CN107395619A - A kind of safety communicating method and system - Google Patents

A kind of safety communicating method and system Download PDF

Info

Publication number
CN107395619A
CN107395619A CN201710708227.5A CN201710708227A CN107395619A CN 107395619 A CN107395619 A CN 107395619A CN 201710708227 A CN201710708227 A CN 201710708227A CN 107395619 A CN107395619 A CN 107395619A
Authority
CN
China
Prior art keywords
packet
keyword
application layer
filtering
data content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710708227.5A
Other languages
Chinese (zh)
Other versions
CN107395619B (en
Inventor
杜光东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shenglu IoT Communication Technology Co Ltd
Original Assignee
Shenzhen Shenglu IoT Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shenglu IoT Communication Technology Co Ltd filed Critical Shenzhen Shenglu IoT Communication Technology Co Ltd
Priority to CN201710708227.5A priority Critical patent/CN107395619B/en
Publication of CN107395619A publication Critical patent/CN107395619A/en
Application granted granted Critical
Publication of CN107395619B publication Critical patent/CN107395619B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication

Abstract

The present invention relates to a kind of safety communicating method and system, this method includes:Filtering gateway establishes the encrypted communication channel with convergence unit communication;Filtering gateway received data packet, restore the application layer data content of packet;Filtering gateway is handled application layer data content according to default information filtering rule, filters out the packet that application layer data content does not meet information filtering rule;The packet not filtered is sent to convergence unit by filtering gateway by encrypted communication channel.A kind of safety communicating method provided by the invention and system, it may insure filtering gateway and converge the information transmission security between unit, realize and the packet comprising flame and customizing messages is filtered, the terminal for avoiding user from using receives the packet for including information threat, the information security of user is ensure that, the information effectively taken precautions against in network threatens.

Description

A kind of safety communicating method and system
Technical field
The present invention relates to the communications field, more particularly to a kind of safety communicating method and system.
Background technology
At present, the data volume of internet is in explosive growth, and information security therein also increasingly attracts people's attention, However, various negative reports are flooded with network, mainly including terrorist violence, pornographic, anti-government etc., also to individual Terminal produces the virus infection information threatened and spam etc., is also exactly to steal the information such as leakage Company Confidential using network Threaten, these information are threatened to need badly and handled.
Filtering gateway is as special equipment, for giving significant data forwarding to convergence unit.However, filtering at present Data transfer between gateway and convergence unit does not have safety guarantee, and generally, filtering gateway is used for according to ad hoc rules to message Information or packet etc. are filtered, and the communication process between filtering gateway and convergence unit is simultaneously dangerous, lacks and ensures, can not These information in network are threatened and effectively taken precautions against.
The content of the invention
The technical problems to be solved by the invention are in view of the shortcomings of the prior art, there is provided a kind of safety communicating method and are System.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:
A kind of safety communicating method, comprises the following steps:
Filtering gateway establishes the encrypted communication channel with convergence unit communication;
The filtering gateway received data packet, restore the application layer data content of the packet;
The filtering gateway is handled the application layer data content according to default information filtering rule, is filtered out The application layer data content does not meet the packet of the information filtering rule;
The packet not filtered is sent to the convergence unit by the filtering gateway by the encrypted communication channel.
The beneficial effects of the invention are as follows:A kind of safety communicating method provided by the invention, by filtering gateway and convergence The encrypted communication channel of communication is established between unit, it can be ensured that the information transmission security between filtering gateway and convergence unit, And the application layer content of packet is restored by filtering gateway, the packet is carried out according to default information filtering rule Filtering, realizes and the packet comprising flame and customizing messages is filtered, the terminal for avoiding user from using receives Include the packet of information threat, ensure that the information security of user, can also be set according to the demand of user needs to filter Content, can be filtered according to being customized of demand of client, further improve information security, effectively taken precautions against net Information in network threatens.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, the filtering gateway is established specifically includes with converging the encrypted communication channel of unit communication:
Filtering gateway and convergence unit obtain the IP address of other side respectively, and respectively in the filtering gateway and the convergence Unit sets address filtering rule;
IP address filtering is performed between the filtering gateway and the convergence unit, establishes and leads to for the coded communication of communication Road.
It is using the above-mentioned further beneficial effect of scheme:By address filtering rule filtering gateway and convergence unit it Between establish the communication port of encryption, filtering gateway can be improved and converge the communications security between unit.
The another technical solution that the present invention solves above-mentioned technical problem is as follows:
A kind of safe communication system, including:Filtering gateway and convergence unit, the filtering gateway specifically include:
Communication unit, for establishing and converging the encrypted communication channel of unit communication;
Processing unit, for received data packet, restore the application layer data content of the packet;
Filter element, for being handled according to default information filtering rule the application layer data content, filtering Fall the packet that the application layer data content does not meet the information filtering rule;
The communication unit is additionally operable to the packet not filtered being sent to the remittance by the encrypted communication channel Poly- unit.
The beneficial effects of the invention are as follows:A kind of safe communication system provided by the invention, by filtering gateway and convergence The encrypted communication channel of communication is established between unit, it can be ensured that the information transmission security between filtering gateway and convergence unit, And the application layer content of packet is restored by filtering gateway, the packet is carried out according to default information filtering rule Filtering, realizes and the packet comprising flame and customizing messages is filtered, the terminal for avoiding user from using receives Include the packet of information threat, ensure that the information security of user, can also be set according to the demand of user needs to filter Content, can be filtered according to being customized of demand of client, further improve information security, effectively taken precautions against net Information in network threatens.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, the filtering gateway and the convergence unit are respectively used to obtain the IP address of other side, and exist respectively The filtering gateway and the convergence unit are configured location filtering rule, and between the filtering gateway and the convergence unit IP address filtering is performed, establishes the encrypted communication channel for communication.
It is using the above-mentioned further beneficial effect of scheme:By address filtering rule filtering gateway and convergence unit it Between establish the communication port of encryption, filtering gateway can be improved and converge the communications security between unit.
The advantages of aspect that the present invention adds, will be set forth in part in the description, and will partly become from the following description Obtain substantially, or recognized by present invention practice.
Brief description of the drawings
Fig. 1 is a kind of schematic flow sheet of safety communicating method provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow sheet for safety communicating method that another embodiment of the present invention provides;
Fig. 3 is a kind of schematic flow sheet for safety communicating method that another embodiment of the present invention provides;
Fig. 4 is a kind of schematic flow sheet for safety communicating method that another embodiment of the present invention provides;
Fig. 5 is a kind of schematic flow sheet for safety communicating method that another embodiment of the present invention provides;
Fig. 6 is a kind of schematic flow sheet for safety communicating method that another embodiment of the present invention provides;
Fig. 7 is a kind of structural framing figure for safe communication system that another embodiment of the present invention provides;
Fig. 8 is a kind of network topological diagram for safe communication system that another embodiment of the present invention provides.
Embodiment
The principle and feature of the present invention are described below in conjunction with accompanying drawing, the given examples are served only to explain the present invention, and It is non-to be used to limit the scope of the present invention.
As shown in figure 1, for a kind of schematic flow sheet of safety communicating method provided in an embodiment of the present invention, this method includes Following steps:
S1, filtering gateway establish the encrypted communication channel with convergence unit communication.
For example, make filtering gateway and converge to obtain the IP address of other side between unit respectively, and respectively in filtering gateway and Converge unit and IP address filtering rule is set, make filtering gateway and converge unit before a communication according to the IP address pre-set Filtering rule performs IP address filtering, can thus set up the communication port of an encryption, can lift data and filter The security transmitted between gateway and convergence unit.
In another example symmetrical certification key Ka/Ka' can be based between filtering gateway and convergence unit performs two-way authentication, And encryption mobile communication is established based on symmetric communication key Kc/Kc'.
In another example cryptographic Hash secret signal can be generated by default create-rule between filtering gateway and convergence unit, then Cryptographic Hash secret signal matching is carried out, when the cryptographic Hash secret signal between filtering gateway and convergence unit is identical, it is mobile logical to establish encryption Letter.
S2, filtering gateway received data packet, restore the application layer data content of packet.
For example, here by taking TCP message as an example, reduction process is illustrated.Filtering gateway is first after packet is received Cache file is first write the data packet, then the packet for writing cache file is recombinated, is reduced to TCP connection data, Means are provided for protocol identification.Writing the content of the packet of cache file can include:Source IP address, the mesh of TCP connections The data content of IP address, source port, target port, sequence number, acknowledged sequence number and packet is marked, to the packet after caching The process recombinated can be carried out using the sequence number in TCP header and acknowledged sequence number.
S3, filtering gateway are handled application layer data content according to default information filtering rule, filter out application Layer data content does not meet the packet of information filtering rule.
Default information filtering rule is to be set in advance by user, and is stored in the tables of data of filtering gateway, with Just call.For example, when needing to filter the sudden and violent information of Huang in network, some yellow sudden and violent phrases can be pre-set as inspection Keyword is surveyed, when the yellow sudden and violent phrase pre-set occurs in application layer data content, filters out the data for including detection keyword Bag.In another example when needing to filter the content comprising Company Confidential information, some Company Confidentials letter can be pre-set The keyword of breath, when the keyword comprising Company Confidential information pre-set occurs in application layer data content, filtering is exchanged The packet of the keyword containing detection, can prevent Company Confidential information leakage.
The packet not filtered is sent to convergence unit by S4, filtering gateway by encrypted communication channel.
A kind of safety communicating method that the present embodiment provides, by establishing what is communicated between filtering gateway and convergence unit Encrypted communication channel, it can be ensured that the information transmission security between filtering gateway and convergence unit, and reduced by filtering gateway Go out the application layer content of packet, packet is filtered according to default information filtering rule, realized to comprising bad The packet of information and customizing messages is filtered, and the terminal for avoiding user from using receives the data for including information threat Bag, ensure that the information security of user, and the content for needing to filter can also be set according to the demand of user, can be according to client's Being customized of demand filters, and further improves the security of information, and the information effectively taken precautions against in network threatens.
In another embodiment, as shown in Fig. 2 a kind of stream of the safety communicating method provided for another embodiment of the present invention Journey schematic diagram, this method comprise the following steps:
S1, filtering gateway establish the encrypted communication channel with convergence unit communication.
For example, make filtering gateway and converge to obtain the IP address of other side between unit respectively, and respectively in filtering gateway and Converge unit and IP address filtering rule is set, make filtering gateway and converge unit before a communication according to the IP address pre-set Filtering rule performs IP address filtering, can thus set up the communication port of an encryption, can lift data and filter The security transmitted between gateway and convergence unit.
In another example symmetrical certification key Ka/Ka' can be based between filtering gateway and convergence unit performs two-way authentication, And encryption mobile communication is established based on symmetric communication key Kc/Kc'.
In another example cryptographic Hash secret signal can be generated by default create-rule between filtering gateway and convergence unit, then Cryptographic Hash secret signal matching is carried out, when the cryptographic Hash secret signal between filtering gateway and convergence unit is identical, it is mobile logical to establish encryption Letter.
A kind of step S1 preferred embodiment is given below, specifically includes following steps:
S11, filtering gateway and convergence unit obtain the IP address of other side respectively, and respectively in filtering gateway and convergence unit Address filtering rule is set.
Specifically, filtering gateway obtains the IP address IP1 of the machine from internet, and is sent to money order member;
Filtering gateway obtains the IP address IP2 of convergence unit;
Filtering gateway sets IP address filtering rule, it is allowed to which locally received IP source address is IP2 IP packets;
Converge unit and IP address filtering rule is set, it is allowed to which locally received IP source address is IP1 IP packets.
S12, IP address filtering is performed between filtering gateway and convergence unit, establishes the encrypted communication channel for communication.
S2, filtering gateway received data packet, restore the application layer data content of packet.
For example, here by taking TCP message as an example, reduction process is illustrated.Filtering gateway is first after packet is received Cache file is first write the data packet, then the packet for writing cache file is recombinated, is reduced to TCP connection data, Means are provided for protocol identification.Writing the content of the packet of cache file can include:Source IP address, the mesh of TCP connections The data content of IP address, source port, target port, sequence number, acknowledged sequence number and packet is marked, to the packet after caching The process recombinated can be carried out using the sequence number in TCP header and acknowledged sequence number.
S3, filtering gateway are handled application layer data content according to default information filtering rule, filter out application Layer data content does not meet the packet of information filtering rule.
Default information filtering rule is to be set in advance by user, and is stored in the tables of data of filtering gateway, with Just call.For example, when needing to filter the sudden and violent information of Huang in network, some yellow sudden and violent phrases can be pre-set as inspection Keyword is surveyed, when the yellow sudden and violent phrase pre-set occurs in application layer data content, filters out the data for including detection keyword Bag.In another example when needing to filter the content comprising Company Confidential information, some Company Confidentials letter can be pre-set The keyword of breath, when the keyword comprising Company Confidential information pre-set occurs in application layer data content, filtering is exchanged The packet of the keyword containing detection, can prevent Company Confidential information leakage.
The packet not filtered is sent to convergence unit by S4, filtering gateway by encrypted communication channel.
A kind of safety communicating method that the present embodiment provides, on the basis of a upper embodiment, further passes through screen pack Close and convergence unit obtains the IP address of other side respectively, and address filtering rule is set, both sides is performed IP address filtering, can Safe encrypted communication channel is set up, filtering gateway and convergence unit is only received according to default address filtering rule Mutual data, it can be ensured that the information transmission security between filtering gateway and convergence unit, effectively guard against network attack etc. Behavior, the transmission safety of data is just ensured from the bottom transmitting procedure of data, has been made between filtering gateway and convergence unit Data flowing is more reliable and more stable.
In another embodiment, as shown in figure 3, a kind of stream of the safety communicating method provided for another embodiment of the present invention Journey schematic diagram, this method comprise the following steps:
S1, filtering gateway establish the encrypted communication channel with convergence unit communication.
A kind of step S1 preferred embodiment is given below, specifically includes following steps:
S11, filtering gateway and convergence unit obtain the IP address of other side respectively, and respectively in filtering gateway and convergence unit Address filtering rule is set.
Specifically, filtering gateway obtains the IP address IP1 of the machine from internet, and is sent to money order member;
Filtering gateway obtains the IP address IP2 of convergence unit;
Filtering gateway sets IP address filtering rule, it is allowed to which locally received IP source address is IP2 IP packets;
Converge unit and IP address filtering rule is set, it is allowed to which locally received IP source address is IP1 IP packets.
S12, IP address filtering is performed between filtering gateway and convergence unit, establishes the encrypted communication channel for communication.
S2, filtering gateway received data packet, restore the application layer data content of packet.
For example, here by taking TCP message as an example, reduction process is illustrated.Filtering gateway is first after packet is received Cache file is first write the data packet, then the packet for writing cache file is recombinated, is reduced to TCP connection data, Means are provided for protocol identification.Writing the content of the packet of cache file can include:Source IP address, the mesh of TCP connections The data content of IP address, source port, target port, sequence number, acknowledged sequence number and packet is marked, to the packet after caching The process recombinated can be carried out using the sequence number in TCP header and acknowledged sequence number.
Specifically, step S2 can be refined as following steps:
S21, filtering gateway received data packet, extract packet in target ip address, target port, source IP address, source Port and transport layer protocol number, and the cryptographic Hash of packet is calculated accordingly.
Below by taking a common message as an example, to the step for be described in detail.
Assuming that the heading of the message is:
02:54:cd:d8:f3:22>52:54:d1:f2:8e:38,172.17.0.3.53794>172.17.1.2.22 Ttl63, proto TCP
It can therefrom obtain:
Source IP address and source port:172.17.0.3.53794
Target ip address and target port:172.17.1.2.22
Transport layer protocol number:6
Cryptographic Hash is calculated as 2293368848795334559.
S22, filtering gateway are matched cryptographic Hash with the cryptographic Hash in default tables of data, are breathed out when matching identical During uncommon value, packet is filtered out;When not matching identical cryptographic Hash, the application layer data content of packet is restored.
Filtering gateway has searched whether identical cryptographic Hash after the cryptographic Hash is obtained from default tables of data, when When being fitted on identical cryptographic Hash, illustrate formerly to be sent to target ip address from source IP address and source port 172.17.0.3.53794 , therefore, can be directly by from the source IP address and source and target port 172.17.1.2.22 TCP message is filtered Mouth is sent to the target ip address and the subsequent packet of target port filters out, and can effectively prevent network attack or virus note Enter, improve the filter efficiency of message and the security of data transfer.
And if not matching identical cryptographic Hash in tables of data, then in the application layer data that restores packet Hold, the content in the packet is further detected.
Preferably, when matching identical cryptographic Hash, filter out packet and specifically include:
When matching identical cryptographic Hash, the packet corresponding to the cryptographic Hash received within a certain period of time is obtained Quantity, when the quantity of the packet corresponding to the cryptographic Hash is more than predetermined number threshold value, filter out packet.
It should be noted that certain time here can be set according to actual conditions, for example, 5S is could be arranged to, when Substantial amounts of packet is have received in 5S, and the cryptographic Hash of these packets is identical, and found in tables of data identical Cryptographic Hash, illustrate to be likely to be attack or virus infection etc., directly can fall follow-up Packet Filtering, and Without by reduction application layer content, carrying out matching detection etc. again, the operating pressure of filtering gateway can be mitigated, improving data Forwarding speed.
S3, filtering gateway are handled application layer data content according to default information filtering rule, filter out application Layer data content does not meet the packet of information filtering rule.
Default information filtering rule is to be set in advance by user, and is stored in the tables of data of filtering gateway, with Just call.For example, when needing to filter the sudden and violent information of Huang in network, some yellow sudden and violent phrases can be pre-set as inspection Keyword is surveyed, when the yellow sudden and violent phrase pre-set occurs in application layer data content, filters out the data for including detection keyword Bag.In another example when needing to filter the content comprising Company Confidential information, some Company Confidentials letter can be pre-set The keyword of breath, when the keyword comprising Company Confidential information pre-set occurs in application layer data content, filtering is exchanged The packet of the keyword containing detection, can prevent Company Confidential information leakage.
The packet not filtered is sent to convergence unit by S4, filtering gateway by encrypted communication channel.
A kind of safety communicating method that the present embodiment provides, on the basis of a upper embodiment, filtered by basis Message cryptographic Hash, directly source IP address and source port and target ip address and target port identical subsequent packet are filtered Fall, can effectively prevent network attack or virus injection, improve the filter efficiency of message and the security of data transfer, can be with Mitigate the operating pressure of filtering gateway, improve the forwarding speed of data.
In another embodiment, as shown in figure 4, a kind of stream of the safety communicating method provided for another embodiment of the present invention Journey schematic diagram, this method comprise the following steps:
S1, filtering gateway establish the encrypted communication channel with convergence unit communication.
A kind of step S1 preferred embodiment is given below, specifically includes following steps:
S11, filtering gateway and convergence unit obtain the IP address of other side respectively, and respectively in filtering gateway and convergence unit Address filtering rule is set.
Specifically, filtering gateway obtains the IP address IP1 of the machine from internet, and is sent to money order member;
Filtering gateway obtains the IP address IP2 of convergence unit;
Filtering gateway sets IP address filtering rule, it is allowed to which locally received IP source address is IP2 IP packets;
Converge unit and IP address filtering rule is set, it is allowed to which locally received IP source address is IP1 IP packets.
S12, IP address filtering is performed between filtering gateway and convergence unit, establishes the encrypted communication channel for communication.
S2, filtering gateway received data packet, restore the application layer data content of packet.
Specifically, step S2 can be refined as following steps:
S21, filtering gateway received data packet, extract packet in target ip address, target port, source IP address, source Port and transport layer protocol number, and the cryptographic Hash of packet is calculated accordingly.
S22, filtering gateway are matched cryptographic Hash with the cryptographic Hash in default tables of data, are breathed out when matching identical During uncommon value, packet is filtered out;When not matching identical cryptographic Hash, the application layer data content of packet is restored.
S3, filtering gateway are handled application layer data content according to default information filtering rule, filter out application Layer data content does not meet the packet of information filtering rule.
Default information filtering rule is to be set in advance by user, and is stored in the tables of data of filtering gateway, with Just call.For example, when needing to filter the sudden and violent information of Huang in network, some yellow sudden and violent phrases can be pre-set as inspection Keyword is surveyed, when the yellow sudden and violent phrase pre-set occurs in application layer data content, filters out the data for including detection keyword Bag.In another example when needing to filter the content comprising Company Confidential information, some Company Confidentials letter can be pre-set The keyword of breath, when the keyword comprising Company Confidential information pre-set occurs in application layer data content, filtering is exchanged The packet of the keyword containing detection, can prevent Company Confidential information leakage.
Cryptographic Hash is stored in tables of data by S4, filtering gateway, can provide foundation for the processing of follow-up data bag, when When being fitted on identical cryptographic Hash, directly filter out the message, can further improve data filtering gateway with convergence unit it Between transmission speed.
For example, exemplified by the heading of following message:
02:54:cd:d8:f3:22>52:54:d1:f2:8e:38,172.17.0.3.53794>172.17.1.2.22 Ttl63, proto TCP
It can therefrom obtain:
Source IP address and source port:172.17.0.3.53794
Target ip address and target port:172.17.1.2.22
Transport layer protocol number:6
The cryptographic Hash that the data are calculated accordingly is 2293368848795334559.
S5, filtering gateway are monitored to the matching times of cryptographic Hash in tables of data, when detecting within a preset time interval When exceeding the cryptographic Hash of preset times to the match is successful number, the prompting message of doubtful network attack is sent to default receiving terminal.
It should be noted that the specific suggestion content of prompting message can be set according to the actual requirements, for example, when company is When preventing that Company Confidential from revealing, some related keywords can be set, when once being filtered twice once in a while, may not have Company Confidential is revealed, and when mass data coating filters out in the short time (apparently by matching cryptographic Hash in tables of data Mode filter out), then just very likely someone is to outward leakage Company Confidential for explanation, therefore, can be to default Receiving terminal send the doubtful leakage of Company Confidential prompting message, receiving terminal can be terminal, and such as mobile phone, computer can also It is data processor etc..
The packet not filtered is sent to convergence unit by S6, filtering gateway by encrypted communication channel.
A kind of safety communicating method that the present embodiment provides, on the basis of a upper embodiment, by obtaining by filtering number It is stored according to the cryptographic Hash of bag, and by the cryptographic Hash in tables of data, foundation can be provided for the processing of follow-up data bag, work as matching During to identical cryptographic Hash, the message is directly filtered out, can further improve data between filtering gateway and convergence unit Transmission speed, and the matching times of cryptographic Hash in tables of data are monitored, it is big when being received within the default period When the application layer data content of amount does not meet the packet of information filtering rule, information leakage or information can be judged exactly Attack, to send the prompting message of doubtful network attack to default receiving terminal in time, remind in time at user Reason is taken precautions against, and improves the security of information transfer.
In another embodiment, as shown in figure 5, a kind of stream of the safety communicating method provided for another embodiment of the present invention Journey schematic diagram, this method comprise the following steps:
S1, filtering gateway establish the encrypted communication channel with convergence unit communication.
A kind of step S1 preferred embodiment is given below, specifically includes following steps:
S11, filtering gateway and convergence unit obtain the IP address of other side respectively, and respectively in filtering gateway and convergence unit Address filtering rule is set.
Specifically, filtering gateway obtains the IP address IP1 of the machine from internet, and is sent to money order member;
Filtering gateway obtains the IP address IP2 of convergence unit;
Filtering gateway sets IP address filtering rule, it is allowed to which locally received IP source address is IP2 IP packets;
Converge unit and IP address filtering rule is set, it is allowed to which locally received IP source address is IP1 IP packets.
S12, IP address filtering is performed between filtering gateway and convergence unit, establishes the encrypted communication channel for communication.
S2, filtering gateway received data packet, restore the application layer data content of packet.
Specifically, step S2 can be refined as following steps:
S21, filtering gateway received data packet, extract packet in target ip address, target port, source IP address, source Port and transport layer protocol number, and the cryptographic Hash of packet is calculated accordingly.
S22, filtering gateway are matched cryptographic Hash with the cryptographic Hash in default tables of data, are breathed out when matching identical During uncommon value, packet is filtered out;When not matching identical cryptographic Hash, the application layer data content of packet is restored.
S3, keyword detection is carried out to application layer data content according to information filtering rule, when detecting default key During word, the packet that application layer data content includes default keyword is filtered out.
Keyword is to be set in advance by user, and is stored in the tables of data of filtering gateway, to call.For example, When needing to filter the sudden and violent information of Huang in network, some yellow sudden and violent phrases can be pre-set and be used as detection keyword, when When the yellow sudden and violent phrase pre-set occurs in application layer data content, the packet for including detection keyword is filtered out.In another example when When needing to filter the content comprising Company Confidential information, the keyword of some Company Confidential information can be pre-set, When the keyword comprising Company Confidential information pre-set occurs in application layer data content, filter out comprising detection keyword Packet, Company Confidential information leakage can be prevented.
Cryptographic Hash is stored in tables of data by S4, filtering gateway.
S5, filtering gateway are monitored to the matching times of cryptographic Hash in tables of data, when detecting within a preset time interval When exceeding the cryptographic Hash of preset times to the match is successful number, the prompting message of doubtful network attack is sent to default receiving terminal.
The packet not filtered is sent to convergence unit by S6, filtering gateway by encrypted communication channel.
The present embodiment provide a kind of safety communicating method, on the basis of a upper embodiment, by set keyword come Keyword detection is carried out to the application layer data content after reduction, violation information in data and interior can be identified exactly Hold, accurately directionally data can be filtered, prevent sensitive data from revealing, the propagation of network rubbish information, improve network Security.
In another embodiment, as shown in fig. 6, a kind of stream of the safety communicating method provided for another embodiment of the present invention Journey schematic diagram, this method comprise the following steps:
S1, filtering gateway establish the encrypted communication channel with convergence unit communication.
A kind of step S1 preferred embodiment is given below, specifically includes following steps:
S11, filtering gateway and convergence unit obtain the IP address of other side respectively, and respectively in filtering gateway and convergence unit Address filtering rule is set.
Specifically, filtering gateway obtains the IP address IP1 of the machine from internet, and is sent to money order member;
Filtering gateway obtains the IP address IP2 of convergence unit;
Filtering gateway sets IP address filtering rule, it is allowed to which locally received IP source address is IP2 IP packets;
Converge unit and IP address filtering rule is set, it is allowed to which locally received IP source address is IP1 IP packets.
S12, IP address filtering is performed between filtering gateway and convergence unit, establishes the encrypted communication channel for communication.
S2, filtering gateway received data packet, restore the application layer data content of packet.
Specifically, step S2 can be refined as following steps:
S21, filtering gateway received data packet, extract packet in target ip address, target port, source IP address, source Port and transport layer protocol number, and the cryptographic Hash of packet is calculated accordingly.
S22, filtering gateway are matched cryptographic Hash with the cryptographic Hash in default tables of data, are breathed out when matching identical During uncommon value, packet is filtered out;When not matching identical cryptographic Hash, the application layer data content of packet is restored.
S3, keyword detection is carried out to application layer data content according to information filtering rule, when detecting default key During word, the packet that application layer data content includes default keyword is filtered out.
Keyword is to be set in advance by user, and is stored in the tables of data of filtering gateway, to call.For example, When needing to filter the sudden and violent information of Huang in network, some yellow sudden and violent phrases can be pre-set and be used as detection keyword, when When the yellow sudden and violent phrase pre-set occurs in application layer data content, the packet for including detection keyword is filtered out.In another example when When needing to filter the content comprising Company Confidential information, the keyword of some Company Confidential information can be pre-set, When the keyword comprising Company Confidential information pre-set occurs in application layer data content, filter out comprising detection keyword Packet, Company Confidential information leakage can be prevented.
Specifically, step S3 can be refined as following steps:
S31, when detecting default keyword, record keyword.
For example, the whole keywords detected can be stored in default file, for the ease of subsequent step Analysis, can store the sentence where keyword in the lump after keyword is detected.
For example, keyword is arranged to " violence ", then after being reduced to the application layer data of certain packet, detection Obtain including default keyword at following two:
... ... ... insurgent violence ... ... .. is carried out to x cities by original plan
... ... ... around a kind of violent strength ... ... .. around his body
Then it is conceivable that " violence " in first sentence might mean that the insurgent violence meter of terrorist Draw, be the information for needing to filter out, and " violence " in second sentence is the erroneous judgement to " violent strength ", may belong to swordsman A part for novel, belong to the information that filtered, therefore, the keyword that will can be detected, extract the sentence where it Son, obtain following two records:
Record 1:Insurgent violence is carried out to x cities by original plan.
Record 2:Around a kind of violent strength around his body.
Record 1 and record 2 are stored in default file, so as to subsequent calls.
S32, after application layer data content all detection, according to default semantic analysis algorithm, to the complete of record Portion's keyword is screened, and when there is judging by accident keyword, erroneous judgement keyword is removed from whole keywords of record, and will sieve It is left keyword after choosing as keyword to be filtered.
Specifically, according to semantic analysis algorithm successively to handle whole keywords, before extracting each keyword One close to the first character;
Judge whether the first character can synthesize new phrase with crucial phrase, when result is to be, after extraction keyword One close to the second character;
Judge whether keyword can be with the second character combination Cheng Xin phrase, and when result is to be, then keyword is erroneous judgement Keyword.All records are analyzed successively, default semantic analysis algorithm specific implementation is:Keyword is extracted first Previous character A, judge whether A and keyword can be combined into new phrase, when that can be combined into new phrase, extraction is crucial The latter character B of word, judges whether B and keyword can be combined into new phrase, when that can be combined into new phrase, is somebody's turn to do Keyword is erroneous judgement keyword.
Below by taking above-mentioned record 1 and record 2 as an example, illustrate.
In record 1, the previous character " shape " of extraction keyword " violence ", " shape is sudden and violent " or " shape violence " is not phrase, Therefore, " violence " in record 1 is not erroneous judgement keyword, it should is filtered.
In record 2, the previous character " mad " of extraction keyword " violence ", " violent " is phrase, therefore, then extracts key The latter character " amount " of word " violence ", " strength " and phrase, therefore, it is erroneous judgement phrase to judge " violence " in record 2, Deletion record 2.
" violence " most at last in record 1 is used as keyword to be filtered.
It should be noted that if record 1 and record 2 belong to same packet, then by judging, still there is record Keyword in 1 need to be to be filtered, therefore the packet still can be filtered;If record 1 and record 2 belong to different numbers According to bag, then because record 2 has been deleted, then what is filtered out is exactly to record the packet where 1, the data where record 2 Bag will not be filtered.
S33, when the quantity of keyword to be filtered is more than predetermined number, filter out the packet.
The step for be to improve the serious forgiveness of filtering, and filtering rule is set according to actual use demand.
For example, predetermined number can be set to 0, then assuming that having matched 1 keyword in certain packet, then warp The judgement of the step is crossed, keyword quantity is matched more than 0, then just filters out the packet, that is to say, that work as predetermined number When being set to 0, as long as there is the keyword of non-erroneous judgement, the packet Austria will be filtered.
In another example when including mass data in packet, predetermined number can be arranged to 100, then only work as inspection When the keyword measured is more than 100, the packet can be just filtered out, improves the serious forgiveness of filtering, can effectively prevent from missing Filter.
Cryptographic Hash is stored in tables of data by S4, filtering gateway.
S5, filtering gateway are monitored to the matching times of cryptographic Hash in tables of data, when detecting within a preset time interval When exceeding the cryptographic Hash of preset times to the match is successful number, the prompting message of doubtful network attack is sent to default receiving terminal.
The packet not filtered is sent to convergence unit by S6, filtering gateway by encrypted communication channel.
A kind of safety communicating method that the present embodiment provides, on the basis of a upper embodiment, by being reduced to packet The application layer data gone out carries out keyword detection, can efficiently detect that the violation included in application layer data content is crucial Word, and semantic analysis is carried out to these keywords, previous and the latter character of these keywords is extracted, determines whether to miss The keyword sentenced, it is possible to reduce erroneous judgement problem caused by filtering, filtering can be made more accurate and reliable, and by setting number The processing such as threshold value is measured, the serious forgiveness of filtering can be improved, can effectively prevent from filtering by mistake.
In another embodiment, as shown in fig. 7, a kind of knot of the safe communication system provided for another embodiment of the present invention Structure frame diagram, the system include:Filtering gateway 1 and convergence unit 2, before data is transmitted, filtering gateway 1 and convergence unit 2 Between obtain the IP address of other side respectively, filtering gateway 1 and convergence unit 2 set respective address filtering rule, filtering respectively IP address filtering is performed between gateway 1 and convergence unit 2 respectively, it is established that the encrypted communication channel for communication.
The structure of filtering gateway 1 is further described below, filtering gateway 1 specifically includes:For establishing and converging The communication unit 11 for the encrypted communication channel that unit 2 communicates, for received data packet, is restored in the application layer data of packet The processing unit 12 of appearance, for being handled according to default information filtering rule application layer data content, filter out application Layer data content does not meet the filter element 13 of the packet of information filtering rule, and communication unit 11 is additionally operable to not filtered Packet is sent to convergence unit 2 by encrypted communication channel.
As can be seen that processing unit 12 and filter element 13 play an important role, below to this in from the above Two units are described further.
Preferably, processing unit 12 is specifically used for received data packet, and extracts the target ip address in packet, destination end Mouth, source IP address, source port and transport layer protocol number, and according to the target ip address of packet, target port, source IP address, Source port and transport layer protocol number calculate the cryptographic Hash of packet, and the cryptographic Hash in cryptographic Hash and default tables of data is carried out Matching, when matching identical cryptographic Hash, filters out packet;When not matching identical cryptographic Hash, data are restored The application layer data content of bag.
It should be noted that the cryptographic Hash in tables of data is to be stored in by filter element 13 in tables of data, filter element 13 The cryptographic Hash that processing unit 12 is calculated is obtained, and cryptographic Hash is stored in tables of data, and to cryptographic Hash in tables of data Matching times are monitored, when the number that detects that the match is successful within a preset time interval exceedes the cryptographic Hash of preset times, The prompting message of doubtful network attack is sent to default receiving terminal by communication unit 11.
Preferably, filter element 13 is specifically used for carrying out keyword inspection to application layer data content according to information filtering rule Survey, when detecting default keyword, filter out the packet data that application layer data content does not meet information filtering rule Bag.
When detecting default keyword, keyword is recorded, and after application layer data content all detection, root According to default semantic analysis algorithm, whole keywords are handled successively, extract one before each keyword close to One character, judges whether the first character can synthesize new phrase with crucial phrase, when result is to be, after extraction keyword One close to the second character, judge keyword whether can with the second character combination Cheng Xin phrase, when result for be when, then close Keyword is erroneous judgement keyword, and after whole keywords are disposed, erroneous judgement keyword is removed from whole keywords of record, and Remaining keyword is as keyword to be filtered after screening, and the quantity for working as keyword to be filtered is more than predetermined number When, filter out packet.
A kind of safe communication system that the present embodiment provides, communicated by being established between filtering gateway 1 and convergence unit 2 Encrypted communication channel, it can be ensured that the information transmission security between filtering gateway 1 and convergence unit 2, and pass through filtering gateway 1 Restore the application layer content of packet, packet filtered according to default information filtering rule, realize to comprising The packet of flame and customizing messages is filtered, and the terminal for avoiding user from using receives the number for including information threat According to bag, the information security of user is ensure that, the content for needing to filter can also be set according to the demand of user, can be according to client The filtering of being customized of demand, further improve the security of information, effectively taken precautions against information in network and threatened.
In another embodiment, as shown in figure 8, a kind of net of the safe communication system provided for another embodiment of the present invention Network topological diagram, illustrated with reference to network connection frameworks of the Fig. 8 to the system.
After filtering gateway 1 gets data from network, internally data are filtered, then between convergence unit The communication port of encryption is established, data are transmitted by the passage, ensure the security of data.
In figure by taking a filtering gateway 1 as an example, multiple convergence-level equipment are connected with, these convergence-level equipment can be understood as Unit, such as interchanger 2 are converged, each interchanger 2 carries out data exchange with the station terminal 4 of access layer equipment 3 or more, and this is net A kind of preferred scheme of network framework, can actually there are other networking modes, such as mesh network topologies, star dress network topology Deng.
When the disposal ability deficiency of filtering gateway 1, dilatation, networking can be carried out to filtering gateway 1.
Reader should be understood that in the description of this specification, reference term " one embodiment ", " some embodiments ", " show The description of example ", " specific example " or " some examples " etc. mean to combine the specific features of the embodiment or example description, structure, Material or feature are contained at least one embodiment or example of the present invention.In this manual, above-mentioned term is shown The statement of meaning property need not be directed to identical embodiment or example.Moreover, specific features, structure, material or the feature of description It can be combined in an appropriate manner in any one or more embodiments or example.In addition, in the case of not conflicting, this The technical staff in field can be by the different embodiments or example described in this specification and the spy of different embodiments or example Sign is combined and combined.
It is apparent to those skilled in the art that for convenience of description and succinctly, the dress of foregoing description The specific work process with unit is put, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of unit, is only A kind of division of logic function, can there is an other dividing mode when actually realizing, for example, multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored, or does not perform.
The unit illustrated as separating component can be or may not be physically separate, be shown as unit Part can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple networks On unit.Some or all of unit therein can be selected to realize the mesh of scheme of the embodiment of the present invention according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can To be stored in a computer read/write memory medium.Based on such understanding, technical scheme substantially or Say that the part to be contributed to prior art, or all or part of the technical scheme can be embodied in the form of software product Out, the computer software product is stored in a storage medium, including some instructions are causing a computer equipment (can be personal computer, server, or network equipment etc.) performs all or part of each embodiment method of the present invention Step.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-OnlyMemory), deposit at random Access to memory (RAM, RandomAccessMemory), magnetic disc or CD etc. are various can be with the medium of store program codes.
More than, it is only embodiment of the invention, but protection scope of the present invention is not limited thereto, and it is any to be familiar with Those skilled in the art the invention discloses technical scope in, various equivalent modifications or substitutions can be readily occurred in, These modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be wanted with right The protection domain asked is defined.

Claims (10)

1. a kind of safety communicating method, it is characterised in that comprise the following steps:
Filtering gateway establishes the encrypted communication channel with convergence unit communication;
The filtering gateway received data packet, restore the application layer data content of the packet;
The filtering gateway is handled the application layer data content according to default information filtering rule, is filtered out described Application layer data content does not meet the packet of the information filtering rule;
The packet not filtered is sent to the convergence unit by the filtering gateway by the encrypted communication channel.
2. safety communicating method according to claim 1, it is characterised in that the filtering gateway received data packet, reduction The application layer data content for going out the packet specifically includes:
The filtering gateway received data packet, extract target ip address in the packet, target port, source IP address, source Port and transport layer protocol number, and according to the target ip address, the target port, the source IP address, the source port The cryptographic Hash of the packet is calculated with the transport layer protocol number;
The filtering gateway is matched the cryptographic Hash with the cryptographic Hash in default tables of data, is breathed out when matching identical During uncommon value, the packet is filtered out;When not matching identical cryptographic Hash, the application layer data of the packet is restored Content.
3. safety communicating method according to claim 2, it is characterised in that described to filter out the application layer data content After the packet for not meeting the information filtering rule, in addition to:
The cryptographic Hash is stored in the tables of data by the filtering gateway;
The filtering gateway is monitored to the matching times of cryptographic Hash in the tables of data, when detecting within a preset time interval When exceeding the cryptographic Hash of preset times to the match is successful number, the prompting message of doubtful network attack is sent to default receiving terminal.
4. safety communicating method according to any one of claim 1 to 3, it is characterised in that described according to default interior Hold filtering rule to handle the application layer data content, filter out the application layer data content and do not meet the content The packet of filtering rule specifically includes:
Keyword detection is carried out to the application layer data content according to the information filtering rule, when detecting default key During word, the packet that the application layer data content includes the keyword is filtered out.
5. safety communicating method according to claim 4, it is characterised in that it is described when detecting default keyword, Then filtering out the packet also includes:
When detecting default keyword, the keyword is recorded;
After the application layer data content all detection, according to default semantic analysis algorithm, successively to described in whole Keyword is handled, extract one before each keyword close to the first character;
Judge whether first character can synthesize new phrase with the crucial phrase, when result is to be, extract the pass One after keyword close to the second character;
Judge whether the keyword can be with the phrase of the second character combination Cheng Xin, when result for when being, the then key Word is erroneous judgement keyword;
After all the keyword is disposed, the erroneous judgement keyword is removed from the whole keyword of record, and Keyword will be left as keyword to be filtered after screening;
When the quantity of the keyword to be filtered is more than predetermined number, the packet is filtered out.
A kind of 6. safe communication system, it is characterised in that including:Filtering gateway and convergence unit, the filtering gateway specifically wrap Include:
Communication unit, for establishing and converging the encrypted communication channel of unit communication;
Processing unit, for received data packet, restore the application layer data content of the packet;
Filter element, for being handled according to default information filtering rule the application layer data content, filter out institute State the packet that application layer data content does not meet the information filtering rule;
The communication unit is additionally operable to the packet not filtered being sent to the money order by the encrypted communication channel Member.
7. safe communication system according to claim 6, it is characterised in that the processing unit is specifically used for receiving data Bag, and target ip address, target port, source IP address, source port and transport layer protocol number in the packet are extracted, and root Institute is calculated according to the target ip address, the target port, the source IP address, the source port and the transport layer protocol number The cryptographic Hash of packet is stated, and the cryptographic Hash is matched with the cryptographic Hash in default tables of data, it is identical when matching Cryptographic Hash when, filter out the packet;When not matching identical cryptographic Hash, the application layer of the packet is restored Data content.
8. safe communication system according to claim 7, it is characterised in that the filter element is additionally operable to the Hash Value is stored in the tables of data, and the matching times of cryptographic Hash in the tables of data are monitored, when between preset time When the interior number that detects that the match is successful exceedes the cryptographic Hash of preset times, carrying for doubtful network attack is sent to default receiving terminal Show message.
9. the safe communication system according to any one of claim 6 to 8, it is characterised in that the filter element is specific For carrying out keyword detection to the application layer data content according to the information filtering rule, when detecting default key During word, the packet that the application layer data content includes the keyword is filtered out.
10. safe communication system according to claim 9, it is characterised in that the filter element is specifically used for when detection During to default keyword, the keyword is recorded, and after the application layer data content all detection, according to default Semantic analysis algorithm, all keywords are handled successively, extract one before each keyword close to First character, judges whether first character can synthesize new phrase with the crucial phrase, when result is to be, extracts institute State one after keyword close to the second character, judge whether the keyword can be with the second character combination Cheng Xin's Phrase, when result for when being, then the keyword is erroneous judgement keyword, after all the keyword is disposed, from record The whole keyword in remove the erroneous judgement keyword, and will after screening remaining keyword as key to be filtered Word, and when the quantity of the keyword to be filtered is more than predetermined number, filter out the packet.
CN201710708227.5A 2017-08-17 2017-08-17 Secure communication method and system Active CN107395619B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710708227.5A CN107395619B (en) 2017-08-17 2017-08-17 Secure communication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710708227.5A CN107395619B (en) 2017-08-17 2017-08-17 Secure communication method and system

Publications (2)

Publication Number Publication Date
CN107395619A true CN107395619A (en) 2017-11-24
CN107395619B CN107395619B (en) 2020-03-17

Family

ID=60353662

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710708227.5A Active CN107395619B (en) 2017-08-17 2017-08-17 Secure communication method and system

Country Status (1)

Country Link
CN (1) CN107395619B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111949717A (en) * 2020-08-14 2020-11-17 上海交通大学 Cross-domain information system-oriented real-time on-demand data aggregation method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068229A (en) * 2007-06-08 2007-11-07 北京工业大学 Content filtering gateway realizing method based on network filter
CN101594234A (en) * 2009-07-09 2009-12-02 上海交通大学 Method for controlling Internet encrypted safe communication
CN102208992A (en) * 2010-06-13 2011-10-05 天津海量信息技术有限公司 Internet-facing filtration system of unhealthy information and method thereof
CN106549938A (en) * 2016-10-11 2017-03-29 北京知道未来信息技术有限公司 A kind of distributed network Behavior Manager and access control method
CN106850547A (en) * 2016-12-15 2017-06-13 华北计算技术研究所(中国电子科技集团公司第十五研究所) A kind of data restoration method and system based on http protocol

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068229A (en) * 2007-06-08 2007-11-07 北京工业大学 Content filtering gateway realizing method based on network filter
CN101594234A (en) * 2009-07-09 2009-12-02 上海交通大学 Method for controlling Internet encrypted safe communication
CN102208992A (en) * 2010-06-13 2011-10-05 天津海量信息技术有限公司 Internet-facing filtration system of unhealthy information and method thereof
CN106549938A (en) * 2016-10-11 2017-03-29 北京知道未来信息技术有限公司 A kind of distributed network Behavior Manager and access control method
CN106850547A (en) * 2016-12-15 2017-06-13 华北计算技术研究所(中国电子科技集团公司第十五研究所) A kind of data restoration method and system based on http protocol

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111949717A (en) * 2020-08-14 2020-11-17 上海交通大学 Cross-domain information system-oriented real-time on-demand data aggregation method and system
CN111949717B (en) * 2020-08-14 2024-02-06 上海交通大学 Cross-domain information system-oriented real-time on-demand data aggregation method and system

Also Published As

Publication number Publication date
CN107395619B (en) 2020-03-17

Similar Documents

Publication Publication Date Title
CN105429963B (en) Intrusion detection analysis method based on Modbus/Tcp
CN106464577B (en) Network system, control device, communication device and communication control method
CN104539594B (en) Merge DDoS and threaten filtering and SDN frameworks, system and the method for work of routing optimality
CN102271068B (en) Method for detecting DOS/DDOS (denial of service/distributed denial of service) attack
CN104660582B (en) The network architecture of the software definition of DDoS identifications, protection and path optimization
CN103532957B (en) A kind of long-range shell behavioral values device and method of wooden horse
CN104796405B (en) Rebound connecting detection method and apparatus
CN111817982A (en) Encrypted flow identification method for category imbalance
CN104539595B (en) It is a kind of to integrate the SDN frameworks and method of work for threatening processing and routing optimality
CN105187437B (en) A kind of centralized detecting system of SDN network Denial of Service attack
CN107623661A (en) Block system, the method and device of access request, server
CN104283882B (en) A kind of intelligent safety protection method of router
CN101364981A (en) Hybrid intrusion detection method based on Internet protocol version 6
CN104091122A (en) Detection system of malicious data in mobile internet
CN109120602B (en) IPv6 attack tracing method
CN107623691A (en) A kind of ddos attack detecting system and method based on reverse transmittance nerve network algorithm
CN106357641A (en) Method and device for defending interest flooding attacks in information centric network
CN109818970A (en) A kind of data processing method and device
CN106953855A (en) A kind of method of intrusion detection to IEC61850 digital transformer substation GOOSE messages
CN106657689A (en) Method for preventing and controlling international fraud call and apparatus thereof
CN108200067A (en) Big data information network adaptive security guard system based on trust computing
CN106027497A (en) DDoS (Distributed Denial of Service) tracing and source end filtering method oriented to SDN (Software Defined Networking) and based on OpenFlow-DPM
CN112788064B (en) Encryption network abnormal flow detection method based on knowledge graph
CN110324346A (en) A kind of Internet of Things Information Security Management System and method
ITTO20130513A1 (en) SYSTEM AND METHOD FOR FILTERING ELECTRONIC MESSAGES

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant