CN114944958A - Processing method and device of access request and electronic equipment - Google Patents

Processing method and device of access request and electronic equipment Download PDF

Info

Publication number
CN114944958A
CN114944958A CN202210669771.4A CN202210669771A CN114944958A CN 114944958 A CN114944958 A CN 114944958A CN 202210669771 A CN202210669771 A CN 202210669771A CN 114944958 A CN114944958 A CN 114944958A
Authority
CN
China
Prior art keywords
access request
target
firewall
access
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210669771.4A
Other languages
Chinese (zh)
Other versions
CN114944958B (en
Inventor
崔昭华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Aixin Yuanzhi Technology Co ltd
Original Assignee
Xi'an Aixin Yuanzhi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Aixin Yuanzhi Technology Co ltd filed Critical Xi'an Aixin Yuanzhi Technology Co ltd
Priority to CN202210669771.4A priority Critical patent/CN114944958B/en
Publication of CN114944958A publication Critical patent/CN114944958A/en
Application granted granted Critical
Publication of CN114944958B publication Critical patent/CN114944958B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

本申请提出一种访问请求的处理方法、装置和电子设备,其中,方法包括接收用于访问目标对象的访问请求;从防火墙内部的多个候选请求处理分区中,确定访问请求对应的目标请求处理分区;获取目标请求处理分区的安全访问地址段,并根据安全访问地址段对访问请求进行拦截。本申请中,实现了对目标对象的安全访问,以及对访问请求的分流处理,提高了防火墙对访问请求的处理效率,进而提高了对防火墙性能的验证分析效率,实现了对防火墙性能验证的可管理,优化了验证方法以及验证效果。

Figure 202210669771

The present application provides a method, device and electronic device for processing an access request, wherein the method includes receiving an access request for accessing a target object; determining a target request processing corresponding to the access request from a plurality of candidate request processing partitions inside the firewall Partition; obtain the security access address segment of the target request processing partition, and intercept the access request according to the security access address segment. In the present application, secure access to the target object and the offloading processing of the access request are realized, the processing efficiency of the access request by the firewall is improved, the verification and analysis efficiency of the firewall performance is further improved, and the feasibility of the firewall performance verification is realized. Management, optimized the verification method and verification effect.

Figure 202210669771

Description

访问请求的处理方法、装置和电子设备Access request processing method, device and electronic device

技术领域technical field

本申请涉及数据处理领域,尤其涉及一种访问请求的处理方法、装置和电子设备。The present application relates to the field of data processing, and in particular, to a method, apparatus and electronic device for processing an access request.

背景技术Background technique

随着技术的发展,系统级芯片在产品上的应用范围愈加广泛,为了实现片上系统的安全控制以及对系统中数据的保护,可以在芯片上配置相应地安全防御系统。With the development of technology, the application scope of system-on-chip in products has become more and more extensive. In order to realize the security control of the system-on-chip and the protection of data in the system, a corresponding security defense system can be configured on the chip.

相关技术中,在芯片上配置安全防御系统之后存在可能对芯片的运行性能产生影响,因此,需要对于配置有安全防御系统的芯片的性能进行相关的验证。In the related art, after the security defense system is configured on the chip, the running performance of the chip may be affected. Therefore, it is necessary to perform relevant verification on the performance of the chip configured with the security defense system.

发明内容SUMMARY OF THE INVENTION

本申请的目的旨在至少在一定程度上解决上述技术中的技术问题之一。The purpose of this application is to solve one of the technical problems in the above technologies at least to a certain extent.

本申请第一方面提出了一种访问请求的处理方法,包括:接收用于访问目标对象的访问请求;从防火墙内部的多个候选请求处理分区中,确定访问请求对应的目标请求处理分区;获取目标请求处理分区的安全访问地址段,并根据安全访问地址段对访问请求进行拦截。A first aspect of the present application provides a method for processing an access request, including: receiving an access request for accessing a target object; determining a target request processing partition corresponding to the access request from a plurality of candidate request processing partitions inside a firewall; obtaining The target request processes the security access address segment of the partition, and intercepts the access request according to the security access address segment.

本申请第一方面提出的一种访问请求的处理方法,还具备如下技术特征,包括:A method for processing an access request proposed in the first aspect of the present application also has the following technical features, including:

根据本申请一实施例,根据安全访问地址段对访问请求进行拦截,包括:获取访问请求对目标对象的目标访问地址;根据安全访问地址段和目标访问地址,识别访问请求是否为非法访问请求;响应于识别到访问请求为非法访问请求,对非法访问请求进行拦截。According to an embodiment of the present application, intercepting the access request according to the security access address segment includes: obtaining the target access address of the access request to the target object; identifying whether the access request is an illegal access request according to the security access address segment and the target access address; In response to identifying that the access request is an illegal access request, the illegal access request is intercepted.

根据本申请一实施例,根据安全访问地址段和目标访问地址,识别访问请求是否为非法访问请求,包括:响应于目标访问地址属于目标请求处理分区的安全访问地址段,确定访问请求为安全访问请求;响应于目标访问地址不属于目标请求处理分区的安全访问地址段,确定访问请求为非法访问请求。According to an embodiment of the present application, identifying whether the access request is an illegal access request according to the security access address segment and the target access address includes: in response to the target access address belonging to the security access address segment of the target request processing partition, determining that the access request is a security access request; in response to the target access address not belonging to the security access address segment of the target request processing partition, determine that the access request is an illegal access request.

根据本申请一实施例,从防火墙内部的多个候选请求处理分区中,确定访问请求的目标请求处理分区,包括:获取候选请求处理分区的区域标识和测试设备的设备标识之间的标识对应关系,其中,测试设备用于发起对目标对象的访问请求;从访问请求携带的信息中,确定发起访问请求的目标测试设备的目标设备标识;根据标识对应关系,确定目标设备标识对应的目标区域标识,并将目标区域标识对应的候选请求处理分区确定为处理访问请求的目标请求处理分区。According to an embodiment of the present application, determining a target request processing partition of an access request from a plurality of candidate request processing partitions inside the firewall includes: obtaining an identifier correspondence between the area identifiers of the candidate request processing partitions and the device identifiers of the test equipment , wherein the test device is used to initiate an access request to the target object; from the information carried in the access request, determine the target device identifier of the target test device that initiates the access request; according to the identifier correspondence, determine the target area identifier corresponding to the target device identifier , and determine the candidate request processing partition corresponding to the target area identifier as the target request processing partition for processing the access request.

根据本申请一实施例,方法还包括:对防火墙和目标对象进行性能评估,并分别获取防火墙的第一性能评估结果和目标对象的第二性能评估结果;根据第一性能评估结果和第二性能评估结果,对目标系统的性能进行评估。According to an embodiment of the present application, the method further includes: performing performance evaluation on the firewall and the target object, and respectively obtaining a first performance evaluation result of the firewall and a second performance evaluation result of the target object; according to the first performance evaluation result and the second performance evaluation result Evaluate the results to evaluate the performance of the target system.

根据本申请一实施例,获取防火墙的第一性能评估结果,包括:从访问请求的发起量中,确定非法访问请求的发起占比;监听防火墙对非法访问请求的拦截量,并获取拦截量在访问请求的接收量中的拦截占比;根据发起占比和拦截占比对防火墙的性能进行评估,以获取防火墙的第一性能评估结果。According to an embodiment of the present application, obtaining the first performance evaluation result of the firewall includes: determining the proportion of initiated illegal access requests from the initiated amount of access requests; monitoring the interception amount of illegal access requests by the firewall, and obtaining the interception amount in The proportion of interception in the received volume of access requests; the performance of the firewall is evaluated according to the proportion of initiation and interception to obtain the first performance evaluation result of the firewall.

根据本申请一实施例,根据发起占比和拦截占比对防火墙的性能进行评估,以获取防火墙的第一性能评估结果,包括:获取发起占比和拦截占比的误差值;响应于误差值属于设定误差范围,确定防火墙的第一性能评估结果为合格。According to an embodiment of the present application, the performance of the firewall is evaluated according to the proportion of initiation and the proportion of interception to obtain the first performance evaluation result of the firewall, including: obtaining the error value of the proportion of initiation and the proportion of interception; responding to the error value It belongs to the set error range, and it is determined that the first performance evaluation result of the firewall is qualified.

根据本申请一实施例,获取目标对象的第二性能评估结果,包括:获取目标对象对防火墙未拦截的访问请求的响应延迟时间;根据响应延迟时间对目标对象的性能进行评估,以获取目标对象的第二性能评估结果。According to an embodiment of the present application, obtaining the second performance evaluation result of the target object includes: obtaining the response delay time of the target object to the access request not intercepted by the firewall; evaluating the performance of the target object according to the response delay time to obtain the target object The results of the second performance evaluation.

根据本申请一实施例,根据响应延迟时间对目标对象的性能进行评估,以获取目标对象的第二性能评估结果,包括:获取目标对象的响应延迟的门限时间;响应于响应延迟时间小于或者等于门限时间,判定目标对象的第二性能评估结果为合格。According to an embodiment of the present application, evaluating the performance of the target object according to the response delay time to obtain the second performance evaluation result of the target object includes: obtaining the threshold time of the response delay of the target object; Threshold time, it is determined that the second performance evaluation result of the target object is qualified.

根据本申请一实施例,根据第一性能评估结果和第二性能评估结果,对目标系统的性能进行评估,包括:响应于第一性能评估结果指示防火墙性能合格,且第二性能评估结果指示目标对象性能合格,判定目标系统性能评估结果为合格。According to an embodiment of the present application, evaluating the performance of the target system according to the first performance evaluation result and the second performance evaluation result includes: indicating that the firewall performance is qualified in response to the first performance evaluation result, and the second performance evaluation result indicates the target system If the performance of the object is qualified, it is determined that the performance evaluation result of the target system is qualified.

本申请第二方面提出了一种访问请求的处理装置,包括:接收模块,用于接收用于访问目标对象的访问请求;确定模块,用于从防火墙内部的多个候选请求处理分区中,确定访问请求对应的目标请求处理分区;处理模块,用于获取目标请求处理分区的安全访问地址段,并根据安全访问地址段对访问请求进行拦截。A second aspect of the present application proposes an access request processing device, comprising: a receiving module for receiving an access request for accessing a target object; a determining module for determining from multiple candidate request processing partitions inside the firewall The target request processing partition corresponding to the access request; the processing module is used to obtain the security access address segment of the target request processing partition, and intercept the access request according to the security access address segment.

本申请第二方面提出的一种访问请求的处理装置,还具备如下技术特征,包括:The device for processing an access request proposed in the second aspect of the present application also has the following technical features, including:

根据本申请一实施例,处理模块,还用于:获取访问请求对目标对象的目标访问地址;根据安全访问地址段和目标访问地址,识别访问请求是否为非法访问请求;响应于识别到访问请求为非法访问请求,对非法访问请求进行拦截。According to an embodiment of the present application, the processing module is further configured to: obtain the target access address of the access request to the target object; identify whether the access request is an illegal access request according to the security access address segment and the target access address; in response to identifying the access request For illegal access requests, the illegal access requests are intercepted.

