CN114124477B - Business service system and method - Google Patents

Business service system and method Download PDF

Info

Publication number
CN114124477B
CN114124477B CN202111308712.6A CN202111308712A CN114124477B CN 114124477 B CN114124477 B CN 114124477B CN 202111308712 A CN202111308712 A CN 202111308712A CN 114124477 B CN114124477 B CN 114124477B
Authority
CN
China
Prior art keywords
service
data
network
layer packet
mirror image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111308712.6A
Other languages
Chinese (zh)
Other versions
CN114124477A (en
Inventor
王新成
祝青柳
王志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Leagsoft Technology Co ltd
Original Assignee
Shenzhen Leagsoft Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Leagsoft Technology Co ltd filed Critical Shenzhen Leagsoft Technology Co ltd
Priority to CN202111308712.6A priority Critical patent/CN114124477B/en
Publication of CN114124477A publication Critical patent/CN114124477A/en
Application granted granted Critical
Publication of CN114124477B publication Critical patent/CN114124477B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention provides a business service system and a method, wherein the system comprises: the simulation subsystem: a first network device including a plurality of IP addresses configured with a first network, the first network devices being connected through the first network; the simulation subsystem realizes the initiation of a service access request, the mirror image processing of the service access request and the return of a service data link layer packet through the first network equipment; the real subsystem: a second network device including an IP address not configured with the first network, the second network device being connected to the analog subsystem by a link; and the real subsystem realizes construction and return of the service data link layer packet through the second network equipment. The business service system can better help enterprises solve the problems faced when the existing intranet business system is opened to the Internet to provide remote office, normal business access of terminal users is not affected, and the security of the business system is improved.

Description

Business service system and method
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a business service system and a business service method.
Background
The remote office is a product of the communication industry and the IT industry which are developed at high speed at present, and the communication industry is convenient and fast to communicate and has a large scale on users, and the IT industry is mature in software application and rich in business content, so that the communication industry is perfectly combined together, and the communication industry becomes a new generation office mode after paperless office and Internet remote office of computers. The latest office mode enables the mobile phone to have the office function same as that of a computer by installing enterprise informatization software on the mobile phone, and gets rid of the limitation that the mobile phone has to conduct office on fixed equipment in a fixed place, thereby providing great convenience for enterprise managers and business persons and providing brand new thinking and direction for informatization construction of enterprises and governments. The system not only enables office work to be random and relaxed, but also enables a user to carry out work efficiently and rapidly no matter what emergency the user is in, and has great significance for handling emergent events and disposing emergent events.
Because the remote office needs to access the internal network of the enterprise and public institution through an open public network, the primary problems of the use and popularization of the remote office are the security of the business and the security of the business server introduced by the remote office. There is therefore a need to provide an extremely secure solution for tele-office applications.
The existing solutions are mainly implemented by firewall technology. The firewall protects the security of network information inside enterprises and institutions, such as preventing leakage of important information such as account information of banking servers, confidential information of government departments, combat plans and strategies in troops and the like. In a narrow sense, a firewall protects the security of each server in an enterprise's internal network from all malicious access or attack from an external non-secure network of the enterprise. The firewall realizes the protection function of the internal network by logically isolating the internal network and the external network, and then controls the access behavior through the firewall according to the pre-customized security policy, thereby achieving the effective control of the access of the internal network of the enterprise. However, the firewall technology is used for service security protection, the internet and the intranet are actually connected, the service system still needs to indirectly expose the server to the internet, and when a vulnerability exists in the service system, the security of the service system can be directly threatened, and even the security of the server where the service system is located and the security of the network where the server is located are influenced.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a business service system and a business service method, which improve the safety of the business system.
In a first aspect, a business service system includes:
the simulation subsystem: a first network device including a plurality of IP addresses configured with a first network, the first network devices being connected through the first network; the simulation subsystem realizes the initiation of the service access request, the mirror image processing of the service access request and the return of the service data link layer packet through the first network equipment;
the real subsystem: the second network equipment is connected with the simulation subsystem through a link; the real subsystem realizes construction and return of the service data link layer packet through the second network device.
Preferably, the first network device comprises:
user terminal: configuring an IP address of a first network; the user terminal is used for a user to initiate a service access request;
the switch: configuring an IP address of a first network, and connecting the IP address with a user terminal through the first network; the switch is used for receiving the service access request and carrying out mirror image processing on the service access request to obtain mirror image data; the exchanger is also used for returning the business data link layer packet to the corresponding user terminal;
a first service server: configuring an IP address of a first network, and connecting the IP address with a switch through the first network; the first service server is used for receiving a service access request.
Preferably, the second network device comprises:
and a second service server: the IP address of the first network is not configured, and the IP address is connected with a switch in the analog subsystem through a link; the second service server is used for receiving the mirror image data, processing the effective mirror image data, constructing a service data link layer packet, and returning the service data link layer packet to the switch.
Preferably, the link between the second service server and the switch includes a mirror link and a communication link;
the mirror image link is used for the exchanger to transmit mirror image data to the second service server;
the communication link is used for the second service server to return the service data link layer packet to the switch.
Preferably, the second service server is specifically configured to determine that the mirror data is valid when the mirror data is detected to be legal or on a preset white list.
Preferably, the second service server is specifically configured to process the valid mirrored data to obtain processed data, and simulate the first service server to construct a service data link layer packet according to the processed data.
In a second aspect, a business service method operates on the business service system of the first aspect; the business service method comprises the following steps:
the user terminal is used for a user to initiate a service access request;
the switch receives the service access request and mirrors the service access request to obtain mirror image data;
the first service server receives a service access request;
the second service server receives the mirror image data, processes the effective mirror image data, constructs a service data link layer packet, and returns the service data link layer packet to the switch;
and the switch returns the service data link layer packet to the corresponding user terminal.
Preferably, after the second service server receives the mirror data, before processing the valid mirror data, the method further includes:
and when the second service server detects that the mirror image data is legal or on a preset white list, the second service server judges that the mirror image data is valid.
Preferably, after the second service server processes the valid mirror image data, constructing a service data link layer packet specifically includes:
and the second service server processes the effective mirror image data to obtain processed data, and the first service server is simulated to construct a service data link layer packet according to the processed data.
According to the technical scheme, the business service system and the business service method provided by the invention can not carry out IP communication on the network level between the simulation subsystem and the real subsystem, and even if the first network equipment in the simulation subsystem is broken, the second network equipment in the real subsystem can not be accessed. The business service system can better help enterprises solve the problems faced when the existing intranet business system is opened to the Internet to provide remote office, normal business access of terminal users is not affected, and the security of the business system is improved. And the security analysis can be carried out on the business data, so that the business service system is ensured not to attack, the abnormality can be found, and the abnormality can be blocked or not processed in time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. Like elements or portions are generally identified by like reference numerals throughout the several figures. In the drawings, elements or portions thereof are not necessarily drawn to scale.
Fig. 1 is a schematic block diagram of a business service system according to a first embodiment.
Fig. 2 is a specific architecture diagram of a business service system according to a first embodiment.
Fig. 3 is a flowchart of a business service method provided in the second embodiment.
Detailed Description
Embodiments of the technical scheme of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for more clearly illustrating the technical aspects of the present invention, and thus are merely examples, and are not intended to limit the scope of the present invention. It is noted that unless otherwise indicated, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this invention pertains.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Embodiment one:
a business service system, see fig. 1, comprising:
simulation subsystem 1: a first network device including a plurality of IP addresses configured with a first network, the first network devices being connected through the first network; the simulation subsystem 1 realizes the initiation of a service access request, the mirror image processing of the service access request and the return of a service data link layer packet through first network equipment;
the real subsystem 2: a second network device including an IP address not configured with the first network, the second network device being connected to the analog subsystem 1 through a link; the real subsystem 2 implements construction and return of the service data link layer packet through the second network device.
In this embodiment, the simulation subsystem 1 is configured to meet a normal service requirement, where the simulation subsystem 1 implements initiation of a normal service access request of a user, and returns a service data link layer packet obtained by processing the service access request to the user. From the user's sense of view, the user can still normally initiate a service access request and normally read the service data link layer packet. The first network devices in the analog subsystem 1 are configured with IP addresses of the application and the first network, which may be some common network communication protocol, so that the first network devices support the common network communication protocol (e.g., TCP/IP, etc.). The simulation subsystem 1 provides a virtual service port for services outside, supports the user to access through the first network, but does not perform service data processing and responds to service access requests.
In this embodiment, the real subsystem 2 is not configured with the IP address of the first network, so that the real subsystem 2 and the analog subsystem 1 can only be connected through a link, but can not be connected through the first network, thereby realizing network logic isolation between the real subsystem 2 and the analog subsystem 1, and no direct TCP/IP data exchange exists between the real subsystem 2 and the analog subsystem 1. The real subsystem 2 is used for providing a real service access request processing flow. The real subsystem 2 only provides link ports (e.g. binds traffic service ports at 127.0.0.1) to the analog subsystem 1. The service system can also be added with hardware firewall and other devices to further ensure one-way communication of data.
In the business service system, the simulation subsystem 1 and the real subsystem 2 cannot perform IP communication on the network level, and even if the first network equipment in the simulation subsystem 1 is broken, the second network equipment in the real subsystem 2 cannot be accessed. The business service system can better help enterprises solve the problems faced when the existing intranet business system is opened to the Internet to provide remote office work, and normal business access of terminal users is not affected.
Further, in some embodiments, referring to fig. 2, the first network device comprises:
user terminal 12: configuring an IP address of a first network; the user terminal 12 is used for a user of the first service server 11 to initiate a service access request;
switch 13: configuring an IP address of a first network, and connecting with the user terminal 12 through the first network; the switch 13 is configured to receive a service access request, and mirror the service access request to obtain mirror data; the switch 13 is further configured to return the service data link layer packet to the corresponding user terminal 12;
the first service server 11: configuring an IP address of a first network, and connecting with the switch 13 through the first network; the first service server 11 is configured to receive a service access request.
In the present embodiment, the user terminal 12 is provided for the user, and the user terminal 12 provides normal network communication and service system access functions. The user terminal 12 may be a mobile terminal (e.g., a cell phone, tablet, etc.) or a stationary computer (e.g., a desktop computer, etc.). The service access request may include an IP address to be accessed, data to be accessed, and the like.
In this embodiment, the switch 13 receives the service access request of the user terminal 12, and performs mirror processing on the service access request to obtain mirror data. The mirroring process essentially enables replication of service access requests. The mirrored data is substantially identical to the content of the service access request, e.g. provided that the service access request may include the IP address to be accessed and the data to be accessed, the resulting mirrored data also includes the IP address to be accessed and the data to be accessed. The service data link layer packet is data obtained after the service access request is truly processed. The switch 13 returns the service data link layer packet to the corresponding user terminal 12, so that the user can read the service data link layer packet through the user terminal 12, and normal service access and reading operation in the service system is realized.
In this embodiment, the first service server 11 only receives the service access request, does not substantially process the service access request, and the first service server 11 mainly establishes a TCP link with the user terminal 12 for use, or may be made into a honeypot to play a role in trapping. The first service server 11 does not store any substantial data, and if the service system is broken, no substantial data is read when the intrusion device accesses the first service server 11.
Further, in some embodiments, referring to fig. 2, the second network device comprises:
the second service server 21: the IP address of the first network is not configured, and the IP address is connected with the switch 13 in the analog subsystem 1 through a link; the second service server 21 is configured to receive the mirror image data, process the valid mirror image data, and then construct a service data link layer packet, and return the service data link layer packet to the switch 13.
In this embodiment, a plurality of second service servers 21 may form a server group, and an IP address of the second network may be configured on the second service server when the second service server is connected to the second service server or the second service server and other devices through the second network. The second service server 21 does not configure the IP address of the first network, and performs a non-network link connection with the switch 13. The second service server 21 constructs a service data link layer packet according to the effective mirror image data, processes the service access request, and returns the service access request to the switch 13.
Further, in some embodiments, referring to fig. 2, the link between the second service server 21 and the switch 13 includes a mirror link and a communication link;
the mirror link is used for the switch 13 to transmit mirror data to the second service server 21;
the communication link is used for the second service server 21 to return the service data link layer packets to the switch 13.
In the present embodiment, two links are provided between the second service server 21 and the switch 13: mirror links and communication links. For example, a port is provided on the second service server 21 as a mirror port, and a mirror link is provided, so that unidirectional data flow from the switch 13 to the second service server 21 is realized. The second service server 21 is further provided with another port to provide a communication link, so that the unidirectional data flow from the second service server 21 to the switch 13 is realized.
Further, in some embodiments, the second service server 21 is specifically configured to determine that the mirror data is valid when the mirror data is detected to be legal or on a preset whitelist.
In this embodiment, when the second service server 21 receives the mirror image data, it checks the rationality of the mirror image data, and if the mirror image data is illegal or not on the white list, it determines that the mirror image data is invalid, the second service server 21 may discard the mirror image data and not process the mirror image data. If the mirror image data is legal or on the white list, the mirror image data is judged to be valid, and the second service server 21 processes the mirror image data. Therefore, the business service system can carry out rationality analysis on the business access request, and can timely block if abnormality is found. The service system may determine whether the mirror image data is reasonable or not in the second service server 21, or may determine a service access request in the switch 13. The judging method of the switch 13 may be identical to the judging method of the second service server 21 or may be set by itself according to the characteristics of the own device. Therefore, the business service system can realize double check of the request data and timely block abnormal data.
Further, in some embodiments, the second service server 21 is specifically configured to process the valid mirrored data to obtain processed data, and simulate the first service server 11 to construct a service data link layer packet according to the processed data.
In this embodiment, since the user initiates the service access request according to the preset network communication protocol when using, the user terminal 12 also needs to analyze and read the service data according to the network communication protocol. Therefore, after the second service server 21 performs service processing on the effective mirror image data, the processing data cannot be directly returned, otherwise, the user terminal 12 cannot recognize and analyze the processing data, so that the second service server 21 needs to simulate the first service server 11, and the processing data is configured into a service data link layer packet according to the network communication protocol and then returned to the switch 13. For example, the second service server 21 constructs the processing data according to the TCP/IP protocol, and then obtains the service data link layer packet.
Embodiment two:
a business service method is operated on the business service system; referring to fig. 3, the business service method includes the steps of:
s1: the user terminal 12 is used for a user to initiate a service access request;
s2: the switch 13 receives the service access request and mirrors the service access request to obtain mirror image data;
s3: the first service server 11 receives a service access request;
s4: the second service server 21 receives the mirror image data, processes the effective mirror image data, constructs a service data link layer packet, and returns the service data link layer packet to the switch 13;
s5: the switch 13 returns the traffic data link layer packets to the corresponding user terminal 12.
Preferably, after the second service server 21 receives the mirror data, before processing the valid mirror data, it further includes:
the second service server 21 determines that the mirror data is valid when it detects that the mirror data is legal or on a preset whitelist.
Preferably, after the second service server 21 processes the valid mirror image data, constructing the service data link layer packet specifically includes:
the second service server 21 processes the valid mirrored data to obtain processed data, and the first service server 11 is simulated to construct a service data link layer packet according to the processed data.
For a brief description of the method provided by the embodiments of the present invention, reference may be made to the corresponding content in the foregoing embodiments where the description of the embodiments is not mentioned.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention, and are intended to be included within the scope of the appended claims and description.

Claims (6)

1. A business service system, comprising:
the simulation subsystem: a first network device including a plurality of IP addresses configured with a first network, the first network devices being connected through the first network; the simulation subsystem realizes the initiation of a service access request, the mirror image processing of the service access request and the return of a service data link layer packet through the first network equipment;
the real subsystem: a second network device including an IP address not configured with the first network, the second network device being connected to the analog subsystem by a link; the real subsystem realizes construction and return of a service data link layer packet through the second network equipment;
the first network device includes:
user terminal: configuring an IP address of the first network; the user terminal is used for a user to initiate the service access request;
the switch: configuring an IP address of the first network, and connecting the IP address with the user terminal through the first network; the switch is used for receiving the service access request and carrying out mirror image processing on the service access request to obtain mirror image data; the switch is also used for returning the business data link layer packet to the corresponding user terminal;
a first service server: configuring an IP address of the first network, and connecting the IP address with the switch through the first network; the first service server is configured to receive the service access request;
the second network device includes:
and a second service server: the IP address of the first network is not configured, and the IP address is connected with the switch in the analog subsystem through the link; the second service server is used for receiving the mirror image data, processing the effective mirror image data, constructing the service data link layer packet, and returning the service data link layer packet to the switch;
the link between the second service server and the switch comprises a mirror image link and a communication link;
the mirror link is used for the switch to transmit the mirror data to the second service server;
the communication link is used for the second service server to return the service data link layer packet to the switch.
2. The business service system of claim 1, wherein,
the second service server is specifically configured to determine that the mirror data is valid when the mirror data is detected to be legal or on a preset whitelist.
3. The business service system of claim 1, wherein,
the second service server is specifically configured to process the effective mirror image data to obtain processed data, and simulate the first service server to construct the service data link layer packet according to the processed data.
4. A business service method, characterized by running on the business service system of any one of claims 1-3; the business service method comprises the following steps:
the user terminal is used for a user to initiate a service access request;
the switch receives the service access request and mirrors the service access request to obtain mirror image data;
the first service server receives the service access request;
the second service server receives the mirror image data, processes the effective mirror image data, constructs a service data link layer packet, and returns the service data link layer packet to the switch;
and the switch returns the service data link layer packet to the corresponding user terminal.
5. The business service method of claim 4, wherein after the second business server receives the mirror data, before the processing the valid mirror data, further comprising:
and when the second service server detects that the mirror image data is legal or on a preset white list, judging that the mirror image data is valid.
6. The method for service according to claim 4, wherein after the second service server processes the valid mirror data, constructing the service data link layer packet specifically includes:
and the second service server processes the effective mirror image data to obtain processing data, and simulates the first service server to construct the service data link layer packet according to the processing data.
CN202111308712.6A 2021-11-05 2021-11-05 Business service system and method Active CN114124477B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111308712.6A CN114124477B (en) 2021-11-05 2021-11-05 Business service system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111308712.6A CN114124477B (en) 2021-11-05 2021-11-05 Business service system and method

Publications (2)

Publication Number Publication Date
CN114124477A CN114124477A (en) 2022-03-01
CN114124477B true CN114124477B (en) 2024-04-05

Family

ID=80381262

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111308712.6A Active CN114124477B (en) 2021-11-05 2021-11-05 Business service system and method

Country Status (1)

Country Link
CN (1) CN114124477B (en)

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754407A (en) * 2008-12-16 2010-06-23 联想(北京)有限公司 Method, server and system for processing service access request
CN102752303A (en) * 2012-07-05 2012-10-24 北京锐安科技有限公司 Bypass-based data acquisition method and system
CN102859934A (en) * 2009-03-31 2013-01-02 考持·维 System and method for access management and security protection for network accessible computer services
CN103336798A (en) * 2013-06-17 2013-10-02 华南理工大学 Virtualized data access system and method of embedded network device
CN104113519A (en) * 2013-04-16 2014-10-22 阿里巴巴集团控股有限公司 Network attack detection method and device thereof
CN104301445A (en) * 2013-07-15 2015-01-21 北京邮电大学 Mobile Internet data transmission method and system
CN105471866A (en) * 2015-11-23 2016-04-06 深圳市联软科技有限公司 Protection method and apparatus for mobile application
CN106789952A (en) * 2016-11-30 2017-05-31 用友优普信息技术有限公司 A kind of LAN services interconnect the method and system of networking
CN107819727A (en) * 2016-09-13 2018-03-20 腾讯科技(深圳)有限公司 A kind of network safety protection method and system based on the safe credit worthiness of IP address
CN108616490A (en) * 2016-12-13 2018-10-02 腾讯科技(深圳)有限公司 A kind of method for network access control, apparatus and system
CN110493192A (en) * 2019-07-17 2019-11-22 北京泰立鑫科技有限公司 A kind of data safe transmission system and method based on data gateway
CN110519404A (en) * 2019-08-02 2019-11-29 锐捷网络股份有限公司 A kind of policy management method based on SDN, device and electronic equipment
CN110769462A (en) * 2019-10-24 2020-02-07 杭州迪普科技股份有限公司 Network access control method and device
CN111294798A (en) * 2018-12-07 2020-06-16 中国移动通信集团陕西有限公司 Data interaction method, device, terminal equipment and medium
CN111490993A (en) * 2020-04-13 2020-08-04 江苏易安联网络技术有限公司 Application access control security system and method
CN111752959A (en) * 2020-05-29 2020-10-09 南京南瑞继保电气有限公司 Real-time database cross-database SQL interaction method and system
CN111988314A (en) * 2020-08-19 2020-11-24 杭州铂钰信息科技有限公司 System architecture and method for dynamically deploying network security service
CN112073419A (en) * 2020-09-11 2020-12-11 深圳市吉祥腾达科技有限公司 Attack defense reliability test system for network solution
CN112383546A (en) * 2020-11-13 2021-02-19 腾讯科技(深圳)有限公司 Method for processing network attack behavior, related device and storage medium
CN112995151A (en) * 2021-02-08 2021-06-18 腾讯科技(深圳)有限公司 Access behavior processing method and device, storage medium and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9015301B2 (en) * 2007-01-05 2015-04-21 Digital Doors, Inc. Information infrastructure management tools with extractor, secure storage, content analysis and classification and method therefor
US20110252001A1 (en) * 2010-04-08 2011-10-13 Dssdr, Llc Mirroring High Availability System and Method
US9621412B2 (en) * 2012-12-27 2017-04-11 Telecom Italia S.P.A. Method for guaranteeing service continuity in a telecommunication network and system thereof

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754407A (en) * 2008-12-16 2010-06-23 联想(北京)有限公司 Method, server and system for processing service access request
CN102859934A (en) * 2009-03-31 2013-01-02 考持·维 System and method for access management and security protection for network accessible computer services
CN102752303A (en) * 2012-07-05 2012-10-24 北京锐安科技有限公司 Bypass-based data acquisition method and system
CN104113519A (en) * 2013-04-16 2014-10-22 阿里巴巴集团控股有限公司 Network attack detection method and device thereof
CN103336798A (en) * 2013-06-17 2013-10-02 华南理工大学 Virtualized data access system and method of embedded network device
CN104301445A (en) * 2013-07-15 2015-01-21 北京邮电大学 Mobile Internet data transmission method and system
CN105471866A (en) * 2015-11-23 2016-04-06 深圳市联软科技有限公司 Protection method and apparatus for mobile application
CN107819727A (en) * 2016-09-13 2018-03-20 腾讯科技(深圳)有限公司 A kind of network safety protection method and system based on the safe credit worthiness of IP address
CN106789952A (en) * 2016-11-30 2017-05-31 用友优普信息技术有限公司 A kind of LAN services interconnect the method and system of networking
CN108616490A (en) * 2016-12-13 2018-10-02 腾讯科技(深圳)有限公司 A kind of method for network access control, apparatus and system
CN111294798A (en) * 2018-12-07 2020-06-16 中国移动通信集团陕西有限公司 Data interaction method, device, terminal equipment and medium
CN110493192A (en) * 2019-07-17 2019-11-22 北京泰立鑫科技有限公司 A kind of data safe transmission system and method based on data gateway
CN110519404A (en) * 2019-08-02 2019-11-29 锐捷网络股份有限公司 A kind of policy management method based on SDN, device and electronic equipment
CN110769462A (en) * 2019-10-24 2020-02-07 杭州迪普科技股份有限公司 Network access control method and device
CN111490993A (en) * 2020-04-13 2020-08-04 江苏易安联网络技术有限公司 Application access control security system and method
CN111752959A (en) * 2020-05-29 2020-10-09 南京南瑞继保电气有限公司 Real-time database cross-database SQL interaction method and system
CN111988314A (en) * 2020-08-19 2020-11-24 杭州铂钰信息科技有限公司 System architecture and method for dynamically deploying network security service
CN112073419A (en) * 2020-09-11 2020-12-11 深圳市吉祥腾达科技有限公司 Attack defense reliability test system for network solution
CN112383546A (en) * 2020-11-13 2021-02-19 腾讯科技(深圳)有限公司 Method for processing network attack behavior, related device and storage medium
CN112995151A (en) * 2021-02-08 2021-06-18 腾讯科技(深圳)有限公司 Access behavior processing method and device, storage medium and electronic equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Identifying Application-Layer DDoS Attacks Based on Request Rhythm Matrices";Huan Lin等;《 IEEE Access ( Volume: 7)》 *
"Windows中的网络连接和数据传输管理研究";卿斯汉;《信息网络安全》 *

Also Published As

Publication number Publication date
CN114124477A (en) 2022-03-01

Similar Documents

Publication Publication Date Title
US10904293B2 (en) System and method for providing network and computer firewall protection with dynamic address isolation to a device
US10313368B2 (en) System and method for providing data and device security between external and host devices
US7975024B2 (en) Virtual personal computer access over multiple network sites
CN1305271C (en) Network safety isolating and information exchanging system and method based on proxy mapping
US20070199070A1 (en) Systems and methods for intelligent monitoring and response to network threats
CN106713365A (en) Cloud environment-based network security system
US20090119745A1 (en) System and method for preventing private information from leaking out through access context analysis in personal mobile terminal
WO2009061523A1 (en) System and method for providing data and device security between external and host devices
CN109981367A (en) Method based on the empty machine paas service management that Intranet penetrates
CN114124477B (en) Business service system and method
CN111526124B (en) Isolated communication system and method based on internal and external networks
Susilo et al. Personal firewall for Pocket PC 2003: design & implementation
Yina Discussion on computer network security technology and firewall technology
US10757078B2 (en) Systems and methods for providing multi-level network security
Masuya et al. An experience of monitoring university network security using a commercial service and diy monitoring
Yoon et al. Implementation of the automated network vulnerability assessment framework
CN111586034B (en) Data processing system and method
Bang et al. Research on financial institutional network partition design for anti-hacking
Morthala Building Firewall Application To Enhance The Cyber Security
Kapuganti et al. Ensure security for SDN-based Smart Healthcare systems with a Blockchain approach
Al-Mwald et al. Detection and Prevention of ARP Cache Poisoning in Advanced Persistent Threats Using Multiphase Validation and Firewall
CN115277119A (en) Internal network access method, device, equipment and storage medium
WO2021181391A1 (en) System and method for finding, tracking, and capturing a cyber-attacker
CN117640367A (en) Trusted network communication method
CN117635169A (en) Enterprise default prediction method and system based on financial integrated service platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant