Link communication monitoring view construction method based on IP data flow analysis
Technical Field
The invention relates to the technical field of communication, in particular to a link communication monitoring view construction method based on IP data flow analysis.
Background
With the progress of society and the development of companies, computers and networks are needed in daily work of people, and more work needs to process mass data streams, but confidential documents of companies are intentionally or unintentionally leaked through the networks during the working process of employees, or confidential documents inside the companies are stolen by lawless persons through the networks, so that huge damage is brought to the companies; therefore, the application provides a link communication monitoring view construction method based on IP data flow analysis.
Disclosure of Invention
Objects of the invention
In order to solve the technical problems in the background art, the invention provides a link communication monitoring view construction method based on IP data flow analysis, which can effectively prevent important data of a company or an enterprise from being leaked and effectively protect the network security of the company or the enterprise.
(II) technical scheme
The invention provides a link communication monitoring view construction method based on IP data flow analysis, which comprises the following steps:
s1, the background server controls the monitoring server to send a link detection instruction to the communication circuit link to be detected in the monitoring range; the monitoring server acquires to-be-detected data sent to a target server by an internal data server; the data to be detected is predefined target server network data;
s2, the monitoring server obtains at least one data stream according to the data to be detected and obtains the transmission rule A1 of each data stream;
s3, analyzing the data to be detected, and judging the transmission rule A1 of the data to be detected;
s4, acquiring a data transmission query request sent by a target server, wherein the data transmission query request carries a transmission rule A2;
s5, judging whether the transmission rule A2 is identical to the transmission rule A1,
if the transmission rule A2 is completely the same as the transmission rule A1, sending the data to be detected to a target server to generate a data transmission record;
if the transmission rule A2 is not the same as the transmission rule A1, interrupting the data to be detected, generating a data interruption transmission record and continuing to execute S6;
and S6, the monitoring server sends alarm information of transmission failure to the background server.
Preferably, the transmission rule of each data flow includes an internet protocol IP address and a port number of the processing device corresponding to the data flow.
Preferably, the transmission rule of each data stream includes that each data stream is determined to contain a unique identifier; and when the identification is that the internal data server sends the data to be detected, the internal data server randomly generates a digital verification code.
Preferably, the characters in the digital verification code comprise one or more of capital English letters, lowercase English letters, Arabic numerals and Chinese characters.
Preferably, the transmission rule a1 of each data stream is processed by the data stream processing device; if the acquired transmission rule of any data stream includes the IP addresses and port numbers of the multiple processing devices, the IP address and port number of one processing device is selected from the IP addresses and port numbers of the multiple processing devices as the information of the processing device corresponding to any determined data stream.
Preferably, the monitoring server comprises
The signal receiving module is used for receiving a signal instruction sent by the background server and a data transmission query request signal sent by the target server;
the data acquisition module is used for acquiring data to be detected;
the acquisition module is used for acquiring a transmission rule A1 of each data stream and a transmission rule A2 carried in the data transmission query request;
the data flow processing module is used for analyzing the data to be detected and judging a transmission rule A1 of the data to be detected;
and the comparison module is used for judging whether the transmission rule A2 is completely the same as the transmission rule A1.
Preferably, the monitoring server further comprises
And the record generating module is used for generating a data transmission record or a data interrupt transmission record.
Preferably, the monitoring server further comprises
And the storage module is used for storing the generated data transmission record or the generated data interrupt transmission record.
Preferably, in S5, when the transmission rule a2 is different from the transmission rule a1, the data to be detected is encrypted and protected.
Preferably, the background server comprises an encryption storage module;
the encryption storage module is used for encrypting and storing the data to be detected which are interrupted in transmission.
The technical scheme of the invention has the following beneficial technical effects:
when the system is used, if the confidential documents of a company need to be transmitted to the target server, the target server needs to send a data transmission query request carrying a transmission rule A2 to the internal data server when downloading the confidential documents; the monitoring server acquires data included in the confidential file to obtain data to be detected, acquires at least one data stream from the data to be detected, and acquires a transmission rule A1 of each data stream; the monitoring server judges the transmission rule A2 and the transmission rule A1, and when the transmission rule A2 is completely the same as the transmission rule A1, the data to be detected is sent to the target server; when the transmission rule A2 is different from the transmission rule A1, the data to be detected is interrupted, the monitoring server sends alarm information of transmission failure to the background server so that a worker can know the alarm information in time, unauthorized data transmission is processed, and leakage of confidential documents is avoided; in addition, the monitoring of the monitoring server can also prevent external personnel from downloading confidential files of the company from the internal data server, thereby effectively preventing important data of the company or the enterprise from being leaked and effectively protecting the network security of the company or the enterprise.
Drawings
Fig. 1 is a flowchart of a method for constructing a link communication monitoring view based on IP dataflow analysis according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.
As shown in fig. 1, the method for constructing a link communication monitoring view based on IP dataflow analysis provided by the present invention includes the following specific steps:
s1, the background server controls the monitoring server to send a link detection instruction to the communication circuit link to be detected in the monitoring range; the monitoring server acquires to-be-detected data sent to a target server by an internal data server; the data to be detected is predefined target server network data;
s2, the monitoring server obtains at least one data stream according to the data to be detected and obtains the transmission rule A1 of each data stream;
s3, analyzing the data to be detected, and judging the transmission rule A1 of the data to be detected;
s4, acquiring a data transmission query request sent by a target server, wherein the data transmission query request carries a transmission rule A2;
s5, judging whether the transmission rule A2 is identical to the transmission rule A1,
if the transmission rule A2 is completely the same as the transmission rule A1, sending the data to be detected to a target server to generate a data transmission record;
if the transmission rule A2 is not the same as the transmission rule A1, interrupting the data to be detected, generating a data interruption transmission record and continuing to execute S6;
s6, the monitoring server sends alarm information of transmission failure to the background server to enable workers to know in time, and unauthorized data transmission is processed to avoid leakage of confidential documents.
When the system is used, if the confidential documents of a company need to be transmitted to the target server, the target server needs to send a data transmission query request carrying a transmission rule A2 to the internal data server when downloading the confidential documents; the monitoring server acquires data included in the confidential file to obtain data to be detected, acquires at least one data stream from the data to be detected, and acquires a transmission rule A1 of each data stream; the monitoring server judges the transmission rule A2 and the transmission rule A1, and when the transmission rule A2 is completely the same as the transmission rule A1, the data to be detected is sent to the target server; when the transmission rule A2 is different from the transmission rule A1, the data to be detected is interrupted, the monitoring server sends alarm information of transmission failure to the background server so that a worker can know the alarm information in time, unauthorized data transmission is processed, and leakage of confidential documents is avoided; in addition, the monitoring of the monitoring server can also prevent external personnel from downloading confidential files of the company from the internal data server.
In an optional embodiment, the transmission rule of each data flow includes an internet protocol IP address and a port number of a processing device corresponding to the data flow.
In an alternative embodiment, the transmission rule for each data stream includes that each data stream is determined to contain a unique identifier; when the identification is that the internal data server sends the data to be detected, the internal data server randomly generates a digital verification code; and when the verification code carried in the data transmission query request sent by the target server is consistent with the verification code generated when the data to be detected is sent, the data to be detected can be continuously transmitted.
In an alternative embodiment, the characters in the numeric validation code include one or more of uppercase english letters, lowercase english letters, arabic numerals, and chinese characters.
In an alternative embodiment, the transmission rule a1 for each data stream is processed by the data stream processing device; if the acquired transmission rule of any data stream includes the IP addresses and port numbers of the multiple processing devices, the IP address and port number of one processing device is selected from the IP addresses and port numbers of the multiple processing devices as the information of the processing device corresponding to any determined data stream.
In an alternative embodiment, the monitoring server comprises
The signal receiving module is used for receiving a signal instruction sent by the background server and a data transmission query request signal sent by the target server; the signal receiving module is connected with the target server and the background server through network communication and is connected with the data acquisition module through communication;
the data acquisition module is used for acquiring data to be detected; the data acquisition module is in communication connection with the acquisition module;
the acquisition module is used for acquiring a transmission rule A1 of each data stream and a transmission rule A2 carried in the data transmission query request; the acquisition module is in communication connection with the data stream processing module;
the data flow processing module is used for analyzing the data to be detected and judging a transmission rule A1 of the data to be detected; the data stream processing module is in communication connection with the comparison module;
the comparison module is used for judging whether the transmission rule A2 is completely the same as the transmission rule A1; the comparison module is connected with the background server through network communication.
In an optional embodiment, the monitoring server further comprises
And the record generating module is used for generating a data transmission record or a data interrupt transmission record.
In an optional embodiment, the monitoring server further comprises
And the storage module is used for storing the generated data transmission record or the generated data interrupt transmission record.
In an alternative embodiment, in S5, when the transmission rule a2 is different from the transmission rule a1, the data to be detected is encrypted and protected.
In an optional embodiment, the backend server comprises an encryption storage module;
the encryption storage module is used for encrypting and storing the data to be detected which are interrupted in transmission.
It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.