corresponding with network access According to stream rule, and according to this data flow Rules Filtering analytical function, obtain the number of network access according to the analytical function filtering out According in critical field and critical field parsed, because this data flow rule can screen analytical function, and sieved The analytical function of choosing can include the analytical function of correspondence multiple data flow rule, even if therefore there is the net of multiple types simultaneously Network accesses, and the management method of the network access that the present invention provides still is able to the data acquisition according to network access and this network access Type corresponding parsing after critical field such that it is able to this network access is managed according to the critical field after this parsing, because This improves the efficiency of management network access, and improves Consumer's Experience.
Specifically, as shown in Figure 2, The embodiment provides a kind of management method of network access, its feature It is, including:
201st, obtain the data of network access.
Particular content, with reference to step 101 in above-described embodiment, will not be described here.
202nd, determine the application node of the data of network access, and determined in the data of network access according to application node The message load of the data of network access.
203rd, the message load of the data of network access is mated with feature string to determine and network access pair The data flow rule answered.
Wherein, feature string is corresponding with data flow rule.
Specifically, the data of network access can be identified to determine the type of this network access, and according to this net The type search utility node Hash table that network accesses to determine the application node of the data of network access, and according to this application node The message load of the data of network access is determined in the data of network access.
The message load of the data of network access and feature string are mated corresponding with network access to determine Data flow rule, can be that the application layer payload segment of the data to network access carries out feature string multimode matching, work as net After the regular corresponding feature string of a certain data flow in the Data Matching that network accesses, determine that this network access is advised with this data flow Then correspond to.
Further, after a certain data flow corresponding feature string of rule in the Data Matching of network access, can Carry out the inspection of IP address, transport layer protocol and port with the data to network access, in order to further according to testing result Determine whether to hit this certain data flow rule, feature string can also increase the semanteme of AOI, more complicated to meet Screening conditions.Still hiting data stream is not had to advise if the number of times that the data of network access is mated exceedes matching message quantity Then, then the data of clearance network access.
Exemplary, when the type of network access is Sina weibo it may be determined that the application section of the data of network access Point, and determine the message load of the data of network access in the data of network access according to application node, by network access The corresponding feature string of message loaded matching Sina weibo corresponding data flow rule of data, if hit " POST/aj/ Mblog/add ", then the further information such as matching transmission layer protocol, destination interface, if further matching result meets requiring, Then confirmation hit Sina weibo is posted, and data flow is regular, and other microbloggings browse class data flow and then cannot hit, it is to avoid enter application The advanced treating that critical field is extracted.
204th, according to data flow Rules Filtering analytical function, and obtain the number of network access according to the analytical function filtering out According in critical field and parsed.
Particular content is with reference to step 103 in above-described embodiment.
Further, the analytical function group completing to obtain the critical field after parsing can be collectively referred to as functional-link, work as net When the packet that network accesses contains multiple critical field information, this network access corresponding data flow rule can serve to indicate that multiple Functional-link, wherein each critical field can be all to there being feature string to identify, and feature string mark can be used as function The entrance of chain execution.The data of network access is parsed to obtain critical field according to analytical function corresponding with data flow rule, Can be for calling functional-link corresponding with data flow rule, then the analytical function under traversal execution functional-link, completes keyword Section is extracted and is parsed.In analytical function wherein under functional-link, it is unified that the code of each analytical function is realized, can be with As the member of analytical function data structure, other members can include analytical function parameter knot to be operated to the form of pointer Structure body.The data structure of each analytical function can have index information in the functional-link belonging to it, when functional-link executes, The index information of current analytical function can be preserved, can be sentenced by the current function index realization circulation and condition that change functional-link Break.
It should be noted that can in the data of network access search key section and by with data flow rule corresponding Analytical function critical field is parsed.When determine network access data in do not include critical field and network access Data when being across message transmissions, obtain the data of the described network access arriving again, and described in obtain and arrive again In the data of network access search key section and by with the data flow corresponding analytical function of rule to the keyword finding Duan Jinhang parses.
