CN107800548A - A kind of enterprise network flow total management system - Google Patents
A kind of enterprise network flow total management system Download PDFInfo
- Publication number
- CN107800548A CN107800548A CN201610753912.5A CN201610753912A CN107800548A CN 107800548 A CN107800548 A CN 107800548A CN 201610753912 A CN201610753912 A CN 201610753912A CN 107800548 A CN107800548 A CN 107800548A
- Authority
- CN
- China
- Prior art keywords
- network
- application
- flow
- bandwidth
- management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/70—Admission control; Resource allocation
- H04L47/78—Architectures of resource allocation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Abstract
The invention provides a kind of enterprise network flow total management system, described enterprise network flow total management system is identified by flow, traffic monitoring, Object Management group, assignment of traffic, the comprehensive dialysis and management and control to network traffics are realized for user, a network efficiently, intelligent is made, really assists user to realize the comprehensive management to internet access behavior.
Description
Technical field
The present invention relates to intelligent management field, and in particular to a kind of enterprise network flow total management system.
Background technology
Enterprise network flow total management system is identified by flow, traffic monitoring, Object Management group, assignment of traffic, for
The comprehensive dialysis and management and control to network traffics are realized in family, make a network efficiently, intelligent, really assist user to realize to mutual
The comprehensive management of internet interview behavior.
The content of the invention
The invention provides a kind of enterprise network flow total management system, described enterprise network flow integrated management system
System realizes comprehensive dialysis and the pipe to network traffics for user by flow identification, traffic monitoring, Object Management group, assignment of traffic
Control, a network efficiently, intelligent is made, really assists user to realize the comprehensive management to internet access behavior.Described
Enterprise network flow total management system includes following functional module:
1st, flow analysis
Analysing content mainly includes:Current network flow is how many, occupies network bandwidth ratio is how many;Who is when,
What applied using;The access what state of key application, how is application network quality, connects into power, and data retransmission rate is
How much.User, the history run trend and the development prediction in future of service application.Accurate fast positioning is to abnormal flow master
Machine or abnormal application.
2nd, Bandwidth Management
1)Ensure important persons and the bandwidth of crucial application
To the important persons for needing certain bandwidth and crucial application, such as unit core member, video conference, ERP system, VOIP
Deng certain guarantee bandwidth being distributed, so that it is guaranteed that these important persons are using network and crucial apply trouble-free operation.
2)Limit unrelated application
To those information flows unrelated with working unit property or that massive band width can be consumed, such as entertainment information stream, p2p download,
Suspicious data stream etc. carries out necessary limitation, reduces the occupancy of Internet resources.
3)Fair allocat bandwidth
By formulating based on application, personal, department Internet resources allocation strategy, it is whole can to prevent that personal main frame poisoning from causing
Network paralysis, at the same ensure everyone can equality use network (key personnel and crucial application except).
4)Identification blocks network attack
It can be determined according to concurrently connection number and block the abnormal behaviours such as DOS/DDOS attacks, protect the peace of the network equipment
Entirely.
3rd, network log-in management
1)Auditing the network content
The data convert to common Internet interaction contents is supported, records SMTP, POP3, WebMail e-mail messages, BBS etc.
The instant messaging such as POST form informations, MSN, QQ information, FTP, telnet control command information, its content can be audited
And statistical analysis.
2)User behavior analysis
For tens of kinds of statistical report forms, unit, department, the surfing flow of individual, surf time, website visiting, mail can be received
The network behaviors such as hair, chat message, finance and economics speculation in stocks, online game are analyzed.
Embodiment
The invention provides a kind of enterprise network flow total management system, described enterprise network flow integrated management system
System realizes comprehensive dialysis and the pipe to network traffics for user by flow identification, traffic monitoring, Object Management group, assignment of traffic
Control, a network efficiently, intelligent is made, really assists user to realize the comprehensive management to internet access behavior.Described
Enterprise network flow total management system includes following functional module:
1st, flow analysis
Analysing content mainly includes:Current network flow is how many, occupies network bandwidth ratio is how many;Who is when,
What applied using;The access what state of key application, how is application network quality, connects into power, and data retransmission rate is
How much.User, the history run trend and the development prediction in future of service application.Accurate fast positioning is to abnormal flow master
Machine or abnormal application.
2nd, Bandwidth Management
1)Ensure important persons and the bandwidth of crucial application
To the important persons for needing certain bandwidth and crucial application, such as unit core member, video conference, ERP system, VOIP
Deng certain guarantee bandwidth being distributed, so that it is guaranteed that these important persons are using network and crucial apply trouble-free operation.
2)Limit unrelated application
To those information flows unrelated with working unit property or that massive band width can be consumed, such as entertainment information stream, p2p download,
Suspicious data stream etc. carries out necessary limitation, reduces the occupancy of Internet resources.
3)Fair allocat bandwidth
By formulating based on application, personal, department Internet resources allocation strategy, it is whole can to prevent that personal main frame poisoning from causing
Network paralysis, at the same ensure everyone can equality use network (key personnel and crucial application except).
4)Identification blocks network attack
It can be determined according to concurrently connection number and block the abnormal behaviours such as DOS/DDOS attacks, protect the peace of the network equipment
Entirely.
3rd, network log-in management
1)Auditing the network content
The data convert to common Internet interaction contents is supported, records SMTP, POP3, WebMail e-mail messages, BBS etc.
The instant messaging such as POST form informations, MSN, QQ information, FTP, telnet control command information, its content can be audited
And statistical analysis.
2)User behavior analysis
For tens of kinds of statistical report forms, unit, department, the surfing flow of individual, surf time, website visiting, mail can be received
The network behaviors such as hair, chat message, finance and economics speculation in stocks, online game are analyzed.
Claims (5)
1. a kind of enterprise network flow total management system, described enterprise network flow total management system is known by flow
Not, traffic monitoring, Object Management group, assignment of traffic, the comprehensive dialysis and management and control to network traffics is realized for user, makes a height
The network of effect, intelligence, really user is assisted to realize the comprehensive management to internet access behavior.
2. a kind of enterprise network flow total management system described in claim 1, including following functional module:
Flow analysis functional module:
Analysing content mainly includes:Current network flow is how many, occupies network bandwidth ratio is how many;Who is when,
What applied using;The access what state of key application, how is application network quality, connects into power, and data retransmission rate is
How much;User, the history run trend and the development prediction in future of service application.
3. accurate fast positioning is applied to abnormal flow main frame or exception.
4. bandwidth management capability module:
(1) important persons and the bandwidth of crucial application are ensured
To the important persons for needing certain bandwidth and crucial application, such as unit core member, video conference, ERP system, VOIP
Deng certain guarantee bandwidth being distributed, so that it is guaranteed that these important persons are using network and crucial apply trouble-free operation;
(2) unrelated application is limited
To those information flows unrelated with working unit property or that massive band width can be consumed, such as entertainment information stream, p2p download,
Suspicious data stream etc. carries out necessary limitation, reduces the occupancy of Internet resources;
(3) fair allocat bandwidth
By formulating based on application, personal, department Internet resources allocation strategy, it is whole can to prevent that personal main frame poisoning from causing
Network paralysis, at the same ensure everyone can equality use network (key personnel and crucial application except);
(4) identification blocks network attack
It can be determined according to concurrently connection number and block the abnormal behaviours such as DOS/DDOS attacks, protect the peace of the network equipment
Entirely;
Network log-in management functional module:
Auditing the network content
The data convert to common Internet interaction contents is supported, records SMTP, POP3, WebMail e-mail messages, BBS etc.
The instant messaging such as POST form informations, MSN, QQ information, FTP, telnet control command information, its content can be audited
And statistical analysis.
5.2)User behavior analysis
For tens of kinds of statistical report forms, unit, department, the surfing flow of individual, surf time, website visiting, mail can be received
The network behaviors such as hair, chat message, finance and economics speculation in stocks, online game are analyzed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610753912.5A CN107800548A (en) | 2016-08-30 | 2016-08-30 | A kind of enterprise network flow total management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610753912.5A CN107800548A (en) | 2016-08-30 | 2016-08-30 | A kind of enterprise network flow total management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107800548A true CN107800548A (en) | 2018-03-13 |
Family
ID=61529060
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610753912.5A Pending CN107800548A (en) | 2016-08-30 | 2016-08-30 | A kind of enterprise network flow total management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107800548A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108616389A (en) * | 2018-04-10 | 2018-10-02 | 深信服科技股份有限公司 | Network estimation method, equipment, storage medium based on Cloud Server and device |
CN109040074A (en) * | 2018-08-07 | 2018-12-18 | 武汉思普崚技术有限公司 | A kind of method and device for analyzing application traffic |
-
2016
- 2016-08-30 CN CN201610753912.5A patent/CN107800548A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108616389A (en) * | 2018-04-10 | 2018-10-02 | 深信服科技股份有限公司 | Network estimation method, equipment, storage medium based on Cloud Server and device |
CN109040074A (en) * | 2018-08-07 | 2018-12-18 | 武汉思普崚技术有限公司 | A kind of method and device for analyzing application traffic |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112035258B (en) | Data processing method, device, electronic equipment and medium | |
CN110519177A (en) | A kind of network flow identification method and relevant device | |
CN106921637A (en) | The recognition methods of the application message in network traffics and device | |
US20070076606A1 (en) | Statistical trace-based methods for real-time traffic classification | |
EP3053046B1 (en) | Network intrusion detection | |
US20130097308A1 (en) | Collecting asymmetric data and proxy data on a communication network | |
Hohemberger et al. | Orchestrating in-band data plane telemetry with machine learning | |
CN102468995A (en) | IPTV (internet protocol television) service based terminal user behavior monitoring system | |
CN108270716A (en) | A kind of audit of information security method based on cloud computing | |
Areström et al. | Early online classification of encrypted traffic streams using multi-fractal features | |
CN103078897A (en) | System for implementing fine grit classification and management of Web services | |
CN110351238A (en) | Industry control honey pot system | |
Nakao et al. | Application specific slicing for MVNO through software-defined data plane enhancing SDN | |
CN108900374A (en) | A kind of data processing method and device applied to DPI equipment | |
Hyun et al. | Real‐time and fine‐grained network monitoring using in‐band network telemetry | |
Elsayed et al. | Dealing with COVID-19 network traffic spikes [cybercrime and forensics] | |
CN106096034A (en) | application log management method and device | |
Killer et al. | Security management and visualization in a blockchain-based collaborative defense | |
Khodashenas et al. | Service mapping and orchestration over multi-tenant cloud-enabled RAN | |
CN107800548A (en) | A kind of enterprise network flow total management system | |
CN102904828B (en) | A kind of load-balancing method and device | |
WO2013189725A1 (en) | Method and system for spam detection and mitigation | |
CN107528837B (en) | Encrypted video identification method and device, computer device and readable storage medium | |
Taleb et al. | QoS2: a framework for integrating quality of security with quality of service | |
CN104283703A (en) | User login reminding method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180313 |