CN114422201A - Network target range large-scale user remote access method and system - Google Patents

Network target range large-scale user remote access method and system Download PDF

Info

Publication number
CN114422201A
CN114422201A CN202111625365.XA CN202111625365A CN114422201A CN 114422201 A CN114422201 A CN 114422201A CN 202111625365 A CN202111625365 A CN 202111625365A CN 114422201 A CN114422201 A CN 114422201A
Authority
CN
China
Prior art keywords
access
user
network
target range
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111625365.XA
Other languages
Chinese (zh)
Other versions
CN114422201B (en
Inventor
蔡晶晶
陈俊
张凯
程磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yongxin Zhicheng Technology Group Co ltd
Original Assignee
Beijing Yongxin Zhicheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yongxin Zhicheng Technology Co Ltd filed Critical Beijing Yongxin Zhicheng Technology Co Ltd
Priority to CN202111625365.XA priority Critical patent/CN114422201B/en
Publication of CN114422201A publication Critical patent/CN114422201A/en
Application granted granted Critical
Publication of CN114422201B publication Critical patent/CN114422201B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/14Routing performance; Theoretical aspects

Abstract

The invention provides a remote access method and a remote access system for large-scale users in a network shooting range, which solve the technical problem that the prior access scheme lacks a uniform and effective access infrastructure and cannot meet the requirements of high-efficiency network access and safety control. The method comprises the following steps: establishing a security access process of a network target range and authentication information mapping and authentication process transmission between service application resources; monitoring resource allocation of the security access service in the security access process; and providing a route identifier and a route strategy for an access party during the establishment of the secure access to form the access optimization of the determined area of the network target range. The basic processing architecture which can adapt to the unified response and dynamic configuration of the access and resources when large-scale users remotely access is formed, and the safe, simple and effective remote access user authentication is realized at the edge of a network target range. The resource scheduling expansion and the improvement of the resource utilization rate and the service quality under the access condition are met. And flexible routing scheduling of the access of the designated area is realized, and accurate control of application scale and application efficiency is achieved.

Description

Network target range large-scale user remote access method and system
Technical Field
The invention relates to the technical field of network data processing, in particular to a method and a system for remotely accessing a large-scale user in a network target range.
Background
Network shooting ranges have become an essential network space security core infrastructure for network space security research, learning, testing, verification, drilling and the like in various countries. Network shooting ranges are highly valued in all countries in the world and are used as important means for safety capacity construction support.
Remote access is an important way for network shooting ranges to provide external services. Under the large-scale concurrent scene of multiple roles, multiple users and multiple links, synchronous or asynchronous coordination of multiple associated dimensions such as multiple resource accounts, login sources, access terminal types, authentication, authority control, access routing strategies, type resources and tools, access link redundancy, availability and safety dynamic control and the like of participants are involved in the VPN link access process. The existing access service cannot meet the requirements of increasingly complex remote access scenes on flexibility, effectiveness and redundancy of network shooting range access.
Disclosure of Invention
In view of the above problems, embodiments of the present invention provide a method and a system for remotely accessing a large-scale user in a network shooting range, which solve the technical problem that the existing access scheme lacks a unified and effective access infrastructure and cannot meet the requirements of efficient network access and security management and control.
The remote access method for the large-scale users in the network target range comprises the following steps:
establishing a security access process of a network target range and authentication information mapping and authentication process transmission between service application resources;
monitoring resource allocation of a secure access service in the secure access process;
and providing a route identifier and a route strategy for an access party during the establishment of the secure access to form the access optimization of the determined area of the network target range.
In an embodiment of the present invention, the authentication information mapping and authentication process transmission between the security access process for establishing the network target range and the service application resource includes:
forming an authentication information mapping between a security access process and a service application resource according to the existing authentication information;
identity authentication in the safety access process is carried out according to the identity authentication information remotely accessed by the user, and when the identity authentication passes, the available service application resources of the user are authorized according to the authentication information mapping;
and feeding back the available service application resource link to the user.
In an embodiment of the present invention, the monitoring resource allocation of the security access service in the security access process includes:
establishing initial binding among a single entity server, a single user group and a VPN service concurrency number according to user groups;
merging and adjusting the user group and the VPN service concurrency number on the entity server according to the user access number change;
and carrying out entity server expansion according to the user access number peak value and/or the access performance threshold.
In an embodiment of the present invention, the providing a routing identifier and a routing policy to an access party when establishing secure access, and forming access optimization of a network target location determination area includes:
distributing routing identification to the network target range distribution area;
establishing a routing strategy of a connection distribution area;
and feeding back the regional routing strategy to the starting point of the user access link, and marking the flow data through the routing identification.
In an embodiment of the present invention, the method further includes:
link quality and traffic anomalies are monitored while the secure access is maintained.
In an embodiment of the present invention, the monitoring link quality and traffic anomalies while maintaining secure access includes:
redefining resource allocation according to link quality and priority;
and determining the type of the alarm according to the flow analysis.
The network target range large-scale user remote access system of the embodiment of the invention comprises:
the unified authentication device is used for establishing the authentication information mapping and authentication process transmission between the safe access process of the network target range and the service application resources;
an access monitoring device for monitoring the resource allocation of the security access service in the security access process;
and the link configuration device is used for providing the route identification and the route strategy to the access party when the security access is established, and forming the access optimization of the network target range determination area.
In an embodiment of the present invention, the unified authentication apparatus includes:
the authentication association module is used for forming authentication information mapping between a security access process and service application resources according to the existing authentication information;
the authorization association module is used for carrying out identity authentication in the safety access process according to the identity authentication information remotely accessed by the user, and authorizing the available service application resources of the user according to the authentication information mapping when the identity authentication passes;
and the resource feedback module is used for feeding back the available service application resource link to the user.
In an embodiment of the present invention, the access monitoring apparatus includes:
the service binding module is used for establishing initial binding among the single entity server, the single user group and the VPN service concurrency number according to the user group;
the merging optimization module is used for merging and adjusting the user groups and the VPN service concurrency number on the entity server according to the user access number change;
and the expansion optimization module is used for expanding the entity server according to the user access number peak value and/or the access performance threshold value.
In an embodiment of the present invention, the link configuration apparatus includes:
the area identification module is used for distributing routing identification to the network target range distribution area;
the route recommending module is used for establishing a route strategy of a connection distribution area;
and the route feedback module is used for feeding back the regional route strategy to the starting point of the user access link and marking the flow data through the route identification.
The network target range large-scale user remote access method and the system form a basic processing framework which can adapt to unified dynamic configuration of access and resource response when large-scale users remotely access between user safety access and network target range application, and realize safe, simple and effective remote access user authentication at the edge of the network target range. The resource scheduling expansion and the improvement of the resource utilization efficiency and the service quality under the condition of access are met. And flexible routing scheduling of the access of the designated area is realized, and accurate control of application scale and application efficiency is achieved.
Drawings
Fig. 1 is a schematic main flow chart of a remote access method for a large-scale user in a network target range according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a main architecture of a large-scale user remote access system in a network target range according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer and more obvious, the present invention is further described below with reference to the accompanying drawings and the detailed description. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 shows a method for remotely accessing a large-scale user in a network target range according to an embodiment of the present invention. In fig. 1, the present embodiment includes:
step 100: and establishing a secure access process of a network target range and transmitting authentication information mapping and authentication process between service application resources.
As will be appreciated by those skilled in the art, the remote access procedure includes an access link establishment procedure, in which authentication is involved, and an access link maintenance procedure. The service application resources comprise software and hardware resources for users to develop services in a network target range, service resources of different services or identity conversion of different services, and the like, and the acquired service application resources relate to identity authentication. The remote access process forms safe access by utilizing a VPN technology to obtain high-standard identity authentication, and forms a uniform mapping structure for the identity authentication process of the safe access and authentication information, such as identity data, authentication data and authority data, in the identity authentication process of authority acquisition of each service application resource to form automatic authentication association of the service application resource aiming at the safe access identity. And forming an authorization passing state of the user safety access to trigger the authority acquisition authentication state of the service application resource, and triggering the allocation of the service application resource to the user by the passing state of the authority acquisition authentication.
Step 200: the resource allocation of the secure access service is monitored during the secure access process.
As will be understood by those skilled in the art, the security access procedure of the network shooting range belongs to a random and concurrent security access service response procedure, and the peak value of the concurrent number in unit time is uncertain. The concurrent state of the secure access service in the response process needs to be monitored, and the monitoring content includes, but is not limited to, dynamic service process or thread data, the utilization condition of the service process or thread on hardware resources, the number of secure access users, the type of users and other measurement indexes. And controlling the service state of the safety access service according to the measurement index, wherein the control content comprises but is not limited to access users, access software and access hardware regulation.
Step 300: and providing a route identifier and a route strategy for an access party during the establishment of the secure access to form the access optimization of the determined area of the network target range.
Those skilled in the art will appreciate that the remote access user is authenticated by the secure access to form the origin of the network range access link. The network target provides basic rules of transmission link establishment and routing of remote access user access determination authorization areas by forming routing strategies so as to optimize data transmission load balance of the network environment of the network target. The network shooting range provides an optimized means for accessing the redundant environment or the backup resource of the determined authorization area by the remote access user through forming the route destination identification.
The network target range large-scale user remote access method of the embodiment of the invention forms a basic processing framework which can adapt to the unified and dynamic configuration of access and service application resource response when the large-scale user remotely accesses between the user security access and the network target range application, and realizes the safe, simple and effective remote access user authentication at the edge of the network target range. The resource scheduling expansion and the improvement of the resource utilization efficiency and the service quality under the condition of access are met. And flexible routing scheduling of the access of the designated area is realized, and accurate control of application scale and application efficiency is achieved.
As shown in fig. 1, in an embodiment of the present invention, the method further includes:
step 400: link quality and traffic anomalies are monitored while the secure access is maintained.
It will be appreciated by those skilled in the art that the secure access link is in constant activation when the access user continues to apply the service application provided by the network range. The method comprises the steps of monitoring parameter indexes of a safe access link in real time, analyzing flag bits of flow data in the link to obtain full link quality evaluation data and flow abnormity evaluation data, and forming a trigger signal or an early warning signal of a preset process according to the evaluation data.
The remote access method for the large-scale users in the network target range, disclosed by the embodiment of the invention, utilizes link parameters and flow analysis to dynamically monitor and actively respond to the access state with the completeness and effectiveness of service application.
As shown in fig. 1, in an embodiment of the present invention, step 100 includes:
step 110: and forming authentication information mapping between the security access process and the service application resources according to the existing authentication information.
The content of the authentication information mapping includes, but is not limited to, mapping between authentication modes such as account authentication, certificate authentication and the like approved by management roles of different available service application resources, and mapping between a user group and a user role. Generally, the secure access process is initiated by a client of a VPN technology, and a network target site performs VPN link identity authentication.
Step 120: and performing identity authentication in the safety access process according to the identity authentication information remotely accessed by the user, and authorizing the available service application resources of the user according to the authentication information mapping when the identity authentication passes.
The authentication mode can be account authentication, certificate authentication and the like, and a certificate file and a configuration file can be generated if the certificate authentication is selected. And default selected account authentication is performed, authentication, user group management and user roles are performed by a network target range, and group and role query and display can be performed. And after the identity authentication of the VPN link is successful, the resource access authorization of the account is continuously applied to other network target site service systems.
Step 130: and feeding back the available service application resource link to the user.
In an embodiment of the invention, a user can directly obtain an available service application resource link through a web service application, and direct resource access is realized by clicking the resource link without inputting a user name and a password again.
The authentication information mapping formed by the network target range large-scale user remote access method of the embodiment of the invention establishes a uniform authentication information framework for the identity authentication of the network target range users. The VPN full link is managed and controlled, user authentication, user grouping, authority distribution, routing control, network access and the like are achieved, and finally safe, simple and effective remote access of the user is achieved.
As shown in fig. 1, in an embodiment of the present invention, step 200 includes:
step 210: and establishing initial binding among the single entity server, the single user group and the VPN service concurrency number according to the user group.
In an embodiment of the invention, a user group is formed according to the user type, corresponding entity server resources are deployed according to the user group, and the multiplexing ratio of the concurrency number of the VPN remote access service process is set according to the priority of the user type. The initial binding data is formed according to the type of the network target range business application and the past data statistics. Generally, a VPN access service provides VPN services for a limited number of user groups, establishes links, is responsible for starting, terminating and restarting services, loads configuration files, and accepts VPN scheduling. The configuration file includes: network configuration, IP address (IP, mask, dns) of external service, protocol type (tcp or udp and port number), authentication mode (password, certificate or other), user group configuration and default route after access.
Step 220: and merging and adjusting the user group and the VPN service concurrency number on the entity server according to the user access number change.
When the initial binding causes resource idling of the entity server and the VPN service concurrency, merging of the user group and the corresponding VPN service concurrency number on a single entity server is carried out, the corresponding VPN service concurrency number of the user group is reduced, and the corresponding VPN service of the user group is merged on one entity server.
Step 230: and carrying out entity server expansion according to the user access number peak value and/or the access performance threshold.
And when the initial binding causes the entity server and the VPN service to have access number peak values and/or reaches the access performance threshold value, starting the entity server to expand, and expanding the VPN service concurrent number corresponding to part of the same group to the backup entity server.
In one embodiment of the invention, the user group is defined according to the role of the swimming lake, the role set and the size of the set. For example, the users include an attacker, a defender, an operation and maintenance party, a referee and the like, the attacker may have attack teams 1-10 and the like, and the defender may have 1-20 persons and the like. The position, range and functional characteristics of the users are different, so that the network access places of different users after VPN access are different, and a user group mode is adopted to provide guarantee for unified and effective access management.
Through centralized access resource scheduling and management and control, resource scheduling and parallel expansion under the condition of large-scale user access are realized, resource consumption is reduced, resource utilization efficiency is improved, the quality of the vpn link is monitored, the use bandwidth is controlled, redundant backup is provided, timely switching of the standby link can be realized, and service quality is improved. For example, when the network access has low access success rate due to the network access form of telecommunication, mobile and communication, the network is switched to other networks appropriately; the resource of the physical entity server is limited, so that the bandwidth and the computing resource cannot be guaranteed after the user accesses the physical entity server, the resource of the physical entity server needs to be limited, and the overload of the user is avoided.
As shown in fig. 1, in an embodiment of the present invention, step 300 includes:
step 310: and distributing the route identification to the network target range distribution area.
The business application of the network range includes a determined area of the corresponding network range resource. In an embodiment of the invention, after a user obtains IP address allocation and resource access authority during security access establishment, a vlan mark number for an SDN network to determine a resource area in a network target range is provided.
Step 320: and establishing a routing strategy of the connection distribution area.
And forming a suggested network link route and a standby network link route selection strategy for the access IP address to reach the determined resource region of the vlan mark number according to the vlan mark number. So that the user can access the specified resource service through the specified network.
Step 330: and feeding back the regional routing strategy to the starting point of the user access link, and marking the flow data through the routing identification.
In one embodiment of the invention, the access starting point is an access IP address, and network routing information, a default route and an IP address range are pushed to an access client through a VPN service module, so that the network address of the accessible network shooting range equipment can be obtained; and meanwhile, marking the VLAN mark on the client access flow after successful access, realizing the accurate access of the SDN network and accessing the specified network service.
The SDN network is docked through the network identification, access to a designated area is achieved, adjustment can be flexibly performed, and accurate control is achieved.
As shown in FIG. 1, in one embodiment of the present invention, step 400 comprises:
step 410: the resource allocation is redefined according to link quality and priority.
And monitoring the network flow change condition, the link quality and the flow abnormity, and redefining the resource allocation according to the access priority, the quality and the network bandwidth control strategy.
Step 420: and determining the type of the alarm according to the flow analysis.
By analyzing the network traffic change condition, the link quality and the traffic anomaly monitoring, if an attack behavior occurs, alarming is carried out, for example, the number of simultaneous accesses and the longest time of the same account are limited, abnormal accesses or multiple login attempts are monitored, and the source of an IP address is limited and controlled.
The network target range large-scale user remote access method of the embodiment of the invention is applied in practice:
a user accesses a designated IP address and a designated port (a plurality of selectable IP addresses) through a VPN client program, and a VPN client program carrier comprises a computer and a mobile terminal; authenticating by using a pre-agreed authentication mode (such as an account number or a certificate);
after receiving the authentication information, if the authentication is passed, establishing a VPN communication link, and pushing a network address, a network route, an access resource to a VPN client program;
the network target range starts a plurality of vpn service programs according to the number of vpn client programs, dynamically meets large-scale user application, and establishes a vpn service for the user group in the same group to meet access requirements;
according to the access authority and the allocation information of the user, SDN network access control is carried out on the user access after the link is established, and vlan identification, priority level and the like required by access are configured; realizing accurate access of a network target range;
according to the whole process monitoring condition of the link, the configuration condition of each resource is scheduled in time, the service quality is monitored, a redundant VPN link is provided, and the normal operation of communication is guaranteed.
The invention discloses a remote access system for large-scale users in a network target range, which comprises the following steps:
the memory is used for storing the program codes of the processing procedures of the network target range large-scale user remote access method in the embodiment;
and the processor is used for executing the program codes of the processing procedures of the network target range large-scale user remote access method in the embodiment.
The processor may be a DSP (digital Signal processor), an FPGA (Field-Programmable Gate Array), an MCU (micro controller Unit) system board, an SoC (System on a chip) system board, or a PLC (Programmable Logic controller) minimum system including I/O.
Fig. 2 shows a network target site large-scale user remote access system according to an embodiment of the present invention. In fig. 1, the present embodiment includes:
the unified authentication device 10 is used for establishing the authentication information mapping and authentication process transmission between the security access process of the network target range and the service application resources;
an access monitoring device 20, configured to monitor resource allocation of a secure access service in a secure access process;
and the link configuration device 30 is used for providing the route identifier and the route policy to the access party when the secure access is established, so as to form the access optimization of the network target range determination area.
As shown in fig. 2, in an embodiment of the present invention, the unified authentication apparatus 10 includes:
the authentication association module 11 is used for forming authentication information mapping between a security access process and service application resources according to the existing authentication information;
the authorization association module 12 is used for performing identity authentication in a secure access process according to identity authentication information remotely accessed by a user, and authorizing available service application resources of the user according to authentication information mapping when the identity authentication passes;
and the resource feedback module 13 is configured to feedback the available service application resource link to the user.
As shown in fig. 2, in an embodiment of the present invention, the access monitoring apparatus 20 includes:
the service binding module 21 is configured to establish initial binding among a single entity server, a single user group, and a VPN service concurrency number according to the user group;
the merging optimization module 22 is configured to perform merging adjustment on the user group and the VPN service concurrence number on the entity server according to the user access number change;
and the expansion optimization module 23 is configured to perform entity server expansion according to the peak value of the user access number and/or the access performance threshold.
As shown in fig. 2, in an embodiment of the present invention, the link configuration apparatus 30 includes:
the area identification module 31 is used for allocating routing identification to the network target range allocation area;
a route recommending module 32, configured to establish a routing policy for connecting the distribution areas;
and a route feedback module 33, configured to feed back an area routing policy to the starting point of the user access link, and mark traffic data through the route identifier.
As shown in fig. 2, in an embodiment of the present invention, the method further includes:
and the link monitoring device 40 is used for monitoring link quality and flow abnormity when the safety access is kept.
As shown in fig. 2, in an embodiment of the present invention, the link monitoring apparatus 40 includes:
a resource optimization module 41 for redefining resource allocation according to link quality and priority;
and an alarm analysis module 42 for determining the alarm type according to the flow analysis.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A remote access method for large-scale users in a network target range is characterized by comprising the following steps:
establishing a security access process of a network target range and authentication information mapping and authentication process transmission between service application resources;
monitoring resource allocation of a secure access service in the secure access process;
and providing a route identifier and a route strategy for an access party during the establishment of the secure access to form the access optimization of the determined area of the network target range.
2. The method for large scale remote access of users in a network target site as claimed in claim 1, wherein the authentication information mapping and authentication process transfer between the security access process for establishing the network target site and the service application resource comprises:
forming an authentication information mapping between a security access process and a service application resource according to the existing authentication information;
identity authentication in the safety access process is carried out according to the identity authentication information remotely accessed by the user, and when the identity authentication passes, the available service application resources of the user are authorized according to the authentication information mapping;
and feeding back the available service application resource link to the user.
3. The network range large scale user remote access method of claim 1, wherein the monitoring resource allocation of security access services in the security access process comprises:
establishing initial binding among a single entity server, a single user group and a VPN service concurrency number according to user groups;
merging and adjusting the user group and the VPN service concurrency number on the entity server according to the user access number change;
and carrying out entity server expansion according to the user access number peak value and/or the access performance threshold.
4. The method for remote access of a large-scale user in a network target range according to claim 1, wherein the step of providing a route identifier and a route policy to an access party when establishing the secure access, and the step of forming the access optimization of the network target range determination area comprises the steps of:
distributing routing identification to the network target range distribution area;
establishing a routing strategy of a connection distribution area;
and feeding back the regional routing strategy to the starting point of the user access link, and marking the flow data through the routing identification.
5. The network range large scale user remote access method of claim 1, further comprising:
link quality and traffic anomalies are monitored while the secure access is maintained.
6. The network shooting range large-scale user remote access method of claim 5, wherein the monitoring link quality and traffic anomalies while secure access remains comprises:
redefining resource allocation according to link quality and priority;
and determining the type of the alarm according to the flow analysis.
7. A network shooting range large scale user remote access system, comprising:
the unified authentication device is used for establishing the authentication information mapping and authentication process transmission between the safe access process of the network target range and the service application resources;
an access monitoring device for monitoring the resource allocation of the security access service in the security access process;
and the link configuration device is used for providing the route identification and the route strategy to the access party when the security access is established, and forming the access optimization of the network target range determination area.
8. The network shooting range large scale user remote access system of claim 7, wherein the unified authentication apparatus comprises:
the authentication association module is used for forming authentication information mapping between a security access process and service application resources according to the existing authentication information;
the authorization association module is used for carrying out identity authentication in the safety access process according to the identity authentication information remotely accessed by the user, and authorizing the available service application resources of the user according to the authentication information mapping when the identity authentication passes;
and the resource feedback module is used for feeding back the available service application resource link to the user.
9. The network range large scale user remote access system of claim 7, wherein the access monitoring device comprises:
the service binding module is used for establishing initial binding among the single entity server, the single user group and the VPN service concurrency number according to the user group;
the merging optimization module is used for merging and adjusting the user groups and the VPN service concurrency number on the entity server according to the user access number change;
and the expansion optimization module is used for expanding the entity server according to the user access number peak value and/or the access performance threshold value.
10. The network range large scale user remote access system of claim 7, wherein the link configuration means comprises:
the area identification module is used for distributing routing identification to the network target range distribution area;
the route recommending module is used for establishing a route strategy of a connection distribution area;
and the route feedback module is used for feeding back the regional route strategy to the starting point of the user access link and marking the flow data through the route identification.
CN202111625365.XA 2021-12-28 2021-12-28 Network target range large-scale user remote access method and system Active CN114422201B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111625365.XA CN114422201B (en) 2021-12-28 2021-12-28 Network target range large-scale user remote access method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111625365.XA CN114422201B (en) 2021-12-28 2021-12-28 Network target range large-scale user remote access method and system

Publications (2)

Publication Number Publication Date
CN114422201A true CN114422201A (en) 2022-04-29
CN114422201B CN114422201B (en) 2022-11-08

Family

ID=81269418

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111625365.XA Active CN114422201B (en) 2021-12-28 2021-12-28 Network target range large-scale user remote access method and system

Country Status (1)

Country Link
CN (1) CN114422201B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115022098A (en) * 2022-08-09 2022-09-06 北京瑞莱智慧科技有限公司 Artificial intelligence safety target range content recommendation method, device and storage medium
CN115086307A (en) * 2022-08-23 2022-09-20 南京赛宁信息技术有限公司 Network shooting range data transmission method and system
CN115190042A (en) * 2022-06-16 2022-10-14 南京赛宁信息技术有限公司 Network target range target access state detection system and method
CN115277217A (en) * 2022-07-29 2022-11-01 软极网络技术(北京)有限公司 System for constructing heterogeneous network target range virtual network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532981A (en) * 2013-10-31 2014-01-22 中国科学院信息工程研究所 Identity escrow and authentication cloud resource access control system and method for multiple tenants
CN104811335A (en) * 2015-03-26 2015-07-29 华迪计算机集团有限公司 Method for realizing network target range system and network target range management system
US20170163627A1 (en) * 2015-12-07 2017-06-08 Telia Company Ab Network authentication
CN109286611A (en) * 2018-08-24 2019-01-29 赛尔网络有限公司 A kind of network target range cloud platform system, construction method, equipment and medium
CN111711557A (en) * 2020-08-18 2020-09-25 北京赛宁网安科技有限公司 Remote access system and method for network target range users

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532981A (en) * 2013-10-31 2014-01-22 中国科学院信息工程研究所 Identity escrow and authentication cloud resource access control system and method for multiple tenants
CN104811335A (en) * 2015-03-26 2015-07-29 华迪计算机集团有限公司 Method for realizing network target range system and network target range management system
US20170163627A1 (en) * 2015-12-07 2017-06-08 Telia Company Ab Network authentication
CN109286611A (en) * 2018-08-24 2019-01-29 赛尔网络有限公司 A kind of network target range cloud platform system, construction method, equipment and medium
CN111711557A (en) * 2020-08-18 2020-09-25 北京赛宁网安科技有限公司 Remote access system and method for network target range users

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115190042A (en) * 2022-06-16 2022-10-14 南京赛宁信息技术有限公司 Network target range target access state detection system and method
CN115190042B (en) * 2022-06-16 2023-09-08 南京赛宁信息技术有限公司 Network target range target access state detection system and method
CN115277217A (en) * 2022-07-29 2022-11-01 软极网络技术(北京)有限公司 System for constructing heterogeneous network target range virtual network
CN115277217B (en) * 2022-07-29 2024-01-26 软极网络技术(北京)有限公司 Construction system of foreign domain network target range virtual network
CN115022098A (en) * 2022-08-09 2022-09-06 北京瑞莱智慧科技有限公司 Artificial intelligence safety target range content recommendation method, device and storage medium
CN115022098B (en) * 2022-08-09 2022-11-18 北京瑞莱智慧科技有限公司 Artificial intelligence safety target range content recommendation method, device and storage medium
CN115086307A (en) * 2022-08-23 2022-09-20 南京赛宁信息技术有限公司 Network shooting range data transmission method and system
CN115086307B (en) * 2022-08-23 2022-11-22 南京赛宁信息技术有限公司 Network target range data transmission method and system

Also Published As

Publication number Publication date
CN114422201B (en) 2022-11-08

Similar Documents

Publication Publication Date Title
CN114422201B (en) Network target range large-scale user remote access method and system
Liu et al. FL-GUARD: A detection and defense system for DDoS attack in SDN
CN107820043B (en) Control method, device and system of video monitoring system
CN103404095A (en) Systems and methods for group bandwidth management in a communication systems network
CN110519306B (en) Equipment access control method and device of Internet of things
CN104219218A (en) Active safety defense method and active safety defense device
CN103684922A (en) Outlet information privacy checking detection platform system based on SDN (self-defending network) and detection method
CN106534216B (en) Server deployment system
CN102984031B (en) Method and device for allowing encoding equipment to be safely accessed to monitoring and control network
CN110855707A (en) Internet of things communication pipeline safety control system and method
CN106254312B (en) method and device for achieving server attack prevention through virtual machine heterogeneous
Jung et al. Anomaly Detection in Smart Grids based on Software Defined Networks.
EP3499818B9 (en) Method and device for load processing
CN110213171B (en) Data flow monitoring and control method based on alliance chain technology
CN102647435A (en) Police network monitoring system
CN116647572B (en) Access endpoint switching method, device, electronic equipment and storage medium
WO2008151491A1 (en) A p2p network system and application method thereof
CN102404114A (en) Monitoring method and system both for Web service
CN116319803A (en) Cloud edge cooperative distributed API calling method and system
KR102020986B1 (en) Trust network system based block-chain
CN111327602A (en) Equipment access processing method, equipment and storage medium
CN106603624B (en) Data mining system and implementation method thereof
CN113055427B (en) Service-based server cluster access method and device
CN108366002A (en) A kind of multi-action computer network guard system
Qiu et al. A software-defined security framework for power IoT cloud-edge environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100094 103, building 6, yard 9, FengHao East Road, Haidian District, Beijing

Patentee after: Yongxin Zhicheng Technology Group Co.,Ltd.

Address before: 100094 103, building 6, yard 9, FengHao East Road, Haidian District, Beijing

Patentee before: BEIJING YONGXIN ZHICHENG TECHNOLOGY CO.,LTD.