Specifically, because in actual applications, the data message that critical field may be in multiple network access is carried out Transmission is the data of network access is across message transmissions, and the data message of network access has out of order feelings in the transmission Condition, therefore, it can for the data of the network access receiving to enter row cache, and does not include key in the data determining network access When the data of field and network access is across message transmissions, wait the data of network access arriving again, when obtaining again Arrive the data of network access when, in the data of the network access arriving again search key section and by with data flow The corresponding analytical function of rule parses to the critical field finding.Do not include closing in the data wherein determining network access The data of key field and network access is across message transmissions, can be to start characteristic character in the data search of network access String, and it is defined as critical field by starting the field between feature string and end feature string, when in network access Data search to start feature string but until current data message terminate to find not yet end feature string it is determined that The data of network access is across message transmissions.
Exemplary, when the type of network access is Sina weibo, can be according to data flow corresponding with Sina weibo The data message that the feature string matching network of rule accesses, as hit “ &text=" when, execution data flow rule is right successively Analytical function in the functional-link answered, reads “ &text=" after information be stored in after $ str_content dynamic mapping should Use critical field data structure, occur until terminating feature string mark " & ".If the data message that current network accesses reads terminating Do not find end feature string yet, then across message situation in explanation, and the current function therefore preserving functional-link indexes as reading word The index that symbol vibration is made, and the information such as the length that read of message, functional-link switchs to suspended state.When this network access When next data message arrives, functional-link reverts to running status from suspended state, from the current function index preserving before Start to continue executing with reading character string action, complete extraction and the parsing of critical field.
205th, the critical field after parsing is saved as preset format, preset format is corresponding with network access.
Specifically, the critical field after parsing can save as the data-base recording specified in order to audit further, solution Critical field after analysis can also be used as the input of the strategy control unit that becomes more meticulous.Becoming more meticulous strategy control unit can be according to solution Whether the critical field after analysis comprises invalid information is blocked it is also possible to be hindered in itself according to the critical field after parsing Disconnected, thus behavior management of realizing becoming more meticulous.
The embodiment provides a kind of management method of network access, by determining number corresponding with network access According to stream rule, and according to this data flow Rules Filtering analytical function, obtain the number of network access according to the analytical function filtering out According in critical field and parsed, because this data flow rule can screen analytical function, and screened parsing letter Number can include the analytical function of correspondence multiple data flow rule, even if therefore there is the network access of multiple types simultaneously, this Inventive embodiment still is able to the key after the data acquisition parsing corresponding with the type of this network access according to network access Field, such that it is able to manage this network access according to the critical field after this parsing, therefore improves the effect of management network access Rate, and improve Consumer's Experience.
As shown in Figure 3, The embodiment provides a kind of managing device 301 of network access it is characterised in that Including:
Acquisition module 302, is configured to obtain the data of network access.
Specifically, when the data of described network access can carry out network access for user using application, this application and net The data of interaction between network.Exemplary, when user is by Sina weibo application issuing microblog, Sina weibo is applied to corresponding The data that server end is transmitted is considered the data of network access.
Processing module 303, is configured to the data according to network access and determines data flow rule corresponding with network access.
Wherein data flow rule is for indicating the critical field in the data of network access and being used for parsing critical field Analysis protocol.
Specifically, the data according to network access determines data flow rule corresponding with network access, can be according to net The data that network accesses determines the type of the corresponding application of this network access, carries out network access by the data of this network access Application type, and determine data flow corresponding with the type rule.
Critical field in the data of network access can be field specific in the data of network access, data flow rule This critical field can be indicated by indicating field information, data type (integer, character type) or the length of this specific fields. The analysis protocol of parsing critical field can be the agreement that this critical field can resolve to specified format.
Exemplary, when the network access that network access is carried out by the application of mailbox type, data flow rule is permissible Determine specific fields such as sender's field, recipients fields, title in the data of network access by retrieving designated character Field, additional fields etc., simultaneously data flow rule can also respectively specify that specific fields data type (integer, character type) or Length is in order to determine specific fields further in the data of network access.
Further, the specific fields indicated by data flow rule can include three classes, and each of which class specific fields need Being capable of specified data type (integer, character type) and length.In order to ensure the succinct of description information, can be specific using instruction The mode of the length prefix of the type of field and specific fields, the length of specific fields generally can pre-set it is not necessary to Display description.
Exemplary, specific fields can include key application field, message relevant information fields and common variabless word Section, wherein, key application field is to need to carry out auditing to be stored in data base or carry out the application message of policy control that becomes more meticulous, Title that such as forum posts, text etc., exemplary, key application field can be:$str_title、$str_ content.Message relevant information fields can for Link Layer MAC address information, network layer IP address information, transport layer protocol, Port information, application layer load, length etc., message relevant information fields can be considered constant, does not typically make an amendment.Exemplary, Message relevant information fields can be:@str_smac、@int_sip、@int_proto、@int_sport、@str_ payload、@int_payloadlen.Common variabless field can be integer variable, string variable, common variabless field one As uses as information temporary in critical field extraction process, preservation ephemeral data or result of calculation, also can as conditional judgment, The temporary variable of loop control.Exemplary, common variabless field can be int0, int1, str0, str1.
It should be noted that the length of the specific fields indicated by data flow rule can be corresponding according to data flow rule The decision of network access type, the length of such as message relevant information fields is usually fixed, the length energy of common variabless field Enough it is preset.Embodiments of the invention are not specifically limited to the type of organization of data flow rule, data flow rule Type of organization can include key-value pair, extensible markup language (English full name:Extensible Markup Language, English abbreviation:) or JavaScript object representation (English full name XML:JavaScript Object Notation, English Referred to as:JSON) etc.
Processing module 303 is additionally configured to, according to data flow Rules Filtering analytical function, according to the analytical function filtering out Obtain the critical field in the data of network access and critical field is parsed, the critical field after parsing is used for managing net Network accesses.
Specifically, due to according to data flow rule can obtain for obtain described network access data in keyword Section and the analysis protocol for parsing described critical field, therefore can also according to the analytical function that data flow Rules Filtering goes out It is interpreted as the content indicated by data flow rule, this analytical function is used for corresponding to from the extracting data of corresponding network access Critical field and parse corresponding critical field it is understood that will data flow rule indicated by process logic taken out As defining the analytical function that semantic independent function filters out one by one, this analytical function is used for visiting from corresponding network The corresponding critical field of extracting data asked simultaneously parses corresponding critical field.According to data flow Rules Filtering analytical function, Can be that the analytical function selecting needs is deleted from default multiple analytical functions according to data flow rule, this default multiple solution Analysis function can consider that, including technology function corresponding with multiple data flows rule, the analytical function filtering out can consider and net Network accesses and corresponds to, and the analytical function filtering out from the data that the extracting data of network access needs and can be parsed to obtain Take the critical field after parsing, the analytical function filtering out can also by the data of network access carry out parsing and analytically after The part that the extracting data of network access needs is to obtain the critical field after parsing.
It should be noted that the critical field obtaining after independent parsing can also be conceptualized as by independent parsing letter Number is realized, and the critical field for obtaining after multiple parsings may be considered that patrolling including one or more independent analytical function Collect combination.
Exemplary, the analytical function filtering out extract the needs in the data of network access partly after, can be to institute The part extracted carries out URL and decodes to obtain critical field.
The embodiment provides a kind of managing device of network access, by determining number corresponding with network access According to stream rule, according to this data flow Rules Filtering analytical function, obtain the data of network access according to the analytical function filtering out In critical field and critical field is parsed, because this data flow rule can screen analytical function and screened Analytical function can include the analytical function of correspondence multiple data flows rule, even if therefore there is the network of multiple types simultaneously Access, the managing device of the network access that the present invention provides still is able to the data acquisition according to network access and this network access Critical field after the corresponding parsing of type is such that it is able to manage this network access according to the critical field after this parsing, therefore Improve the efficiency of management network access, and improve Consumer's Experience.
Specifically, processing module 303 is specifically configured to:
Determine the application node of the data of network access, and network is determined in the data of network access according to application node The message load of the data accessing, the message load of the data of network access is mated with feature string with determination and net Network accesses corresponding data flow rule, and feature string is corresponding with data flow rule.
Specifically, the data of network access can be identified to determine the type of this network access, and according to this net The type search utility node Hash table that network accesses to determine the application node of the data of network access, and according to this application node The message load of the data of network access is determined in the data of network access.
The message load of the data of network access and feature string are mated corresponding with network access to determine Data flow rule, can be that the application layer payload segment of the data to network access carries out feature string multimode matching, work as net After the regular corresponding feature string of a certain data flow in the Data Matching that network accesses, determine that this network access is advised with this data flow Then correspond to.
Further, after a certain data flow corresponding feature string of rule in the Data Matching of network access, can Carry out the inspection of IP address, transport layer protocol and port with the data to network access, in order to further according to testing result Determine whether to hit this certain data flow rule, feature string can also increase the semanteme of AOI, more complicated to meet Screening conditions.Still hiting data stream is not had to advise if the number of times that the data of network access is mated exceedes matching message quantity Then, then the data of clearance network access.
Exemplary, when the type of network access is Sina weibo it may be determined that the application section of the data of network access Point, and determine the message load of the data of network access in the data of network access according to application node, by network access The corresponding feature string of message loaded matching Sina weibo corresponding data flow rule of data, if hit " POST/aj/ Mblog/add ", then the further information such as matching transmission layer protocol, destination interface, if further matching result meets requiring, Then confirmation hit Sina weibo is posted, and data flow is regular, and other microbloggings browse class data flow and then cannot hit, it is to avoid enter application The advanced treating that critical field is extracted.
Specifically, processing module 303 is specifically configured to:
In the data of network access search key section and by with the data flow corresponding analytical function of rule to lookup To critical field parsed;
Do not include critical field when determining in the data of the network access of lookup and the data of network access is across report During literary composition transmission, obtain the data of the network access arriving again, and search crucial in the data of the network access arriving again Field is simultaneously parsed to the critical field finding by analytical function corresponding with data flow rule.
Specifically, because in actual applications, the data message that critical field may be in multiple network access is carried out Transmission is the data of network access is across message transmissions, and the data message of network access has out of order feelings in the transmission Condition, therefore, it can for the data of the network access receiving to enter row cache, and does not include key in the data determining network access When the data of field and network access is across message transmissions, wait the data of network access arriving again, when obtaining again Arrive the data of network access when, in the data of the network access arriving again search key section and by with data flow The corresponding analytical function of rule parses to critical field.Critical field is not included simultaneously in the data wherein determining network access And the data of network access is across message transmissions, can be to start feature string in the data search of network access, and will open Beginning feature string and the field terminating between feature string are defined as critical field, when the data search in network access arrives Start feature string but until current data message terminates to find not yet terminates feature string it is determined that network access Data is across message transmissions.
The analytical function group completing to obtain critical field can be collectively referred to as functional-link, when the packet of network access is containing many During individual critical field information, this network access corresponding data flow rule can serve to indicate that multiple functional-link, wherein each pass Key field can be all to there being feature string to identify, and feature string mark can be used as the entrance of functional-link execution.According to Analytical function corresponding with data flow rule parses the data of network access to obtain the critical field after parsing, can be for calling With the data flow corresponding functional-link of rule, the then analytical function under traversal execution functional-link, complete critical field extract and Parsing.In analytical function wherein under functional-link, the code of each analytical function is realized being unified, can be in the form of pointer As the member of analytical function data structure, other members can include analytical function argument structure body to be operated.Each The data structure of analytical function can have index information in the functional-link belonging to it, when functional-link executes, can preserve and work as The index information of front analytical function, can realize circulation and conditional judgment etc. by changing the current function index of functional-link.
Exemplary, when the type of network access is Sina weibo, can be according to data flow corresponding with Sina weibo The data message that the feature string matching network of rule accesses, as hit “ &text=" when, execution data flow rule is right successively Analytical function in the functional-link answered, reads “ &text=" after information be stored in after $ str_content dynamic mapping should Use critical field data structure, occur until terminating feature string mark " & ".If the data message that current network accesses reads terminating Do not find end feature string yet, then across message situation in explanation, and the current function therefore preserving functional-link indexes as reading word The index that symbol vibration is made, and the information such as the length that read of message, functional-link switchs to suspended state.When this network access When next data message arrives, functional-link reverts to running status from suspended state, from the current function index preserving before Start to continue executing with reading character string action, complete extraction and the parsing of critical field.
Specifically, as shown in Figure 4, the managing device 301 of network access also includes storage module 304;
Described processing module 303 is additionally configured to:
Control storage module 304 that the critical field after parsing is saved as preset format, preset format and network access pair Should.
Specifically, the critical field after parsing can save as the data-base recording specified in order to audit further, solution Critical field after analysis can also be used as the input of the strategy control unit that becomes more meticulous.Becoming more meticulous strategy control unit can be according to solution Whether the critical field after analysis comprises invalid information is blocked it is also possible to be hindered in itself according to the critical field after parsing Disconnected, thus behavior management of realizing becoming more meticulous.
The embodiment provides a kind of managing device of network access, by determining number corresponding with network access According to stream rule, and according to this data flow Rules Filtering analytical function, obtain the number of network access according to the analytical function filtering out According in critical field and parsed, because this data flow rule can screen analytical function, and screened parsing letter Number can include the analytical function of correspondence multiple data flow rule, even if therefore there is the network access of multiple types simultaneously, this Inventive embodiment still is able to the key after the data acquisition parsing corresponding with the type of this network access according to network access Field, such that it is able to manage this network access according to the critical field after this parsing, therefore improves the effect of management network access Rate, and improve Consumer's Experience.
Through the above description of the embodiments, those skilled in the art can be understood that the present invention is permissible Realized with hardware, or firmware is realized, or combinations thereof mode is realizing.When implemented in software, can be by above-mentioned functions It is stored in computer-readable medium or be transmitted as the one or more instructions on computer-readable medium or code.Meter Calculation machine computer-readable recording medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to from a place to another Any medium of individual local transmission computer program.Storage medium can be any usable medium that computer can access.With As a example this but be not limited to:Computer-readable medium can include random access memory (English full name:Random Access Memory, English abbreviation:RAM), read only memory (English full name:Read Only Memory, English abbreviation:ROM), electricity can EPROM (English full name:Electrically Erasable Programmable Read Only Memory, English abbreviation:EEPROM), read-only optical disc (English full name:Compact Disc Read Only Memory, English Referred to as:CD-ROM) or other optical disc storage, magnetic disk storage medium or other magnetic storage apparatus or can be used in carry or Storage have instruction or data structure form desired program code and can be by any other medium of computer access.This Outward.Any connection can be suitable become computer-readable medium.For example, if software be using coaxial cable, optical fiber cable, Twisted-pair feeder, digital subscriber line (English full name:Digital Subscriber Line, English abbreviation:DSL) or such as red The wireless technology of outside line, radio and microwave etc is transmitted from website, server or other remote sources, then coaxial electrical The wireless technology of cable, optical fiber cable, twisted-pair feeder, DSL or such as infrared ray, wireless and microwave etc is included in computer-readable In the definition of medium.
Through the above description of the embodiments, those skilled in the art can be understood that, when with software When mode realizes the present invention, can will be used for executing the instruction of said method or code is stored in computer-readable medium or logical Cross computer-readable medium to be transmitted.Computer-readable medium includes computer-readable storage medium and communication media, wherein communicates Medium includes being easy to transmitting any medium of computer program from a place to another place.Storage medium can be calculated Any usable medium that machine can access.As example but be not limited to:Computer-readable medium can include RAM, ROM, electricity can EPROM (full name:Electrically erasable programmable read-only memory, Referred to as:EEPROM), CD, disk or other magnetic storage apparatus or can be used in carrying or store there is instruction or data The desired program code of version simultaneously can be by any other medium of computer access.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should described be defined by scope of the claims.

Claims (10)

1. a kind of management method of network access is it is characterised in that include:
Obtain the data of network access, and data flow corresponding with described network access is determined according to the data of described network access Rule;
According to described data flow Rules Filtering analytical function, obtain the data of described network access according to the analytical function filtering out In critical field and described critical field is parsed, the critical field after parsing is used for managing described network access.
2. network access according to claim 1 management method it is characterised in that described according to described network access Data determines data flow rule corresponding with described network access, including:
Determine the application node of the data of described network access, and according to described application node in the data of described network access Determine the message load of the data of described network access;
The message load of the data of described network access is mated with feature string to determine and described network access pair The data flow rule answered, described feature string is corresponding with data flow rule.
3. the management method of network access according to claim 2 is it is characterised in that methods described also includes:
Data according to described network access carries out the inspection of IP address, transport layer protocol and port, in order to according to inspection Result determines data flow rule corresponding with described network access again.
4. the management method of network access according to claim 1 is it is characterised in that the parsing letter that filters out of described basis Number obtains the critical field in the data of described network access and described critical field is parsed, including:
In the data of described network access search key section and by with the described data flow corresponding analytical function pair of rule The critical field finding is parsed;
Do not include described critical field and the number of described network access when determining in the data of the described network access of lookup According to for across message transmissions when, obtain the data of described network access arriving again, and in the described described network arriving again In the data accessing search key section and by with the described data flow corresponding analytical function of rule to the keyword finding Duan Jinhang parses.
5. the management method of network access according to claim 1 is it is characterised in that methods described also includes:
Critical field after described parsing is saved as preset format, described preset format is corresponding with described network access.
6. a kind of managing device of network access is it is characterised in that include:
Acquisition module, is configured to obtain the data of network access;
Processing module, is configured to the data according to described network access and determines data flow rule corresponding with described network access Then;
Described processing module is additionally configured to, according to described data flow Rules Filtering analytical function, according to the parsing letter filtering out Number obtains the critical field in the data of described network access and described critical field is parsed, the critical field after parsing For managing described network access.
7. the managing device of network access according to claim 6 is it is characterised in that described processing module is specifically configured For:
Determine the application node of the data of described network access, and according to described application node in the data of described network access Determine the message load of the data of described network access, message load and the feature string of the data of described network access are entered , to determine data flow rule corresponding with described network access, described feature string is corresponding with data flow rule for row coupling.
8. the managing device of network access according to claim 7 is it is characterised in that described processing module is also configured For:
Data according to described network access carries out the inspection of IP address, transport layer protocol and port, in order to according to inspection Result determines data flow rule corresponding with described network access again.
9. the managing device of network access according to claim 6 is it is characterised in that described processing module is specifically configured For:
In the data of described network access search key section and by with the described data flow corresponding analytical function pair of rule The critical field finding is parsed;
Do not include described critical field and the number of described network access when determining in the data of the described network access of lookup According to for across message transmissions when, obtain the data of described network access arriving again, and in the described described network arriving again In the data accessing search key section and by with the described data flow corresponding analytical function of rule to the keyword finding Duan Jinhang parses.
10. the managing device of network access according to claim 6 is it is characterised in that the management of described network access fills Put and also include storage module;
Described processing module is additionally configured to:
Control described storage module that the critical field after described parsing is saved as preset format, described preset format and described net Network accesses and corresponds to.
CN201611055650.1A 2016-11-25 2016-11-25 A kind of management method and device of network access Active CN106411944B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611055650.1A CN106411944B (en) 2016-11-25 2016-11-25 A kind of management method and device of network access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611055650.1A CN106411944B (en) 2016-11-25 2016-11-25 A kind of management method and device of network access

Publications (2)

Publication Number Publication Date
CN106411944A true CN106411944A (en) 2017-02-15
CN106411944B CN106411944B (en) 2019-09-20

Family

ID=58081916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611055650.1A Active CN106411944B (en) 2016-11-25 2016-11-25 A kind of management method and device of network access

Country Status (1)

Country Link
CN (1) CN106411944B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737203A (en) * 2017-04-13 2018-11-02 中国移动通信有限公司研究院 A kind of method and device of set extraction

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316239A (en) * 2008-07-23 2008-12-03 中兴通讯股份有限公司 Method for controlling access and forwarding in virtual special LAN service network
US7916701B1 (en) * 2002-08-27 2011-03-29 Cisco Technology, Inc. Virtual addressing to support wireless access to data networks
CN103118007A (en) * 2013-01-06 2013-05-22 瑞斯康达科技发展股份有限公司 Method and system of acquiring user access behavior
CN103475637A (en) * 2013-04-24 2013-12-25 携程计算机技术(上海)有限公司 Network access control method and system based on IP access behaviors

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7916701B1 (en) * 2002-08-27 2011-03-29 Cisco Technology, Inc. Virtual addressing to support wireless access to data networks
CN101316239A (en) * 2008-07-23 2008-12-03 中兴通讯股份有限公司 Method for controlling access and forwarding in virtual special LAN service network
CN103118007A (en) * 2013-01-06 2013-05-22 瑞斯康达科技发展股份有限公司 Method and system of acquiring user access behavior
CN103475637A (en) * 2013-04-24 2013-12-25 携程计算机技术(上海)有限公司 Network access control method and system based on IP access behaviors

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737203A (en) * 2017-04-13 2018-11-02 中国移动通信有限公司研究院 A kind of method and device of set extraction

Also Published As

Publication number Publication date
CN106411944B (en) 2019-09-20

Similar Documents

Publication Publication Date Title
KR101010302B1 (en) Security management system and method of irc and http botnet
US7975025B1 (en) Smart prefetching of data over a network
US6665634B2 (en) Test system for testing dynamic information returned by a web server
CN107786545A (en) A kind of attack detection method and terminal device
US20100064234A1 (en) System and Method for Browser within a Web Site and Proxy Server
CN108259425A (en) The determining method, apparatus and server of query-attack
US20090015599A1 (en) Draggable mechanism for identifying and communicating the state of an application
CN107251528B (en) Method and apparatus for providing data originating within a service provider network
CN103607385A (en) Method and apparatus for security detection based on browser
CN102946343A (en) Method and system for accessing virtual rooms of audio and video communities
Trevisan et al. AWESoME: Big data for automatic Web service management in SDN
CN102281337A (en) destination address access control method and system
WO2006071324A2 (en) Imroved bitmask access for managing blog content
CN109831429A (en) A kind of Webshell detection method and device
Kim et al. Analyzing traffic by domain name in the data plane
CN108206769A (en) Method, apparatus, equipment and the medium of screen quality alarm
CN107528812A (en) A kind of attack detection method and device
CN108462615A (en) A kind of network user's group technology and device
CN110636038A (en) Account number analysis method, account number analysis device, security gateway and system
CN104462242B (en) Webpage capacity of returns statistical method and device
CN108345793A (en) A kind of extracting method and device of software detection feature
CN106528805A (en) Mobile internet baleful program URL intelligent analyzing and mining method based on users
CN106411819A (en) Method and apparatus for recognizing proxy Internet protocol address
CN104811418B (en) The method and device of viral diagnosis
CN106411944B (en) A kind of management method and device of network access

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant