CN108777642A - A kind of network cryptographic machine network mapping information acquisition method using self study - Google Patents

A kind of network cryptographic machine network mapping information acquisition method using self study Download PDF

Info

Publication number
CN108777642A
CN108777642A CN201810585302.8A CN201810585302A CN108777642A CN 108777642 A CN108777642 A CN 108777642A CN 201810585302 A CN201810585302 A CN 201810585302A CN 108777642 A CN108777642 A CN 108777642A
Authority
CN
China
Prior art keywords
network
cryptographic machine
machine
network cryptographic
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810585302.8A
Other languages
Chinese (zh)
Inventor
朱书杉
蒋海波
马双涛
冯磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Chaoyue CNC Electronics Co Ltd
Original Assignee
Shandong Chaoyue CNC Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Chaoyue CNC Electronics Co Ltd filed Critical Shandong Chaoyue CNC Electronics Co Ltd
Priority to CN201810585302.8A priority Critical patent/CN108777642A/en
Publication of CN108777642A publication Critical patent/CN108777642A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of network cryptographic machine network mapping information acquisition method using self study, belong to network cryptographic machine technology for information acquisition field, the present invention obtains the server ip address informations that network cryptographic machine is connected automatically by the way of self study, by data traffic.The present invention can quickly, efficiently, accurately obtain the network mapping information of network cryptographic machine, contribute to the automatically dispose of cloud data center large scale network equipment, and deployment time and human and material resources cost are saved in great less artificial participation.

Description

A kind of network cryptographic machine network mapping information acquisition method using self study
Technical field
It a kind of is reflected the present invention relates to network cryptographic machine technology for information acquisition more particularly to using the network cryptographic machine network of self study Penetrate information acquisition method.
Background technology
During one of the core technology of cloud computing as Next Generation Internet constantly self is evolved and is improved.With cloud Computing technique is greatly developed, and the office application based on cloud computing has become the trend of informatization certainty.It is built in cloud computing If in the process, being safely one can not ignore the critical issue that can not also bypass.Ensure that the safety of office cloud system not only exists In can provide reliable and stable business service, while a kind of directly embodiment of even more information security.The usual portion of network cryptographic machine Administration can play protection work well before the server of cloud data center for the extraneous physical server for accessing cloud data center With, the unauthorized access to physical server is can effectively prevent, the safety of the entire cloud computing of raising that can be more safe and reliable, Ensure Working information safety.
Invention content
In order to solve the above technical problems, the present invention proposes a kind of network cryptographic machine network mapping letter using self study Cease acquisition methods.The IP address information for the physical server that network cryptographic machine is protected can automatically, be fast and accurately obtained, Network cryptographic machine is set to dispose more quickness and high efficiency in cloud data center.
The technical solution adopted by the present invention is that:
A kind of network cryptographic machine network mapping information acquisition method using self study, content include:
By the way of self study, the letters such as the addresses server ip that network cryptographic machine is connected are obtained automatically by data traffic Breath.
A kind of specific program-network cryptographic machine traffic flow analysis software is run on network cryptographic machine, by business Analysis, the self study of flow, network cryptographic machine can fast and accurately obtain the addresses ip for the server that data traffic is reached Etc. information.
Main includes three aspects:
1)The operational network cipher machine traffic flow analysis software on network cryptographic machine, business is run in entire cloud platform;
2)It can be with the IP address of self study to server by network cryptographic machine traffic flow analysis software;
3)Finally set network cryptographic machine to encryption mode.
On network cryptographic machine before operational network cipher machine traffic flow analysis software, need first to carry out in cloud data center Deployment.After cloud data center deployment, network cryptographic machine is arranged to bright logical pattern.
Wherein,
Network cryptographic machine traffic flow analysis software
Network cryptographic machine traffic flow analysis software be it is a kind of can be by obtaining net to the analysis of network topology business datum flow The program of physical server relevant information in network topology, the running software is on network cryptographic machine.
Specific implementation is:The business datum of user is after software, and software meeting record traffic data flow is specific to remember Record data are the source IP address of customer objective IP address and user then can clearly remember in this way by the record analysis of the software Which lower user of record needs which business accessed, and in conjunction with self-learning property, primarily determines that user accesses the permission of cloud data.
Self study
When disposing cloud data center, network cryptographic machine is set to bright logical pattern, after having disposed data center, in network cipher Traffic flow analysis software is run on machine, while the business of a period of time, business flow point are run under the bright logical pattern of network cryptographic machine The IP address of related physical server can be obtained by the business self-learning networks topology of operation by analysing software.
The beneficial effects of the invention are as follows
It can reduce artificial participation efficiently quickly at cloud data center on-premise network cipher machine, save human and material resources, time Cost.
Description of the drawings
Fig. 1 is the workflow schematic diagram of the present invention.
Specific implementation mode
More detailed elaboration is carried out to present disclosure below:
As shown in Figure 1, network cryptographic machine is arranged to bright logical pattern after the completion of cloud data center is disposed;
The operational network cipher machine traffic flow analysis software on network cryptographic machine runs the industry of a period of time in entire cloud platform Business;
It can be with the IP address of self study to server by network cryptographic machine traffic flow analysis software;
Finally set network cryptographic machine to encryption mode.
The content of present invention includes mainly:
Network cryptographic machine traffic flow analysis software
The business datum of user is after software, and software meeting record traffic data flow, physical record data are customer objective IP The source IP address of address and user then can clearly record which user needs to visit in this way by the record analysis of the software Which business asked, in conjunction with self-learning property, primarily determines that user accesses the permission of cloud data.
Self study
When disposing cloud data center, network cryptographic machine is set to bright logical pattern, after having disposed data center, in network cipher Traffic flow analysis software is run on machine, while the business of a period of time, business flow point are run under the bright logical pattern of network cryptographic machine The IP address of related physical server can be obtained by the business self-learning networks topology of operation by analysing software.

Claims (8)

1. a kind of network cryptographic machine network mapping information acquisition method using self study, which is characterized in that
By the way of self study, the server ip address informations that network cryptographic machine is connected are obtained automatically by data traffic.
2. according to the method described in claim 1, it is characterized in that,
A kind of program, i.e. network cryptographic machine traffic flow analysis software are run on network cryptographic machine, by dividing service traffics Analysis, self study, network cryptographic machine can fast and accurately obtain the ip address informations for the server that data traffic is reached.
3. according to the method described in claim 2, it is characterized in that,
Main includes three aspects:
1)The operational network cipher machine traffic flow analysis software on network cryptographic machine, business is run in entire cloud platform;
2)It can be with the IP address of self study to server by network cryptographic machine traffic flow analysis software;
3)Finally set network cryptographic machine to encryption mode.
4. according to the method described in claim 3, it is characterized in that,
On network cryptographic machine before operational network cipher machine traffic flow analysis software, need first in cloud data center carry out portion Administration.
5. method according to claim 3 or 4, which is characterized in that
After cloud data center deployment, network cryptographic machine is arranged to bright logical pattern.
6. according to the method described in claim 3, it is characterized in that,
Wherein,
Network cryptographic machine traffic flow analysis software
Network cryptographic machine traffic flow analysis software be it is a kind of can be by obtaining net to the analysis of network topology business datum flow The program of physical server relevant information in network topology, the running software is on network cryptographic machine.
7. according to the method described in claim 6, it is characterized in that,
Specific implementation is:The business datum of user is after software, software meeting record traffic data flow, physical record number According to the source IP address for customer objective IP address and user, in this way by the record analysis of the software, then can clearly record Which user needs which business accessed, and in conjunction with self-learning property, primarily determines that user accesses the permission of cloud data.
8. according to the method described in claim 3, it is characterized in that,
Self study
When disposing cloud data center, network cryptographic machine is set to bright logical pattern, after having disposed data center, in network cipher Traffic flow analysis software is run on machine, while running business under the bright logical pattern of network cryptographic machine, and traffic flow analysis software can By the business self-learning networks topology of operation, the IP address of related physical server is obtained.
CN201810585302.8A 2018-06-08 2018-06-08 A kind of network cryptographic machine network mapping information acquisition method using self study Pending CN108777642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810585302.8A CN108777642A (en) 2018-06-08 2018-06-08 A kind of network cryptographic machine network mapping information acquisition method using self study

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810585302.8A CN108777642A (en) 2018-06-08 2018-06-08 A kind of network cryptographic machine network mapping information acquisition method using self study

Publications (1)

Publication Number Publication Date
CN108777642A true CN108777642A (en) 2018-11-09

Family

ID=64025821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810585302.8A Pending CN108777642A (en) 2018-06-08 2018-06-08 A kind of network cryptographic machine network mapping information acquisition method using self study

Country Status (1)

Country Link
CN (1) CN108777642A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924800A (en) * 2009-06-11 2010-12-22 华为技术有限公司 Method for obtaining IP address of DHCPv6 server, DHCPv6 server and DHCPv6 communication system
CN103428044A (en) * 2012-05-24 2013-12-04 中国移动通信集团贵州有限公司 Data packet monitoring method, device and system
CN106453687A (en) * 2016-11-21 2017-02-22 中国联合网络通信集团有限公司 Method of obtaining IP of target device, MME network element and DNS server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924800A (en) * 2009-06-11 2010-12-22 华为技术有限公司 Method for obtaining IP address of DHCPv6 server, DHCPv6 server and DHCPv6 communication system
CN103428044A (en) * 2012-05-24 2013-12-04 中国移动通信集团贵州有限公司 Data packet monitoring method, device and system
CN106453687A (en) * 2016-11-21 2017-02-22 中国联合网络通信集团有限公司 Method of obtaining IP of target device, MME network element and DNS server

Similar Documents

Publication Publication Date Title
CN101562609B (en) VPN network security loophole detection and global admittance controlling system
CN107566379A (en) A kind of government information resources shared system based on block chain
CN104811433B (en) The distributed Internet of things system and implementation method of a kind of C/S frameworks
CN110336810A (en) Information sharing method, platform and calculating equipment
CN111666578A (en) Data management method and device, electronic equipment and computer readable storage medium
CN105915535B (en) A kind of virtual resources access control method based on user identity
CN107463839A (en) A kind of system and method for managing application program
CN104683394A (en) Cloud computing platform database benchmark test system for new technology and method thereof
CN109344624A (en) Penetration test method, platform, equipment and storage medium based on cloud cooperation
CN103136255A (en) Method and device for information management
CN114238959A (en) User access behavior evaluation method and system based on zero-trust security system
CN107566334B (en) A kind of distribution terminal safety monitoring method and device realized based on agency
CN113111951A (en) Data processing method and device
CN108027856A (en) The real-time indicator of attack information is established using credible platform module
CN112261045A (en) Network attack data automatic generation method and system based on attack principle
JP2009003549A (en) Data management device, data management method, data management program, and data management program storage medium
CN110474916A (en) Web oriented application provides the method and device of franchise account
JP2015132927A (en) Information processing system, information processing device, monitoring device, monitoring method, and program
CN113010897A (en) Cloud computing security management method and system
CN108777642A (en) A kind of network cryptographic machine network mapping information acquisition method using self study
CN104009846B (en) A kind of single-sign-on apparatus and method
CN106888197A (en) The processing method and equipment of a kind of network risks
CN114157470B (en) Token management method and device
CN113065126B (en) Personal information compliance method and device based on distributed data sandbox
CN107454112A (en) A kind of method and its system for accessing trusted application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181109

RJ01 Rejection of invention patent application after publication