根据本申请一实施例,处理模块,还用于:响应于目标访问地址属于目标请求处理分区的安全访问地址段,确定访问请求为安全访问请求;响应于目标访问地址不属于目标请求处理分区的安全访问地址段,确定访问请求为非法访问请求。According to an embodiment of the present application, the processing module is further configured to: in response to the target access address belonging to the security access address segment of the target request processing partition, determine that the access request is a security access request; in response to the target access address not belonging to the target request processing partition The security access address segment determines that the access request is an illegal access request.

根据本申请一实施例,确定模块,还用于:获取候选请求处理分区的区域标识和测试设备的设备标识之间的标识对应关系,其中,测试设备用于发起对目标对象的访问请求;从访问请求携带的信息中,确定发起访问请求的目标测试设备的目标设备标识;根据标识对应关系,确定目标设备标识对应的目标区域标识,并将目标区域标识对应的候选请求处理分区确定为处理访问请求的目标请求处理分区。According to an embodiment of the present application, the determination module is further configured to: obtain the identification correspondence between the area identification of the candidate request processing partition and the device identification of the test equipment, wherein the test equipment is used to initiate an access request to the target object; In the information carried by the access request, determine the target device identifier of the target test device that initiates the access request; according to the identifier correspondence, determine the target area identifier corresponding to the target device identifier, and determine the candidate request processing partition corresponding to the target area identifier as processing access. The target request processing partition of the request.

根据本申请一实施例,装置还包括,评估模块,用于:对防火墙和目标对象进行性能评估,并分别获取防火墙的第一性能评估结果和目标对象的第二性能评估结果;根据第一性能评估结果和第二性能评估结果,对目标系统的性能进行评估。According to an embodiment of the present application, the apparatus further includes an evaluation module configured to: perform performance evaluation on the firewall and the target object, and obtain a first performance evaluation result of the firewall and a second performance evaluation result of the target object respectively; The evaluation result and the second performance evaluation result are used to evaluate the performance of the target system.

根据本申请一实施例,评估模块,还用于:从访问请求的发起量中,确定非法访问请求的发起占比;监听防火墙对非法访问请求的拦截量,并获取拦截量在访问请求的接收量中的拦截占比;根据发起占比和拦截占比对防火墙的性能进行评估,以获取防火墙的第一性能评估结果。According to an embodiment of the present application, the evaluation module is further configured to: determine the proportion of illegal access requests initiated from the initiated amount of access requests; monitor the interception amount of illegal access requests by the firewall, and obtain the interception amount in the reception of the access request The percentage of interception in the volume; the performance of the firewall is evaluated according to the percentage of initiation and the percentage of interception to obtain the first performance evaluation result of the firewall.

根据本申请一实施例,评估模块,还用于:获取发起占比和拦截占比的误差值;响应于误差值属于设定误差范围,确定防火墙的第一性能评估结果为合格。According to an embodiment of the present application, the evaluation module is further configured to: obtain the error value of the initiation ratio and the interception ratio; and determine that the first performance evaluation result of the firewall is qualified in response to the error value belonging to the set error range.

根据本申请一实施例,评估模块,还用于:获取目标对象对防火墙未拦截的访问请求的响应延迟时间;根据响应延迟时间对目标对象的性能进行评估,以获取目标对象的第二性能评估结果。According to an embodiment of the present application, the evaluation module is further configured to: obtain the response delay time of the target object to the access request not intercepted by the firewall; and evaluate the performance of the target object according to the response delay time to obtain the second performance evaluation of the target object result.

根据本申请一实施例,评估模块,还用于:获取目标对象的响应延迟的门限时间;响应于响应延迟时间小于或者等于门限时间,判定目标对象的第二性能评估结果为合格。According to an embodiment of the present application, the evaluation module is further configured to: obtain the response delay threshold time of the target object; and determine that the second performance evaluation result of the target object is qualified in response to the response delay time being less than or equal to the threshold time.

根据本申请一实施例,评估模块,还用于:响应于第一性能评估结果指示防火墙性能合格,且第二性能评估结果指示目标对象性能合格,判定目标系统性能评估结果为合格。According to an embodiment of the present application, the evaluation module is further configured to: in response to the first performance evaluation result indicating that the firewall's performance is qualified, and the second performance evaluation result indicating that the target object's performance is qualified, determine that the target system performance evaluation result is qualified.

本申请第三方面实施例提出了一种电子设备,包括:至少一个处理器;以及与至少一个处理器通信连接的存储器;其中,存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器能够执行本申请第一方面提出的访问请求的处理方法。An embodiment of the third aspect of the present application provides an electronic device, comprising: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by at least one processor. One processor executes, so that at least one processor can execute the access request processing method proposed in the first aspect of the present application.

本申请第四方面实施例提出了一种存储有计算机指令的非瞬时计算机可读存储介质,计算机指令用于使计算机执行本申请第一方面提出的访问请求的处理方法。An embodiment of the fourth aspect of the present application provides a non-transitory computer-readable storage medium storing computer instructions, where the computer instructions are used to cause a computer to execute the access request processing method provided in the first aspect of the present application.

本申请第五方面实施例提出了一种计算机程序产品,当计算机程序产品中的指令处理器执行时,执行本申请第一方面提出的访问请求的处理方法。The embodiment of the fifth aspect of the present application provides a computer program product. When an instruction processor in the computer program product is executed, the method for processing an access request provided in the first aspect of the present application is executed.

本申请提出的访问请求的处理方法及装置,接收目标对象的访问请求,并从防火墙内部划分的多个候选请求处理分区中,确定访问请求对应的目标请求处理分区,进一步地,根据目标请求处理分区的安全访问地址段,对访问请求进行识别判断,对确定携带非安全访问地址的访问请求进行拦截处理。本申请中,通过防火墙对目标对象的访问请求进行识别拦截,实现了对目标对象的安全访问,对防火墙内部进行多个候选请求处理分区的划分,实现了对访问请求的分流处理,提高了防火墙对访问请求的处理效率,进而提高了对防火墙性能的验证分析效率,实现了对防火墙性能验证的可管理,优化了验证方法以及验证效果。The access request processing method and device proposed in the present application receive the access request of the target object, determine the target request processing partition corresponding to the access request from a plurality of candidate request processing partitions divided inside the firewall, and further, process the request according to the target request The security access address segment of the partition identifies and judges access requests, and intercepts access requests determined to carry non-secure access addresses. In the present application, the access request of the target object is identified and intercepted by the firewall, the secure access to the target object is realized, and the interior of the firewall is divided into multiple candidate request processing partitions, so as to realize the branch processing of the access request, and improve the firewall. The processing efficiency of access requests improves the efficiency of verification and analysis of firewall performance, realizes the manageability of firewall performance verification, and optimizes verification methods and verification effects.

本申请附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本申请的实践了解到。Additional aspects and advantages of the present application will be set forth, in part, in the following description, and in part will be apparent from the following description, or learned by practice of the present application.

附图说明Description of drawings

本申请上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:The above and/or additional aspects and advantages of the present application will become apparent and readily understood from the following description of embodiments taken in conjunction with the accompanying drawings, wherein:

图1为本申请一实施例的访问请求的处理方法的流程示意图;1 is a schematic flowchart of a method for processing an access request according to an embodiment of the present application;

图2为本申请另一实施例的访问请求的处理方法的流程示意图;2 is a schematic flowchart of a method for processing an access request according to another embodiment of the present application;

图3为本申请另一实施例的访问请求的处理方法的流程示意图;3 is a schematic flowchart of a method for processing an access request according to another embodiment of the present application;

图4为本申请另一实施例的访问请求的处理方法的流程示意图;4 is a schematic flowchart of a method for processing an access request according to another embodiment of the present application;

图5为本申请一实施例的访问请求的处理装置的结构示意图;FIG. 5 is a schematic structural diagram of an apparatus for processing an access request according to an embodiment of the present application;

图6是本申请一实施例的电子设备的框图。FIG. 6 is a block diagram of an electronic device according to an embodiment of the present application.

具体实施方式Detailed ways

下面详细描述本申请的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本申请,而不能理解为对本申请的限制。The following describes in detail the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are exemplary, and are intended to be used to explain the present application, but should not be construed as a limitation to the present application.

下面参考附图描述本申请实施例的访问请求的处理方法、装置、电子设备及存储介质。The following describes an access request processing method, apparatus, electronic device, and storage medium according to the embodiments of the present application with reference to the accompanying drawings.

图1为本申请一实施例的访问请求的处理方法的流程示意图,如图1所示,该方法包括:FIG. 1 is a schematic flowchart of a method for processing an access request according to an embodiment of the present application. As shown in FIG. 1 , the method includes:

S101,接收用于访问目标对象的访问请求。S101. Receive an access request for accessing a target object.

实现中,系统级芯片(System on Chip,SOC)存在安全控制和安全访问的需求,其中,可以在SOC芯片上设置对应的安全控制系统,从而实现对SOC芯片上的相关功能和相关信息的保护。In the implementation, there is a need for security control and security access in the System on Chip (SOC), wherein a corresponding security control system can be set on the SOC chip, so as to realize the protection of related functions and related information on the SOC chip. .

可选地,可以在SOC芯片的总信息接收的端口处设置对应的安全控制系统,还可以在SOC芯片上功能模块的信息接收端口处设置对应的安全控制系统。Optionally, a corresponding security control system may be set at the port for receiving the total information of the SOC chip, and a corresponding security control system may also be set at the information receiving port of the functional module on the SOC chip.

其中,可以在SOC芯片的功能模块的信息接收端口处设置防火墙,从而实现对功能模块的保护和安全控制。Wherein, a firewall can be set at the information receiving port of the functional module of the SOC chip, so as to realize the protection and security control of the functional module.

可选地,可以将被防火墙保护的对象确定为目标对象。Optionally, the object protected by the firewall may be determined as the target object.

比如,设置目标对象为SOC芯片上的双倍速率同步动态随机存储器(Double DataRate Synchronous Dynamic Random Access Memory,DDR SDRAM),可以为DDR存储系统配置对应的防火墙,从而实现对DDR存储系统中存储的信息的保护。For example, if the target object is set to the Double DataRate Synchronous Dynamic Random Access Memory (DDR SDRAM) on the SOC chip, the corresponding firewall can be configured for the DDR storage system, so as to realize the information stored in the DDR storage system. protection of.

在一些实现中,相较于未配置防火墙的目标对象,配置有防火墙的目标对象,其性能存在可能受到一定程度的影响。In some implementations, the performance of a target object configured with a firewall may be affected to a certain extent compared to a target object without a firewall configured.

因此,为了保证配置有防火墙的目标对象的运行性能,可以在配置防火墙之后对目标对象的性能进行相关的验证以及分析。Therefore, in order to ensure the running performance of the target object configured with the firewall, the performance of the target object can be verified and analyzed after the firewall is configured.

相应地,为了实现防火墙对目标对象的安全保护,在为目标对象配置防火墙之后,还可以对防火墙的拦截保护性能进行相关的验证以及分析处理。Correspondingly, in order to realize the security protection of the target object by the firewall, after configuring the firewall for the target object, the relevant verification and analysis processing of the interception protection performance of the firewall can also be performed.

本申请实施例中,可以为配置有防火墙的目标对象搭建对应的验证环境,构建对应的测试用例,进而实现对防火墙以及配置有防火墙的目标对象的性能验证。In this embodiment of the present application, a corresponding verification environment can be established for a target object configured with a firewall, and a corresponding test case can be constructed, thereby realizing performance verification of the firewall and the target object configured with the firewall.

可选地,可以向配置有防火墙的目标对象发送访问请求,通过防火墙对访问请求的相关处理信息实现对防火墙的性能验证以及分析,相应地,通过目标对象对访问请求的响应的相关信息,实现对配置有防火墙的目标对象的性能的验证分析。Optionally, an access request can be sent to a target object configured with a firewall, and the performance verification and analysis of the firewall can be realized through the relevant processing information of the firewall to the access request. A validated analysis of the performance of a target object configured with a firewall.

实现中,防火墙通过相关的识别和拦截的功能,实现对目标对象的安全保护,因此,该访问请求可以由防火墙先行接收。In the implementation, the firewall realizes the security protection of the target object through the relevant identification and interception functions, so the access request can be received by the firewall in advance.

其中,防火墙存在对应的通路端口,通过通路端口配置的信息接收的相关功能,实现防火墙对访问请求的接收。The firewall has a corresponding access port, and the access request is received by the firewall through the related function of receiving information configured by the access port.

可选地,可以通过访问请求的发起方与防火墙之间的总线协议(AdvancedeXtensible Interface,AXI),实现访问请求的发送以及防火墙对于访问请求的接收。Optionally, the sending of the access request and the receiving of the access request by the firewall may be implemented through a bus protocol (Advanced eXtensible Interface, AXI) between the initiator of the access request and the firewall.

S102,从防火墙内部的多个候选请求处理分区中,确定访问请求对应的目标请求处理分区。S102, from a plurality of candidate request processing partitions inside the firewall, determine a target request processing partition corresponding to the access request.

本申请实施例中,防火墙可以通过其内部的访问请求处理区域实现对访问请求的拦截处理,其中,可以对防火墙内部的设定的访问请求处理区域进行划分,获取划分后的多个划分后的处理区域,并将其确定为防火墙内部的多个候选请求处理分区。In the embodiment of the present application, the firewall may implement the interception processing of access requests through its internal access request processing area, wherein the set access request processing area inside the firewall may be divided, and a plurality of divided access request processing areas may be obtained. The processing zone is identified as multiple candidate request processing partitions inside the firewall.

进一步地,为不同的候选请求处理分区配置不同的区域属性信息,使得不同的候选请求处理分区分别存在对应的可处理访问请求,进而实现对接收到的访问请求的分流处理。Further, different area attribute information is configured for different candidate request processing partitions, so that there are corresponding processable access requests in different candidate request processing partitions, thereby realizing the offload processing of the received access requests.

可选地,可以通过验证环境中的顶层模块(tb_top模块)实现候选请求处理分区的信息配置。比如,可以通过tb_top模块通过设定的方法,将接收到的区域属性信息灌入候选请求处理分区对应的区域属性寄存器中,进而通过区域属性寄存器实现对候选请求处理分区的区域属性信息的配置。Optionally, the information configuration of the candidate request processing partition may be implemented by a top-level module (tb_top module) in the verification environment. For example, the tb_top module can use the setting method to pour the received area attribute information into the area attribute register corresponding to the candidate request processing partition, and then realize the configuration of the area attribute information of the candidate request processing partition through the area attribute register.

在一些实现中,候选请求处理分区的区域属性寄存器的信息可以是静态信息,因此,可以通过设定方法将全部的候选请求处理分区的区域属性信息灌入区域属性寄存器,从而实现对防火墙内部的全部的候选请求处理分区的区域属性信息的批量配置。In some implementations, the information of the area attribute register of the candidate request processing partition may be static information. Therefore, the area attribute information of all the candidate request processing partitions can be filled into the area attribute register through the setting method, so as to realize the internal control of the firewall. All candidate requests process the batch configuration of the zone attribute information of the partition.

进一步地,可以为每个候选请求处理分区可处理的访问请求配置对应的设定标准,当访问请求满足其中某一个候选请求处理分区对应的设定标准时,即可将该候选请求处理分区作为该访问请求的目标请求处理分区。Further, a corresponding setting standard can be configured for the access request that can be processed by each candidate request processing partition. When the access request satisfies the setting standard corresponding to one of the candidate request processing partitions, the candidate request processing partition can be used as the corresponding setting standard. The target request processing partition of the access request.

比如,针对候选请求处理分区A,其可处理的访问请求存在对应的设定标准B,当接收到的访问请求满足设定标准B时,即可将候选请求处理分区A作为该访问请求的目标请求处理分区。For example, for the candidate request processing partition A, there is a corresponding set standard B for the access requests it can process. When the received access request meets the set standard B, the candidate request processing partition A can be used as the target of the access request Request processing partition.

S103,获取目标请求处理分区的安全访问地址段,并根据安全访问地址段对访问请求进行拦截。S103: Obtain the security access address segment of the target request processing partition, and intercept the access request according to the security access address segment.

本申请实施例中,可以根据目标对象的设定访问地址范围,为防火墙内部的候选请求处理分区配置对应的访问地址片段,作为候选请求处理分区对应的安全访问地址段。In this embodiment of the present application, according to the set access address range of the target object, a corresponding access address segment may be configured for the candidate request processing partition inside the firewall as the security access address segment corresponding to the candidate request processing partition.

进一步地,当候选请求处理分区作为目标请求处理分区对访问请求进行处理时,可以根据其对应的安全访问地址段判断访问请求是否为安全访问请求,进而判断是否对其进行拦截处理。Further, when the candidate request processing partition is used as the target request processing partition to process the access request, it can be judged whether the access request is a security access request according to its corresponding security access address segment, and then it can be judged whether to intercept it.

其中,若访问请求中的访问地址属于目标请求处理分区的安全访问地址段,则可以确定访问请求为安全访问请求,不对其进行拦截处理。Wherein, if the access address in the access request belongs to the security access address segment of the target request processing partition, it can be determined that the access request is a security access request, and the interception processing is not performed.

相应地,若访问请求中的访问地址不属于目标请求处理分区对应的安全访问地址段,则可以将访问请求判定为非安全访问请求,并对其进行拦截。Correspondingly, if the access address in the access request does not belong to the secure access address segment corresponding to the target request processing partition, the access request may be determined as a non-secure access request and intercepted.

本申请提出的访问请求的处理方法,接收目标对象的访问请求,并从防火墙内部划分的多个候选请求处理分区中,确定访问请求对应的目标请求处理分区,进一步地,根据目标请求处理分区的安全访问地址段,对访问请求进行识别判断,对确定携带非安全访问地址的访问请求进行拦截处理。本申请中,通过防火墙对目标对象的访问请求进行识别拦截,实现了对目标对象的安全访问,对防火墙内部进行多个候选请求处理分区的划分,实现了对访问请求的分流处理,提高了防火墙对访问请求的处理效率,进而提高了对防火墙性能的验证分析效率,实现了对防火墙性能验证的可管理,优化了验证方法以及验证效果。The access request processing method proposed in the present application receives the access request of the target object, and determines the target request processing partition corresponding to the access request from a plurality of candidate request processing partitions divided inside the firewall, and further, according to the target request processing partition The secure access address segment identifies and judges access requests, and intercepts access requests determined to carry non-secure access addresses. In the present application, the access request of the target object is identified and intercepted by the firewall, the secure access to the target object is realized, and the interior of the firewall is divided into multiple candidate request processing partitions, so as to realize the branch processing of the access request, and improve the firewall. The processing efficiency of access requests improves the efficiency of verification and analysis of firewall performance, realizes the manageability of firewall performance verification, and optimizes verification methods and verification effects.

上述实施例中,关于访问请求的处理拦截,可结合图2进一步理解,图2为本申请另一实施例的访问请求的处理方法的流程示意图,如图2所示,该方法包括:In the above embodiment, the processing and interception of access requests can be further understood with reference to FIG. 2 , which is a schematic flowchart of a processing method for an access request according to another embodiment of the present application. As shown in FIG. 2 , the method includes:

S201,获取访问请求对目标对象的目标访问地址。S201: Obtain a target access address of the target object of the access request.

本申请实施例中,防火墙可以从接收到的访问请求中,获取访问请求的发起方对目标对象的意向访问地址,并将该访问地址确定为访问请求的发起方对目标对象进行访问的目标访问地址。In this embodiment of the present application, the firewall may obtain the intended access address of the initiator of the access request to the target object from the received access request, and determine the access address as the target access for the initiator of the access request to access the target object address.

可选地,防火墙可以通过其配置的通路端口,对接收到的访问请求的相信信息进行读取,从而获取其中携带的目标访问地址。Optionally, the firewall may read the trust information of the received access request through its configured channel port, so as to obtain the target access address carried therein.

S202,根据安全访问地址段和目标访问地址,识别访问请求是否为非法访问请求。S202, according to the security access address segment and the target access address, identify whether the access request is an illegal access request.

实现中,对目标对象进行访问的访问请求中,存在可能出现非法访问请求,在非法访问请求成功访问了目标对象的场景下,存在可能对目标对象上存储的信息的安全造成一定程度的影响。In the implementation, there may be illegal access requests in the access requests for accessing the target object. In the scenario where the illegal access request successfully accesses the target object, there may be a certain degree of impact on the security of the information stored on the target object.

比如,设定目标对象为SOC芯片上的存储系统,则在非法访问请求对存储系统成功访问的场景下,存在可能出现存储系统的信息泄露,影响了存储系统的信息安全。For example, if the target object is the storage system on the SOC chip, in the scenario where an illegal access request successfully accesses the storage system, there may be information leakage of the storage system, which affects the information security of the storage system.

在该场景下,可以通过配置的防火墙对非法访问请求进行拦截,避免非法访问请求对目标对象的成功访问,因此,为了实现对防火墙的拦截性能的有效验证,可以在防火墙接收到的访问请求中配置设定比例的非法访问请求。In this scenario, the illegal access request can be intercepted by the configured firewall to avoid the illegal access request from successfully accessing the target object. Therefore, in order to effectively verify the interception performance of the firewall, the access request received by the firewall can be Configure a set percentage of illegal access requests.

可选地,可以获取非法访问请求对应的判断标准,并将接收到的访问请求与设定的判断标准进行对比,根据对比结果实现非法访问请求的识别判断。Optionally, the judgment criterion corresponding to the illegal access request may be acquired, the received access request is compared with the set judgment criterion, and the identification and judgment of the illegal access request is realized according to the comparison result.

其中,可以根据访问地址设定非法访问请求的判断标准。Wherein, the judgment standard of the illegal access request can be set according to the access address.

比如,可以分别获取访问请求中的目标访问地址,以及访问请求对应的目标请求处理分区对应的安全访问地址段,并根据目标访问地址与安全访问地址段之间的关系,判断访问请求是否为非法访问请求。For example, the target access address in the access request and the security access address segment corresponding to the target request processing partition corresponding to the access request can be obtained separately, and whether the access request is illegal is determined according to the relationship between the target access address and the security access address segment. access request.

其中,响应于目标访问地址属于目标请求处理分区的安全访问地址段,确定访问请求为安全访问请求。Wherein, in response to the target access address belonging to the security access address segment of the target request processing partition, it is determined that the access request is a security access request.

可以理解为,当目标访问地址属于安全访问地址段内的访问地址时,可以判断,该目标访问地址为目标对象的安全访问地址,基于该目标访问地址对目标对象发起的访问请求,不会对目标对象的信息安全产生影响,因此,可以将携带有该目标访问地址的访问请求确定为安全访问请求。It can be understood that when the target access address belongs to the access address in the security access address segment, it can be judged that the target access address is the security access address of the target object, and the access request initiated to the target object based on the target access address will not The information security of the target object is affected, therefore, the access request carrying the target access address can be determined as a secure access request.

相应地,响应于目标访问地址不属于目标请求处理分区的安全访问地址段,确定访问请求为非法访问请求。Accordingly, in response to the target access address not belonging to the secure access address segment of the target request processing partition, it is determined that the access request is an illegal access request.

可以理解为,当目标访问地址不属于目标请求处理分区对应的安全访问地址段时,可以判断,该目标访问地址为目标对象的不正常访问地址,基于该目标访问地址对目标对象进行访问时,存在可能对目标对象的信息安全产生影响,因此,可以将携带有该目标访问地址的访问请求确定为非法访问请求。It can be understood that when the target access address does not belong to the security access address segment corresponding to the target request processing partition, it can be judged that the target access address is the abnormal access address of the target object, and when accessing the target object based on the target access address, There may be an impact on the information security of the target object, therefore, the access request carrying the target access address can be determined as an illegal access request.

S203,响应于识别到访问请求为非法访问请求,对非法访问请求进行拦截。S203, in response to identifying that the access request is an illegal access request, intercept the illegal access request.

为了避免非法访问请求对目标对象的信息安全的影响,防火墙可以将确定的非法访问请求进行拦截处理,避免其对目标对象的访问,从而实现对目标对象的安全保护。In order to avoid the impact of illegal access requests on the information security of the target object, the firewall can intercept the determined illegal access request to avoid its access to the target object, thereby realizing the security protection of the target object.

比如,设定访问请求对应的目标请求处理分区A的安全访问地址段为a1至a8,当访问请求携带的目标访问地址为a3时,可以判断,目标访问地址a3属于目标请求处理分区A的安全访问地址段,则该访问请求不是非法访问请求。For example, set the security access address segment of the target request processing partition A corresponding to the access request as a1 to a8. When the target access address carried in the access request is a3, it can be determined that the target access address a3 belongs to the security of the target request processing partition A. access address segment, the access request is not an illegal access request.

相应地,当访问请求携带的目标访问地址为a9时,可以判断,目标访问地址a9不属于目标请求处理分区A的安全访问地址段,则可以确定该访问请求为非法访问请求,并对其进行拦截处理。Correspondingly, when the target access address carried by the access request is a9, it can be judged that the target access address a9 does not belong to the security access address segment of the target request processing partition A, then it can be determined that the access request is an illegal access request, and the Intercept processing.

本申请提出的访问请求的处理方法,获取访问请求对目标对象进行访问的目标访问地址,以及,获取访问请求对应的目标请求处理分区的安全访问地址段,根据目标访问地址和安全访问地址段,判断访问请求是否为非法访问请求。进一步地,当确定访问请求为非法访问请求时,即对访问请求进行拦截处理。本申请中,通过防火墙对目标对象的访问请求进行识别拦截,实现了对目标对象的安全访问,通过防火墙内部的候选请求处理分区对访问请求进行处理,提高了防火墙对访问请求的处理效率,通过控制访问请求接收到的非法访问请求的设定比例,进而实现对防火墙性能的有效验证,优化了验证方法以及验证效果。The method for processing an access request proposed by the present application includes obtaining a target access address for accessing a target object by the access request, and obtaining the security access address segment of the target request processing partition corresponding to the access request. According to the target access address and the security access address segment, Determine whether the access request is an illegal access request. Further, when it is determined that the access request is an illegal access request, the access request is intercepted. In this application, the access request of the target object is identified and intercepted by the firewall, so as to realize the secure access to the target object, and the access request is processed by the candidate request processing partition inside the firewall, which improves the processing efficiency of the access request by the firewall. The set proportion of illegal access requests received by the access request is controlled, so as to realize the effective verification of the firewall performance, and optimize the verification method and verification effect.

上述实施例中,关于目标请求处理分区的确定,可结合图3进一步理解,图3为本申请另一实施例的访问请求的处理方法的流程示意图,如图3所示,该方法包括:In the above embodiment, the determination of the target request processing partition can be further understood with reference to FIG. 3 , which is a schematic flowchart of a processing method for an access request according to another embodiment of the present application. As shown in FIG. 3 , the method includes:

S301,获取候选请求处理分区的区域标识和测试设备的设备标识之间的标识对应关系,其中,测试设备用于发起对目标对象的访问请求。S301: Acquire the identification correspondence between the area identification of the candidate request processing partition and the device identification of the test device, where the test device is used to initiate an access request to the target object.

在一些实现中,可以为防火墙以及配置有防火墙的目标对象配置对应的访问请求发起设备,并通过控制该部分设备实现对目标对象的访问请求的发起。In some implementations, a corresponding access request initiating device may be configured for the firewall and the target object configured with the firewall, and the access request to the target object is initiated by controlling the part of the device.

其中,为了实现防火墙的性能验证的可管控,可以为该部分访问请求发起设备配置与防火墙内部的区域属性信息匹配的设备属性信息,从而使得访问请求发起设备在防火墙内部存在对应的候选请求处理分区。Among them, in order to realize the controllability of the performance verification of the firewall, the device attribute information that matches the area attribute information inside the firewall can be configured for this part of the access request initiating device, so that the access request initiating device has a corresponding candidate request processing partition inside the firewall .

进一步地,可以将发起访问请求的设备确定为防火墙以及配置有防火墙的目标对象的性能验证的测试设备。Further, the device that initiates the access request may be determined as a test device for the performance verification of the firewall and the target object configured with the firewall.

可选地,测试设备对目标对象的访问请求的发起可以通过验证环境中的测试激励生成器控制。其中,测试激励生成器可以根据防火墙内部的候选请求处理分区配置的区域属性信息,生成测试设备对应的测试激励序列,并通过测试激励序列为对应测试设备配置发起访问请求所需的各项信息。Optionally, the initiation of a test device's access request to the target object may be controlled by a test stimulus generator in the verification environment. The test stimulus generator can process the area attribute information of the partition configuration according to the candidate request inside the firewall, generate a test stimulus sequence corresponding to the test device, and configure the corresponding test device through the test stimulus sequence to initiate an access request.

因此,测试设备与防火墙内部的候选请求处理分区之间存在设定的对应关系。Therefore, there is a set correspondence between the test equipment and the candidate request processing partitions inside the firewall.

本申请实施例中,测试设备存在对应的设备标识,候选请求处理分区存在对应的区域标识,因此,可以通过获取设备标识和区域标识之间的对应关系,从而确定测试设备与候选请求处理分区之间的对应关系,从而为测试设备发起的访问请求确定对应的目标请求处理分区。In the embodiment of the present application, the test equipment has a corresponding device identifier, and the candidate request processing partition has a corresponding area identifier. Therefore, the correspondence between the device identifier and the area identifier can be obtained to determine the relationship between the test equipment and the candidate request processing partition. The corresponding relationship between the test equipment to determine the corresponding target request processing partition for the access request initiated by the test device.

可选地,可以在配置防火墙内部划分的候选请求处理分区的区域属性信息时,配置候选请求处理分区的区域标识信息。其中,标识信息可以为数字编号,也可以是其他标识信息,此处不做限定。Optionally, when configuring the area attribute information of the candidate request processing partitions divided inside the firewall, the area identification information of the candidate request processing partitions may be configured. The identification information may be a numerical number or other identification information, which is not limited here.

相应地,测试设备存在对应的设备标识,可以通过设定的方法为每个测试设备设置相关的标识信息,并将每个设备对应的标识信息确定为测试设备的设备标识。Correspondingly, if the test equipment has a corresponding equipment identifier, the relevant identification information can be set for each test equipment through the setting method, and the identification information corresponding to each equipment can be determined as the equipment identifier of the test equipment.

需要说明的是,测试设备的设备标识和/或候选请求处理分区的区域标识具有唯一性,且测试设备的设备标识与候选请求处理分区的区域标识之间一一对应。It should be noted that the device identifier of the test device and/or the area identifier of the candidate request processing partition is unique, and there is a one-to-one correspondence between the device identifier of the test device and the area identifier of the candidate request processing partition.

比如,设定测试设备D与防火墙内部的候选请求处理分区F之间存在设定的对应关系,则测试设备D发起的访问请求可以将候选请求处理分区F作为其对应的目标请求处理分区。For example, if there is a set correspondence between the test device D and the candidate request processing partition F inside the firewall, the access request initiated by the test device D may use the candidate request processing partition F as its corresponding target request processing partition.

也就是说,根据设定的方法构建测试设备和候选请求处理分区之间的关联关系后,测试设备发起的任一访问请求对应的目标请求处理分区,均为与测试设备存在关联关系的候选请求处理分区。That is to say, after the association between the test equipment and the candidate request processing partition is constructed according to the set method, the target request processing partition corresponding to any access request initiated by the test equipment is a candidate request that has an associated relationship with the test equipment. Process partitions.

可选地,可以基于设定条件构建测试设备的设备标识与候选请求处理分区的区域标识之间的对应关系。Optionally, a correspondence relationship between the device identifier of the test device and the area identifier of the candidate request processing partition may be constructed based on the set condition.

其中,可以将具备相同数字信息的设备标识和区域标识,确定为存在对应关系的设备标识和区域标识。Among them, the device identifier and the area identifier having the same digital information can be determined as the device identifier and the area identifier that have a corresponding relationship.

比如,设定测试设备的设备标识分别为D1、D2、D3、……、Dn,候选请求处理分区的区域标识为F1、F2、F3、……、Fn,则设备标识D1与区域标识F1之间存在对应关系,设备标识D2与区域标识F2之间存在对应关系,设备标识D3与区域标识F3之间存在对应关系,设备标识Dn与区域标识Fn之间存在对应关系。For example, if the device identifiers of the test equipment are set to be D1, D2, D3, ..., Dn, and the area identifiers of the candidate request processing partitions are F1, F2, F3, ..., Fn, then the device identifier D1 and the area identifier F1 There is a corresponding relationship between the device identification D2 and the area identification F2, there is a corresponding relationship between the device identification D3 and the area identification F3, and there is a corresponding relationship between the device identification Dn and the area identification Fn.

进一步地,可以将该对应关系确定为测试设备的设备标识与候选请求处理分区的区域标识之间的标识对应关系。Further, the corresponding relationship may be determined as the identification corresponding relationship between the device identification of the test device and the area identification of the candidate request processing partition.

S302,从访问请求携带的信息中,确定发起访问请求的目标测试设备的目标设备标识。S302, from the information carried in the access request, determine the target device identifier of the target test device that initiates the access request.

本申请实施例中,访问请求携带的详细信息中,可以存在发起该访问请求的测试设备的设备标识信息,防火墙可以通过对访问请求的信息读取,获取其中携带的关于发起访问请求的测试设备的相关信息。In this embodiment of the present application, the detailed information carried in the access request may include the device identification information of the test device that initiated the access request, and the firewall may obtain the information about the test device that initiated the access request by reading the information of the access request. related information.

其中,可以将发起访问请求的测试设备确定为该访问请求的目标测试设备,在发起访问请求时,该目标测试设备的目标设备标识信息可以被访问请求携带并被防火墙接收读取。Wherein, the test device that initiates the access request can be determined as the target test device of the access request. When initiating the access request, the target device identification information of the target test device can be carried in the access request and received and read by the firewall.

S303,根据标识对应关系,确定目标设备标识对应的目标区域标识,并将目标区域标识对应的候选请求处理分区确定为处理访问请求的目标请求处理分区。S303: Determine the target area identifier corresponding to the target device identifier according to the identifier correspondence, and determine the candidate request processing partition corresponding to the target area identifier as the target request processing partition for processing the access request.

本申请实施例中,与目标设备标识存在对应关系的区域标识,可以被确定为目标区域标识。In this embodiment of the present application, the area identifier that has a corresponding relationship with the target device identifier may be determined as the target area identifier.

进一步地,根据目标设备标识和目标区域标识之间的标识对应关系,可以确定,目标设备标识对应的测试设备与目标区域标识对应的候选请求处理分区之间存在对应关系。Further, according to the identification correspondence between the target device identification and the target area identification, it can be determined that there is a correspondence between the test equipment corresponding to the target device identification and the candidate request processing partition corresponding to the target area identification.

因此,可以确定,目标测试设备发起的访问请求可以被目标区域标识对应的候选请求处理分区进行识别判断等相关处理。Therefore, it can be determined that the access request initiated by the target test device can be identified and judged by the candidate request processing partition corresponding to the target area identifier.

进一步地,可以将该目标区域标识对应的候选请求处理分区,确定为携带有目标访问地址的访问请求对应的目标请求处理分区。Further, the candidate request processing partition corresponding to the target area identifier may be determined as the target request processing partition corresponding to the access request carrying the target access address.

本申请提出的访问请求的处理方法,获取测试设备的设备标识与候选请求处理分区的区域标识之间的标识对应关系。从接收到的访问请求中,获取发起访问请求的目标测试设备的目标设备标识,根据标识对应关系确定对应的目标区域标识,并根据目标区域标识确定访问请求对应的目标请求处理分区。本申请中,设备标识与区域标识之间存在对应关系,根据标识对应关系,确定访问请求的目标请求处理分区,优化了目标请求处理分区的确认方法,使得测试设备发起的访问请求可以在防火墙内部存在对应的请求处理分区,从而实现对访问请求的分流处理,提高了访问请求的处理效率。The method for processing an access request proposed in the present application acquires the identification correspondence between the device identification of the test equipment and the area identification of the candidate request processing partition. From the received access request, the target device identifier of the target test device that initiates the access request is obtained, the corresponding target area identifier is determined according to the identifier correspondence, and the target request processing partition corresponding to the access request is determined according to the target area identifier. In this application, there is a corresponding relationship between the device identifier and the area identifier. According to the corresponding relationship between the identifiers, the target request processing partition of the access request is determined, and the confirmation method of the target request processing partition is optimized, so that the access request initiated by the test device can be processed inside the firewall. There is a corresponding request processing partition, so as to realize the offload processing of the access request and improve the processing efficiency of the access request.

进一步地,对于防火墙的性能以及配置有防火墙的目标对象的性能验证分析,可以结合图4理解,图4为本申请另一实施例的访问请求的处理方法的流程示意图,如图4所示,该方法包括:Further, for the performance of the firewall and the performance verification analysis of the target object configured with the firewall, it can be understood in conjunction with FIG. 4 , which is a schematic flowchart of a processing method for an access request according to another embodiment of the present application, as shown in FIG. 4 , The method includes:

S401,对防火墙和目标对象进行性能评估,并分别获取防火墙的第一性能评估结果和目标对象的第二性能评估结果。S401. Perform performance evaluation on the firewall and the target object, and obtain a first performance evaluation result of the firewall and a second performance evaluation result of the target object, respectively.

本申请实施例中,可以将防火墙和目标对象组成的系统确定为目标系统,通过对防火墙进行单独的性能评估,以及对目标对象进行单独的性能评估,实现对防火墙和目标对象组成的目标系统的性能评估。In this embodiment of the present application, a system composed of a firewall and a target object may be determined as a target system, and by performing separate performance evaluation on the firewall and performing a separate performance evaluation on the target object, the target system composed of the firewall and the target object can be independently evaluated. performance evaluation.

可选地,可以通过防火墙对访问请求中的非法访问请求的识别和拦截的结果,实现对防火墙的性能评估。Optionally, the performance evaluation of the firewall can be implemented through the results of the firewall's identification and interception of illegal access requests in the access requests.

其中,可以从访问请求的发起量中,确定非法访问请求的发起占比。Wherein, the initiation ratio of illegal access requests may be determined from the initiation amount of access requests.

在一些实现中,通过测试激励生成器生成的测试激励序列,可以为测试设备配置发起访问请求的相关信息,并控制测试设备向目标对象发起访问请求。In some implementations, the test stimulus sequence generated by the test stimulus generator can configure relevant information for initiating an access request for the test device, and control the test device to initiate an access request to the target object.

可选地,在该控制过程中,测试激励生成器可以通过控制测试激励序列中携带的非法访问地址的占比,实现对访问请求的发起量中的非法访问请求的占比控制。Optionally, in the control process, the test incentive generator can control the proportion of illegal access requests in the initiated amount of access requests by controlling the proportion of illegal access addresses carried in the test incentive sequence.

其中,可以在性能验证开始之前将非法访问请求在全部的访问请求发起量中的占比的相关信息配置在测试激励生成器中。Wherein, before the performance verification starts, the relevant information of the proportion of illegal access requests in the total access request initiation volume can be configured in the test incentive generator.

比如,设定非法访问请求在全部的访问请求的发起量中的发起占比为10%,则可以将该数据在性能验证开始之前配置于测试激励生成器中。测试激励生成器在生成测试激励序列时,可以生成对应比例的携带有非法访问地址的激励序列,基于该部分携带有非法访问地址的激励序列,即可生成对应发起占比的非法访问请求。For example, if the initiation ratio of illegal access requests in the total initiation volume of all access requests is set to be 10%, the data can be configured in the test stimulus generator before the performance verification starts. When generating a test stimulus sequence, the test stimulus generator can generate a corresponding proportion of the stimulus sequence with illegal access addresses, and based on the part of the stimulus sequence with illegal access addresses, it can generate a corresponding proportion of illegal access requests.

可选地,可以从测试激励生成器的相关数据存储区域,获取其中配置的非法访问请求在全部访问请求的发起量中的发起占比。Optionally, the initiation ratio of the configured illegal access requests in the initiation amount of all the access requests may be obtained from the relevant data storage area of the test stimulus generator.

进一步地,可以监听防火墙对非法访问请求的拦截量,并获取拦截量在访问请求的接收量中的拦截占比。Further, the interception amount of illegal access requests by the firewall can be monitored, and the interception amount of the interception amount in the received amount of access requests can be obtained.

可选地,可以在防火墙的通路端口处挂接对应的监听代码,从而实现防火墙对非法访问请求的拦截量的监听。Optionally, a corresponding monitoring code may be hooked at the channel port of the firewall, so as to realize the monitoring of the interception amount of the illegal access request by the firewall.

作为一种可能地实现方式,可以在防火墙的通路端口挂接对防火墙拦截的非法访问请求的进行数量统计的设定代码,通过该设定代码的运行实现对非法访问请求的拦截量的监听。As a possible implementation manner, a setting code for counting the number of illegal access requests intercepted by the firewall can be attached to the channel port of the firewall, and the interception of illegal access requests can be monitored by running the setting code.

进一步地,根据统计到的非法访问请求的拦截量,以及防火墙对访问请求接收的接收量,确定防火墙接收到的全部访问请求中非法访问请求对应的拦截占比。Further, according to the statistics of the intercepted amount of illegal access requests and the received amount of access requests received by the firewall, determine the proportion of interception corresponding to illegal access requests among all the access requests received by the firewall.

作为另一种可能地实现方式,可以在防火墙的通路端口挂接对防火墙通过的安全访问请求进行数量统计的设定代码,通过该设定代码的运行实现对安全访问请求的通过量统计。As another possible implementation, a setting code for counting the number of security access requests passed through the firewall can be attached to the channel port of the firewall, and the throughput statistics of the security access request can be realized by running the setting code.

进一步地,根据统计到的通过量以及防火墙对访问请求的接收量,确定防火墙接收到的全部访问请求中安全访问请求对应的通过占比,进而确定非法访问请求对应的拦截占比。Further, according to the statistics of the throughput and the amount of access requests received by the firewall, determine the proportion of passing security access requests in all the access requests received by the firewall, and then determine the proportion of interception corresponding to illegal access requests.

根据发起占比和拦截占比对防火墙的性能进行评估,以获取防火墙的第一性能评估结果。Evaluate the performance of the firewall according to the proportion of initiation and interception to obtain the first performance evaluation result of the firewall.

本申请实施例中,可以对获取到的发起占比和拦截占比进行对比,根据对比结果实现对防火墙的性能评估。In this embodiment of the present application, the obtained initiation ratio and interception ratio may be compared, and the performance evaluation of the firewall may be implemented according to the comparison result.

其中,可以将对防火墙进行性能评估获取到的评估结果确定为第一性能评估结果。The evaluation result obtained by performing performance evaluation on the firewall may be determined as the first performance evaluation result.

作为一种可能地实现方式,可以对拦截占比与发起占比进行设定算法的计算,获取拦截占比与发起占比之间的误差值。As a possible implementation method, a set algorithm can be calculated for the interception ratio and the initiation ratio, and an error value between the interception ratio and the initiation ratio can be obtained.

进一步地,获取误差值对应的设定误差范围,当获取到的误差值属于该设定误差范围时,可以判断防火墙对于非法访问请求的拦截处理的性能评估合格。Further, the set error range corresponding to the error value is obtained, and when the obtained error value belongs to the set error range, it can be judged that the firewall has passed the performance evaluation of the interception processing of the illegal access request.

如表1所示,设定目标对象为SOC芯片上的存储系统,其中,测试设备向存储系统发起的全部读取访问请求中,读取非法访问请求对应的发起占比为10%,相应地,测试设备向存储系统发起的全部写入访问请求中,写入非法访问请求对应的发起占比为10%。As shown in Table 1, the target object is set to the storage system on the SOC chip. Among all the read access requests initiated by the test equipment to the storage system, the corresponding initiation ratio of read illegal access requests is 10%, and accordingly , among all the write access requests initiated by the test equipment to the storage system, the corresponding initiated write access requests account for 10%.

进一步地,如表1所示,分别获取防火墙对于读取非法访问请求的拦截占比,以及防火墙对于写入非法请求的拦截占比,从而实现对防火墙的性能评估,获取防火墙性能评估的第一评估结果。Further, as shown in Table 1, the interception ratio of the firewall for reading illegal access requests and the interception ratio for writing illegal requests by the firewall are obtained respectively, so as to realize the performance evaluation of the firewall and obtain the first performance evaluation of the firewall. evaluation result.

表1:Table 1:

Figure BDA0003694381550000091
Figure BDA0003694381550000091

由表1可知,读取非法访问请求拦截占比以及写入非法访问请求拦截占比均为10.05%。It can be seen from Table 1 that the interception of read illegal access requests and the interception of write illegal access requests are both 10.05%.

进一步地,获取读取访问请求中读取非法访问请求的发起占比10%与读取非法访问请求在防火墙接收到的全部读取访问请求中的拦截占比10.05%之间的误差值1,以及,写入访问请求中非法写入访问请求的发起占比10%与写入非法访问请求在防火墙接收到的全部写入访问请求中的拦截占比10.05%之间的误差值2。Further, obtain the error value of 1 between 10% of the read access requests initiated and the percentage of read illegal access requests intercepted by 10.05% of all read access requests received by the firewall, And, the error value 2 between 10% of illegal write access requests initiated and 10.05% of all write access requests received by the firewall intercepted by illegal write access requests.

其中,可以设定误差值1以及误差值2均属于设定误差范围,则在防火墙对非法访问请求的拦截性能如表1所示的场景下,防火墙的性能可以满足实际应用所需,则可以确定防火墙评估的第一性能评估结果为合格。Among them, it can be set that the error value 1 and the error value 2 belong to the set error range. In the scenario where the firewall's interception performance for illegal access requests is shown in Table 1, the performance of the firewall can meet the needs of practical applications, then it can be It is determined that the first performance evaluation result of the firewall evaluation is qualified.

进一步地,在防火墙对访问请求进行拦截过滤之后,可以根据目标对象对防火墙未拦截的访问请求的相关响应信息,实现对目标对象的性能评估。其中,可以获取目标对象对防火墙未拦截的访问请求的响应延迟时间。Further, after the firewall intercepts and filters the access request, the performance evaluation of the target object can be implemented according to the relevant response information of the target object to the access request not intercepted by the firewall. Among them, the response delay time of the target object to the access request not intercepted by the firewall can be obtained.

可选地,可以在目标对象对防火墙未拦截的访问请求进行响应时,对其响应延迟时间进行监控,进而获取目标对象对防火墙未拦截的访问请求的响应延迟时间。Optionally, when the target object responds to the access request that is not intercepted by the firewall, the response delay time of the target object can be monitored, so as to obtain the response delay time of the target object to the access request that is not intercepted by the firewall.

进一步地,根据响应延迟时间对目标对象的性能进行评估,以获取目标对象的第二性能评估结果。Further, the performance of the target object is evaluated according to the response delay time to obtain a second performance evaluation result of the target object.

作为一种可能地实现方式,可以获取未配置防火墙的目标对象对于访问请求的响应延迟时间,以及配置有防火墙的目标对象对于防火墙未拦截的访问请求的响应延迟时间,从而对目标对象进行评估,进而获取目标对象性能评估的第二性能评估结果。As a possible implementation, the response delay time of the target object without the firewall configuration to the access request and the response delay time of the target object configured with the firewall to the access request not intercepted by the firewall can be obtained, so as to evaluate the target object, Further, the second performance evaluation result of the performance evaluation of the target object is obtained.

作为另一种可能地实现方式,可以获取响应延迟时间对应的门限时间,并将获取到的响应延迟时间与门限时间进行对比,当响应延迟时间小于或者等于门限时间,可以判断,当前配置有防火墙的目标对象的响应延迟不会对其正常的运行性能产生影响,因此,可以确定该场景下的目标对象的第二性能评估结果为合格。As another possible implementation, the threshold time corresponding to the response delay time can be obtained, and the obtained response delay time can be compared with the threshold time. When the response delay time is less than or equal to the threshold time, it can be determined that a firewall is currently configured The response delay of the target object will not affect its normal running performance, therefore, it can be determined that the second performance evaluation result of the target object in this scenario is qualified.

如表2所示,设定目标对象为存储系统,可以分别对存储系统对于读取访问请求的发起速度和响应速度,以及写入访问请求的发起速度和响应速度进行统计,进而获取存储系统对读取访问请求的响应延迟时间的相关信息,以及存储系统对写入访问请求的响应延迟时间的相关信息。As shown in Table 2, if the target object is set to the storage system, the initiation speed and response speed of the storage system for read access requests, and the initiation speed and response speed of the write access request can be counted respectively, and then the data of the storage system can be obtained. Information about the response delay time of read access requests, and information about the response delay time of the storage system to write access requests.

其中,如表2所示,存储系统对读取访问请求的响应延迟时间的相关信息可以包括存储系统对读取访问请求响应的最大延迟时间、最小延迟时间、平均延迟时间,存储系统对写入访问请求的响应延迟时间的相关信息可以包括存储系统对于写入访问请求响应的最大延迟时间、最小延迟时间、平均延迟时间。Among them, as shown in Table 2, the relevant information about the response delay time of the storage system to the read access request may include the maximum delay time, the minimum delay time, and the average delay time of the storage system to the read access request response. The information about the response delay time of the access request may include the maximum delay time, the minimum delay time, and the average delay time of the storage system responding to the write access request.

进一步地,根据表2所示的响应速度以及响应时间的相关信息,对存储系统的性能进行评估,从而确定如表2所示的存储系统,在配置防火墙之后,其性能依然可以满足实际所需,进而可以确定配置有防火墙的目标对象的第二性能评估结果为合格。Further, according to the response speed and the relevant information of the response time shown in Table 2, the performance of the storage system is evaluated, so as to determine that the performance of the storage system shown in Table 2 can still meet the actual needs after the firewall is configured. , and then it can be determined that the second performance evaluation result of the target object configured with the firewall is qualified.

表2:Table 2:

Figure BDA0003694381550000101
Figure BDA0003694381550000101

S402,根据第一性能评估结果和第二性能评估结果,对目标系统的性能进行评估。S402: Evaluate the performance of the target system according to the first performance evaluation result and the second performance evaluation result.

本申请实施例中,根据第一性能评估结果以及第二性能评估结果的详细内容,可以实现对目标系统的性能评估。In this embodiment of the present application, the performance evaluation of the target system can be implemented according to the detailed content of the first performance evaluation result and the second performance evaluation result.

可选地,响应于第一性能评估结果指示防火墙性能合格,且第二性能评估结果指示目标对象性能合格,判定目标系统性能评估结果为合格。Optionally, in response to the first performance evaluation result indicating that the firewall's performance is qualified, and the second performance evaluation result indicating that the target object's performance is qualified, it is determined that the target system performance evaluation result is qualified.

其中,当第一性能评估结果指示防火墙性能合格,可以确定防火墙对于非法访问请求的拦截性能可以满足实际所需。相应地,当第二性能评估结果指示目标对象的性能合适时,可以确定当前目标对象对于访问请求的响应的性能可以满足实际所需,因此,在该场景下,可以判断,由防火墙和目标对象组成的目标系统可以满足实际应用所需。Wherein, when the first performance evaluation result indicates that the performance of the firewall is qualified, it can be determined that the interception performance of the firewall for illegal access requests can meet actual requirements. Correspondingly, when the second performance evaluation result indicates that the performance of the target object is appropriate, it can be determined that the performance of the current target object's response to the access request can meet the actual requirements. The formed target system can meet the needs of practical application.

进一步地,可以确定目标系统的性能评估结果为合格。Further, it can be determined that the performance evaluation result of the target system is qualified.

本申请提出的访问请求的处理方法,对防火墙进行性能评估获取第一性能评估结果,对目标对象进行性能评估获取对应的第二性能评估结果,根据第一性能评估结果与第二性能评估结果,实现对目标系统的性能评估。本申请中,通过对防火墙以及目标对象分别进行的性能评估,实现对防火墙和目标对象组成的目标系统的性能评估,进而实现了配置防火墙对于目标对象的性能影响程度的评估,实现了对防火墙和目标对象组成的目标系统的安全性和稳定性的性能验证。In the method for processing an access request proposed by the present application, a performance evaluation is performed on a firewall to obtain a first performance evaluation result, a performance evaluation is performed on a target object to obtain a corresponding second performance evaluation result, and according to the first performance evaluation result and the second performance evaluation result, Implement performance evaluation of the target system. In this application, the performance evaluation of the target system composed of the firewall and the target object is realized through the performance evaluation of the firewall and the target object respectively, and then the evaluation of the impact degree of the configuration firewall on the performance of the target object is realized, and the performance evaluation of the firewall and the target object is realized. Performance verification of the security and stability of the target system composed of target objects.

与上述几种实施例提出的访问请求的处理方法相对应,本申请的一个实施例还提出了一种访问请求的处理装置,由于本申请实施例提出的访问请求的处理装置与上述几种实施例提出的访问请求的处理方法相对应,因此上述访问请求的处理方法的实施方式也适用于本申请实施例提出的访问请求的处理装置,在下述实施例中不再详细描述。Corresponding to the methods for processing access requests proposed by the above-mentioned embodiments, an embodiment of the present application also provides a device for processing access requests. Corresponding to the access request processing method proposed in the example, therefore, the implementation manner of the above-mentioned access request processing method is also applicable to the access request processing apparatus proposed by the embodiment of the present application, and will not be described in detail in the following embodiments.

图5为本申请一实施例的访问请求的处理装置的结构示意图,如图5所示,访问请求的处理装置500,包括接收模块51、确定模块52、处理模块53、评估模块54,其中:5 is a schematic structural diagram of an apparatus for processing an access request according to an embodiment of the present application. As shown in FIG. 5 , an apparatus for processing an access request 500 includes a receiving module 51, a determining module 52, a processing module 53, and an evaluating module 54, wherein:

接收模块51,用于接收用于访问目标对象的访问请求;a receiving module 51, configured to receive an access request for accessing the target object;

确定模块52,用于从防火墙内部的多个候选请求处理分区中,确定访问请求对应的目标请求处理分区;The determining module 52 is used to determine the target request processing partition corresponding to the access request from a plurality of candidate request processing partitions inside the firewall;

处理模块53,用于获取目标请求处理分区的安全访问地址段,并根据安全访问地址段对访问请求进行拦截。The processing module 53 is configured to obtain the security access address segment of the target request processing partition, and intercept the access request according to the security access address segment.

本申请实施例中,处理模块53,还用于:获取访问请求对目标对象的目标访问地址;根据安全访问地址段和目标访问地址,识别访问请求是否为非法访问请求;响应于识别到访问请求为非法访问请求,对非法访问请求进行拦截。In the embodiment of the present application, the processing module 53 is further configured to: obtain the target access address of the access request to the target object; identify whether the access request is an illegal access request according to the security access address segment and the target access address; in response to identifying the access request For illegal access requests, the illegal access requests are intercepted.

本申请实施例中,处理模块53,还用于:响应于目标访问地址属于目标请求处理分区的安全访问地址段,确定访问请求为安全访问请求;响应于目标访问地址不属于目标请求处理分区的安全访问地址段,确定访问请求为非法访问请求。In the embodiment of the present application, the processing module 53 is further configured to: in response to the target access address belonging to the security access address segment of the target request processing partition, determine that the access request is a security access request; in response to the target access address not belonging to the target request processing partition The security access address segment determines that the access request is an illegal access request.

本申请实施例中,确定模块52,还用于:获取候选请求处理分区的区域标识和测试设备的设备标识之间的标识对应关系,其中,测试设备用于发起对目标对象的访问请求;从访问请求携带的信息中,确定发起访问请求的目标测试设备的目标设备标识;根据标识对应关系,确定目标设备标识对应的目标区域标识,并将目标区域标识对应的候选请求处理分区确定为处理访问请求的目标请求处理分区。In the embodiment of the present application, the determination module 52 is further configured to: obtain the identification correspondence between the region identification of the candidate request processing partition and the device identification of the test equipment, wherein the test equipment is used to initiate an access request to the target object; In the information carried by the access request, determine the target device identifier of the target test device that initiates the access request; according to the identifier correspondence, determine the target area identifier corresponding to the target device identifier, and determine the candidate request processing partition corresponding to the target area identifier as processing access. The target request processing partition of the request.

本申请实施例中,装置还包括,评估模块54,用于:对防火墙和目标对象进行性能评估,并分别获取防火墙的第一性能评估结果和目标对象的第二性能评估结果;根据第一性能评估结果和第二性能评估结果,对目标系统的性能进行评估。In this embodiment of the present application, the apparatus further includes an evaluation module 54, configured to: perform performance evaluation on the firewall and the target object, and obtain the first performance evaluation result of the firewall and the second performance evaluation result of the target object respectively; The evaluation result and the second performance evaluation result are used to evaluate the performance of the target system.

本申请实施例中,评估模块54,还用于:从访问请求的发起量中,确定非法访问请求的发起占比;监听防火墙对非法访问请求的拦截量,并获取拦截量在访问请求的接收量中的拦截占比;根据发起占比和拦截占比对防火墙的性能进行评估,以获取防火墙的第一性能评估结果。In the embodiment of the present application, the evaluation module 54 is further configured to: determine the proportion of illegal access requests initiated from the initiated amount of access requests; monitor the interception amount of illegal access requests by the firewall, and obtain the interception amount in the reception of the access request The percentage of interception in the volume; the performance of the firewall is evaluated according to the percentage of initiation and the percentage of interception to obtain the first performance evaluation result of the firewall.

本申请实施例中,评估模块54,还用于:获取发起占比和拦截占比的误差值;响应于误差值属于设定误差范围,确定防火墙的第一性能评估结果为合格。In the embodiment of the present application, the evaluation module 54 is further configured to: obtain the error value of the initiation ratio and the interception ratio; and determine that the first performance evaluation result of the firewall is qualified in response to the error value belonging to the set error range.

本申请实施例中,评估模块54,还用于:获取目标对象对防火墙未拦截的访问请求的响应延迟时间;根据响应延迟时间对目标对象的性能进行评估,以获取目标对象的第二性能评估结果。In the embodiment of the present application, the evaluation module 54 is further configured to: obtain the response delay time of the target object to the access request not intercepted by the firewall; evaluate the performance of the target object according to the response delay time, so as to obtain the second performance evaluation of the target object result.

本申请实施例中,评估模块54,还用于:获取目标对象的响应延迟的门限时间;响应于响应延迟时间小于或者等于门限时间,判定目标对象的第二性能评估结果为合格。In the embodiment of the present application, the evaluation module 54 is further configured to: obtain the threshold time of the response delay of the target object; in response to the response delay time being less than or equal to the threshold time, determine that the second performance evaluation result of the target object is qualified.

本申请实施例中,评估模块54,还用于:响应于第一性能评估结果指示防火墙性能合格,且第二性能评估结果指示目标对象性能合格,判定目标系统性能评估结果为合格。In this embodiment of the present application, the evaluation module 54 is further configured to: in response to the first performance evaluation result indicating that the firewall performance is qualified, and the second performance evaluation result indicating that the target object performance is qualified, determine that the target system performance evaluation result is qualified.

本申请提出的访问请求的处理装置,接收目标对象的访问请求,并从防火墙内部划分的多个候选请求处理分区中,确定访问请求对应的目标请求处理分区,进一步地,根据目标请求处理分区的安全访问地址段,对访问请求进行识别判断,对确定携带非安全访问地址的访问请求进行拦截处理。本申请中,通过防火墙对目标对象的访问请求进行识别拦截,实现了对目标对象的安全访问,对防火墙内部进行多个候选请求处理分区的划分,实现了对访问请求的分流处理,提高了防火墙对访问请求的处理效率,进而提高了对防火墙性能的验证分析效率,实现了对防火墙性能验证的可管理,优化了验证方法以及验证效果。The access request processing device proposed in the present application receives the access request of the target object, and determines the target request processing partition corresponding to the access request from a plurality of candidate request processing partitions divided inside the firewall, and further, according to the target request processing partition The secure access address segment identifies and judges access requests, and intercepts access requests determined to carry non-secure access addresses. In the present application, the access request of the target object is identified and intercepted by the firewall, the secure access to the target object is realized, and the interior of the firewall is divided into multiple candidate request processing partitions, so as to realize the branch processing of the access request, and improve the firewall. The processing efficiency of access requests improves the efficiency of verification and analysis of firewall performance, realizes the manageability of firewall performance verification, and optimizes verification methods and verification effects.

为达到上述实施例,本申请还提出了一种电子设备、一种计算机可读存储介质和一种计算机程序产品。In order to achieve the above embodiments, the present application also proposes an electronic device, a computer-readable storage medium, and a computer program product.

图6为本申请一实施例的电子设备的框图,根据如图6所示的电子设备可以实现执行图1至图4的实施例的访问请求的处理方法。FIG. 6 is a block diagram of an electronic device according to an embodiment of the present application. According to the electronic device shown in FIG. 6 , the access request processing method of the embodiments of FIGS. 1 to 4 can be implemented.

为了实现上述实施例,本申请还提出一种存储有计算机指令的非瞬时计算机可读存储介质,计算机指令用于使计算机执行图1至图4的实施例的访问请求的处理方法。In order to implement the above-mentioned embodiments, the present application further provides a non-transitory computer-readable storage medium storing computer instructions, where the computer instructions are used to cause the computer to execute the access request processing method in the embodiments of FIG. 1 to FIG. 4 .

为了实现上述实施例,本申请还提出一种计算机程序产品,当计算机程序产品中的指令处理器执行时,执行图1至图4的实施例的访问请求的处理方法。In order to implement the above embodiments, the present application further provides a computer program product, when an instruction processor in the computer program product executes, executes the access request processing method in the embodiments of FIG. 1 to FIG. 4 .

在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本申请的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。In the description of this specification, description with reference to the terms "one embodiment," "some embodiments," "example," "specific example," or "some examples", etc., mean specific features described in connection with the embodiment or example , structure, material or feature is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, those skilled in the art may combine and combine the different embodiments or examples described in this specification, as well as the features of the different embodiments or examples, without conflicting each other.

此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本申请的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。In addition, the terms "first" and "second" are only used for descriptive purposes, and should not be construed as indicating or implying relative importance or implying the number of indicated technical features. Thus, a feature delimited with "first", "second" may expressly or implicitly include at least one of that feature. In the description of the present application, "plurality" means at least two, such as two, three, etc., unless expressly and specifically defined otherwise.

流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现定制逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本申请的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本申请的实施例所属技术领域的技术人员所理解。Any process or method description in the flowcharts or otherwise described herein may be understood to represent a module, segment or portion of code comprising one or more executable instructions for implementing custom logical functions or steps of the process , and the scope of the preferred embodiments of the present application includes alternative implementations in which the functions may be performed out of the order shown or discussed, including performing the functions substantially concurrently or in the reverse order depending upon the functions involved, which should It is understood by those skilled in the art to which the embodiments of the present application belong.

在流程图中表示或在此以其他方式描述的逻辑和/或步骤,例如,可以被认为是用于实现逻辑功能的可执行指令的定序列表,可以具体实现在任何计算机可读介质中,以供指令执行系统、装置或设备(如基于计算机的系统、包括处理器的系统或其他可以从指令执行系统、装置或设备取指令并执行指令的系统)使用,或结合这些指令执行系统、装置或设备而使用。就本说明书而言,"计算机可读介质"可以是任何可以包含、存储、通信、传播或传输程序以供指令执行系统、装置或设备或结合这些指令执行系统、装置或设备而使用的装置。计算机可读介质的更具体的示例(非穷尽性列表)包括以下:具有一个或多个布线的电连接部(电子装置),便携式计算机盘盒(磁装置),随机存取存储器(RAM),只读存储器(ROM),可擦除可编辑只读存储器(EPROM或闪速存储器),光纤装置,以及便携式光盘只读存储器(CDROM)。另外,计算机可读介质甚至可以是可在其上打印所述程序的纸或其他合适的介质,因为可以例如通过对纸或其他介质进行光学扫描,接着进行编辑、解译或必要时以其他合适方式进行处理来以电子方式获得所述程序,然后将其存储在计算机存储器中。The logic and/or steps represented in flowcharts or otherwise described herein, for example, may be considered an ordered listing of executable instructions for implementing the logical functions, may be embodied in any computer-readable medium, For use with, or in conjunction with, an instruction execution system, apparatus, or device (such as a computer-based system, a system including a processor, or other system that can fetch instructions from and execute instructions from an instruction execution system, apparatus, or apparatus) or equipment. For the purposes of this specification, a "computer-readable medium" can be any device that can contain, store, communicate, propagate, or transport the program for use by or in connection with an instruction execution system, apparatus, or apparatus. More specific examples (non-exhaustive list) of computer readable media include the following: electrical connections with one or more wiring (electronic devices), portable computer disk cartridges (magnetic devices), random access memory (RAM), Read Only Memory (ROM), Erasable Editable Read Only Memory (EPROM or Flash Memory), Fiber Optic Devices, and Portable Compact Disc Read Only Memory (CDROM). In addition, the computer readable medium may even be paper or other suitable medium on which the program may be printed, as the paper or other medium may be optically scanned, for example, followed by editing, interpretation, or other suitable medium as necessary process to obtain the program electronically and then store it in computer memory.

应当理解,本申请的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。如,如果用硬件来实现和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。It should be understood that various parts of this application may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware as in another embodiment, it can be implemented by any one of the following techniques known in the art, or a combination thereof: discrete with logic gates for implementing logic functions on data signals Logic circuits, application specific integrated circuits with suitable combinational logic gates, Programmable Gate Arrays (PGA), Field Programmable Gate Arrays (FPGA), etc.

本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,该程序在执行时,包括方法实施例的步骤之一或其组合。Those skilled in the art can understand that all or part of the steps carried by the methods of the above embodiments can be completed by instructing the relevant hardware through a program, and the program can be stored in a computer-readable storage medium, and the program can be stored in a computer-readable storage medium. When executed, one or a combination of the steps of the method embodiment is included.

此外,在本申请各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing module, or each unit may exist physically alone, or two or more units may be integrated into one module. The above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules. If the integrated modules are implemented in the form of software functional modules and sold or used as independent products, they may also be stored in a computer-readable storage medium.

上述提到的存储介质可以是只读存储器,磁盘或光盘等。尽管上面已经示出和描述了本申请的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本申请的限制,本领域的普通技术人员在本申请的范围内可以对上述实施例进行变化、修改、替换和变型。The above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, and the like. Although the embodiments of the present application have been shown and described above, it should be understood that the above embodiments are exemplary and should not be construed as limitations to the present application. Embodiments are subject to variations, modifications, substitutions and variations.

Claims (22)

1. A method for processing an access request, the method comprising:
receiving an access request for accessing a target object;
determining a target request processing partition corresponding to the access request from a plurality of candidate request processing partitions in the firewall;
and acquiring a security access address field of the target request processing partition, and intercepting the access request according to the security access address field.
2. The method of claim 1, wherein intercepting the access request according to the secure access address segment comprises:
acquiring a target access address of the access request to the target object;
identifying whether the access request is an illegal access request or not according to the safe access address field and the target access address;
and intercepting the illegal access request in response to identifying that the access request is an illegal access request.
3. The method of claim 2, wherein said identifying whether the access request is an illegal access request based on the secure access address field and the target access address comprises:
determining that the access request is a secure access request in response to the target access address belonging to the secure access address segment of the target request processing partition;
determining that the access request is the illegal access request in response to the target access address not belonging to the secure access address segment of the target request processing partition.
4. The method of claim 1, wherein determining a target request processing partition for the access request from a plurality of candidate request processing partitions inside a firewall comprises:
acquiring an identification corresponding relation between the area identification of the candidate request processing partition and the equipment identification of the test equipment, wherein the test equipment is used for initiating an access request to the target object;
determining the target equipment identification of the target test equipment initiating the access request from the information carried by the access request;
and determining a target area identifier corresponding to the target equipment identifier according to the identifier corresponding relation, and determining a candidate request processing partition corresponding to the target area identifier as a target request processing partition for processing the access request.
5. The method of claim 1, further comprising:
performing performance evaluation on the firewall and the target object, and respectively acquiring a first performance evaluation result of the firewall and a second performance evaluation result of the target object;
and evaluating the performance of the target system according to the first performance evaluation result and the second performance evaluation result.
6. The method of claim 5, wherein obtaining the first performance assessment result of the firewall comprises:
determining the initiation ratio of the illegal access request from the initiation amount of the access request;
monitoring the interception amount of the firewall to the illegal access request, and acquiring the interception ratio of the interception amount in the receiving amount of the access request;
and evaluating the performance of the firewall according to the initiating proportion and the intercepting proportion to obtain the first performance evaluation result of the firewall.
7. The method according to claim 6, wherein the evaluating the performance of the firewall according to the initiating proportion and the intercepting proportion to obtain the first performance evaluation result of the firewall comprises:
obtaining an error value of the initiating ratio and the intercepting ratio;
and determining that the first performance evaluation result of the firewall is qualified in response to the error value belonging to a set error range.
8. The method of claim 5, wherein obtaining the second performance assessment result of the target object comprises:
obtaining the response delay time of the target object to the access request which is not intercepted by the firewall;
and evaluating the performance of the target object according to the response delay time to obtain a second performance evaluation result of the target object.
9. The method of claim 8, wherein the evaluating the performance of the target object according to the response delay time to obtain the second performance evaluation result of the target object comprises:
acquiring the threshold time of the response delay of the target object;
in response to the response delay time being less than or equal to the threshold time, determining that the second performance assessment result for the target object is qualified.
10. The method of claim 7 or 9, wherein said evaluating the performance of the target system based on the first performance evaluation result and the second performance evaluation result comprises:
and judging that the target system performance evaluation result is qualified in response to the first performance evaluation result indicating that the firewall performance is qualified and the second performance evaluation result indicating that the target object performance is qualified.
11. An apparatus for processing an access request, the apparatus comprising:
a receiving module for receiving an access request for accessing a target object;
the determining module is used for determining a target request processing partition corresponding to the access request from a plurality of candidate request processing partitions in the firewall;
and the processing module is used for acquiring the safe access address field of the target request processing partition and intercepting the access request according to the safe access address field.
12. The apparatus of claim 11, wherein the processing module is further configured to:
acquiring a target access address of the access request to the target object;
identifying whether the access request is an illegal access request or not according to the safe access address field and the target access address;
and responding to the condition that the access request is identified as an illegal access request, and intercepting the illegal access request.
13. The apparatus of claim 12, wherein the processing module is further configured to:
determining that the access request is a secure access request in response to the target access address belonging to the secure access address segment of the target request processing partition;
determining that the access request is the illegal access request in response to the target access address not belonging to the secure access address segment of the target request processing partition.
14. The apparatus of claim 11, wherein the determining module is further configured to:
acquiring an identification corresponding relation between the area identification of the candidate request processing partition and the equipment identification of the test equipment, wherein the test equipment is used for initiating an access request to the target object;
determining the target equipment identification of the target test equipment initiating the access request from the information carried by the access request;
and determining a target area identifier corresponding to the target equipment identifier according to the identifier corresponding relation, and determining a candidate request processing partition corresponding to the target area identifier as a target request processing partition for processing the access request.
15. The apparatus of claim 11, further comprising an evaluation module configured to:
performing performance evaluation on the firewall and the target object, and respectively acquiring a first performance evaluation result of the firewall and a second performance evaluation result of the target object;
and evaluating the performance of the target system according to the first performance evaluation result and the second performance evaluation result.
16. The apparatus of claim 15, wherein the evaluation module is further configured to:
determining the initiation ratio of the illegal access request from the initiation amount of the access request;
monitoring the interception amount of the firewall to the illegal access request, and acquiring the interception ratio of the interception amount in the receiving amount of the access request;
and evaluating the performance of the firewall according to the initiating proportion and the intercepting proportion to obtain the first performance evaluation result of the firewall.
17. The apparatus of claim 16, wherein the evaluation module is further configured to:
obtaining an error value of the initiating ratio and the intercepting ratio;
and determining that the first performance evaluation result of the firewall is qualified in response to the error value belonging to a set error range.
18. The apparatus of claim 15, wherein the evaluation module is further configured to:
obtaining the response delay time of the target object to the access request which is not intercepted by the firewall;
and evaluating the performance of the target object according to the response delay time to obtain a second performance evaluation result of the target object.
19. The apparatus of claim 18, wherein the evaluation module is further configured to:
acquiring the threshold time of the response delay of the target object;
and in response to the response delay time being less than or equal to the threshold time, determining that the second performance evaluation result of the target object is qualified.
20. The apparatus according to claim 17 or 19, wherein the evaluation module is further configured to:
and judging that the target system performance evaluation result is qualified in response to the first performance evaluation result indicating that the firewall performance is qualified and the second performance evaluation result indicating that the target object performance is qualified.
21. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-10.
22. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-10.
CN202210669771.4A 2022-06-14 2022-06-14 Access request processing method, device and electronic device Active CN114944958B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210669771.4A CN114944958B (en) 2022-06-14 2022-06-14 Access request processing method, device and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210669771.4A CN114944958B (en) 2022-06-14 2022-06-14 Access request processing method, device and electronic device

Publications (2)

Publication Number Publication Date
CN114944958A true CN114944958A (en) 2022-08-26
CN114944958B CN114944958B (en) 2025-03-04

Family

ID=82908844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210669771.4A Active CN114944958B (en) 2022-06-14 2022-06-14 Access request processing method, device and electronic device

Country Status (1)

Country Link
CN (1) CN114944958B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117097576A (en) * 2023-10-20 2023-11-21 北京凯芯微科技有限公司 AXI bus firewall for functional safety

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5826014A (en) * 1996-02-06 1998-10-20 Network Engineering Software Firewall system for protecting network elements connected to a public network
US20090083505A1 (en) * 2007-09-26 2009-03-26 Giles Chris M System and Method for Achieving Protected Region Within Computer System
US20110252462A1 (en) * 2010-04-07 2011-10-13 International Business Machines Corporation Authenticating a Remote Host to a Firewall
US20200213416A1 (en) * 2019-01-02 2020-07-02 Bank Of America Corporation Entry point classification of requests requiring access to data
CN113014571A (en) * 2021-02-22 2021-06-22 腾讯科技(深圳)有限公司 Method, device and storage medium for processing access request

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5826014A (en) * 1996-02-06 1998-10-20 Network Engineering Software Firewall system for protecting network elements connected to a public network
US20050229248A1 (en) * 1996-02-06 2005-10-13 Coley Christopher D Method for transparently managing outbound traffic from an internal user of a private network destined for a public network
US20090083505A1 (en) * 2007-09-26 2009-03-26 Giles Chris M System and Method for Achieving Protected Region Within Computer System
US20110252462A1 (en) * 2010-04-07 2011-10-13 International Business Machines Corporation Authenticating a Remote Host to a Firewall
US20200213416A1 (en) * 2019-01-02 2020-07-02 Bank Of America Corporation Entry point classification of requests requiring access to data
CN113014571A (en) * 2021-02-22 2021-06-22 腾讯科技(深圳)有限公司 Method, device and storage medium for processing access request

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117097576A (en) * 2023-10-20 2023-11-21 北京凯芯微科技有限公司 AXI bus firewall for functional safety
CN117097576B (en) * 2023-10-20 2024-01-02 北京凯芯微科技有限公司 AXI bus firewall for functional safety

Also Published As

Publication number Publication date
CN114944958B (en) 2025-03-04

Similar Documents

Publication Publication Date Title
US20230144818A1 (en) Malicious software detection based on api trust
JP5736090B2 (en) Method, system and computer program for memory protection of virtual guest
CN106502926B (en) A memory monitoring method, memory access controller and SoC system
CN112528345B (en) Communication method, device, computer readable storage medium and chip
US11216192B2 (en) Memory protective apparatus for indirect access memory controller
US10924277B2 (en) Certifying authenticity of stored code and code updates
US9721104B2 (en) CPU-based measured boot
US11334258B2 (en) System and method for memory region protection
US8868793B2 (en) SAS expander system and method for dynamically allocating SAS addresses to SAS expander devices
US20170262388A1 (en) Method for data transmission and server for implementing the method
CN109992532A (en) Access rights management method for storage space and storage rights management unit
US11256830B2 (en) Apparatus for adding protection function for indirect access memory controller
CN114944958A (en) Processing method and device of access request and electronic equipment
CN104536916A (en) Arbitration method for multi-core system and multi-core system
US12050539B2 (en) Data access method and apparatus and storage medium
WO2020113478A1 (en) Address information processing method and apparatus, electronic device, and storage medium
CN110990318B (en) PCIe bus address expansion method, device, equipment and medium
WO2021232295A1 (en) Method and apparatus for monitoring software license information, and server and storage medium
CN114024879B (en) Deployment method, device and storage medium of a network probe
US20230078249A1 (en) Device for detecting zone parallelity of a solid state drive and operating method thereof
CN114490449B (en) Memory access method and device and processor
US20190317676A1 (en) Executable memory protection
CN111124814A (en) SOC memory access monitoring method and device and computer equipment
CN217640204U (en) Solid state disk and solid state disk access control system
US20220300315A1 (en) Supporting execution of a computer program by using a memory page of another computer program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant