CN206820776U - A kind of comprehensive safety monitoring analytical equipment based on network traffics - Google Patents

A kind of comprehensive safety monitoring analytical equipment based on network traffics Download PDF

Info

Publication number
CN206820776U
CN206820776U CN201720341273.1U CN201720341273U CN206820776U CN 206820776 U CN206820776 U CN 206820776U CN 201720341273 U CN201720341273 U CN 201720341273U CN 206820776 U CN206820776 U CN 206820776U
Authority
CN
China
Prior art keywords
analysis
board
analytical equipment
safety monitoring
comprehensive safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201720341273.1U
Other languages
Chinese (zh)
Inventor
王文彬
连海港
李�杰
何国辉
郭志强
马雪菁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
UNIT 61660 OF PLA
Original Assignee
UNIT 61660 OF PLA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by UNIT 61660 OF PLA filed Critical UNIT 61660 OF PLA
Priority to CN201720341273.1U priority Critical patent/CN206820776U/en
Application granted granted Critical
Publication of CN206820776U publication Critical patent/CN206820776U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model discloses a kind of comprehensive safety based on network traffics to monitor analytical equipment, the unification of polytype flow is supported to obtain, focus on, redundant filtration and load balancing, and a variety of analytical technology engines are moved forward, it is integrated into platform, so as to reach, function is integrated and the purpose of device miniaturization.

Description

A kind of comprehensive safety monitoring analytical equipment based on network traffics
Technical field
Computer network field is the utility model is related to, in particular to a kind of comprehensive safety based on network traffics Monitor analytical equipment.
Background technology
Currently, the safety monitoring system based on network traffics mainly include intruding detection system, user's behaviors analysis system, Malicious code detection system, network content security auditing system etc..There are the following problems for these current systems:
(1) function of every kind of equipment is all relatively single, when carrying out comprehensive safety monitoring to network, need to dispose in a network Plurality of devices and system, great burden is brought to Web access;
(2) collection of a variety of analytical equipments for network traffics, processing procedure are substantially similar, simply analysis means and method Difference, therefore, a variety of analytical equipments are disposed, the collection and processing procedure for network traffics are to repeat, and easily cause resource Waste;
(3) comprehensive safety monitoring analysis is completed, it is necessary to a variety of analytical equipments and system are disposed jointly, do not meet function collection It is weaker in terms of portability and rapid deployment into the requirement changed with device miniaturization;
(4) a variety of analysis result datas are each independent, it is difficult to the fusion of a variety of analyze datas is completed, data sharing is poor, Association analysis is merged to lack.
Utility model content
To solve the above problems, the utility model is based on ATCA standard architectures, realize a kind of based on the comprehensive of network traffics Close security auditing equipment.
A kind of comprehensive safety monitoring analytical equipment based on network traffics, including cabinet, converging device, filter, friendship Changing device and analysis computing device;Wherein, converging device, filter, switch, the analysis back of the body of the computing device by cabinet Plate interconnects;
The analysis computing device calculates board by the analysis of analysis software for calculation by least one burning and formed;
The converging device includes interface subcard and input card;Interface subcard is arranged on input card;Interface subcard As the input interface of disparate networks link, data on flows bag is identified according to the data stream list of self maintained, and will received Network link data is converted into ethernet traffic data, is then issued to input card;
The input card is according to the traffic filtering forwarding strategy that filter is sent to the data that are received from interface subcard Bag is transmitted to exchange board or makees discard processing;
The filter reads the packet for exchanging board by the backboard, identifies the application protocol of flow, goes forward side by side Row parsing, obtained analysis result are supplied to user by exchanging the configuration interface of board, for formulating traffic filtering forwarding plan Slightly, user has formulated traffic filtering forwarding strategy and the strategy has been configured in filter;
The switch receives the data on flows that converging device is sent, defeated by power board backplane interface or front panel Outgoing interface, the analysis according to corresponding to forwarding the traffic to the traffic filtering forwarding strategy that filter is sent are calculated in board, by This carries out specific flow analysis to data.
Further, the switch provides configuration interface, realize to the local of comprehensive safety monitoring analytical equipment or Novel maintenance management.
Further, the cabinet also includes power supply, board slot, communication system and heat abstractor.
Preferably, the cabinet uses ATCA standard implementations.
Preferably, each comprehensive safety monitoring analytical equipment sets multiple converging devices according to demand.
Preferably, the interface subcard supports standard modular interface, support ATM155M, ATM622M, POS155M, POS622M, POS2.5G, POS10G, POS40G, 10GE, 1GE interface type.
Preferably, the analysis, which calculates board, includes intrusion detection module, abnormal behaviour analysis module, Network Content Audit Module, malicious code trapping module or one kind, two kinds, three kinds, four kinds or five kinds of modules in fusion association analysis module.
Preferably, the analysis of analysis computing device, which calculates board, includes merging association analysis module for obtaining other points Analysis calculates the analysis result of board, and when suspicious IP occurs in the analysis result prompting that one of analysis calculates board, fusion is closed Joining analysis module calls other analyses to calculate the board analysis result related to the suspicious IP, and carries out Macro or mass analysis, and judgement is No is security incident.
A kind of cascade system of comprehensive safety monitoring analytical equipment, including multiple comprehensive safeties monitoring analytical equipment, are used The form of multilayer cascade, i.e.,:Comprehensive safety monitoring analytical equipment is divided at least two-stage, and a comprehensive peace is comprised at least in every one-level Full monitoring analytical equipment, wherein, the output interface and the converging device of upper level comprehensive safety monitoring analytical equipment of switch Input interface be connected.
The utility model has the advantages that:
The utility model provides the flow comprehensive safety analysis platform of a dynamic scalable, supports polytype flow Unification obtain, focus on, redundant filtration and load balancing, and a variety of analytical technology engines are moved forward, are integrated into platform, So as to reach, function is integrated and the purpose of device miniaturization.
Brief description of the drawings
Fig. 1 shows the schematic diagram of the comprehensive safety monitoring analytical equipment described in the utility model based on network traffics.
Fig. 2 shows the logical relation of each part of the utility model.
Fig. 3 shows the annexation during more equipment cascadings.
Fig. 4 show analysis computing device structure and with switch annexation figure.
Embodiment
With reference to the accompanying drawings and examples, the utility model is described in detail.
It is of the present utility model it is a kind of based on network traffics comprehensive safety monitoring analytical equipment, as shown in figure 1, by cabinet, Converging device, filter, switch and analysis computing device composition.Wherein cabinet is converging device, filter, exchange Device, analysis computing device provide the basic necessary condition for interconnecting and cooperating;Converging device is the input of equipment End, it is mainly used in gathering the network traffics of various Linktypes;Filter is used to identify network application agreement, and configures accordingly Filtering and load balancing rule;Switch realizes data fusion, exchange forwarding between other devices;Computing device is analyzed according to use Family needs to be integrated with different flow analysis functions.Logical relation is as shown in Figure 2 between said apparatus.
Wherein, converging device, filter, switch, analysis computing device are interconnected by case back plate.
The cabinet, mainly including power supply, board slot, backboard, communication system and heat abstractor.It is real using ATCA standards It is existing, it is the tie that various boards are connected and cooperated.Cabinet is divided into convergence-level, filter layer, switching layer and analysis computation layer Four regions, convergence-level slot insertion converging device, filter layer slot insertion filtering board, the insertion of switching layer slot exchange dress Put, analysis computation layer slot insertion analysis computing device.The device in each region is connected by case back plate.Wherein convergence-level and point Analysis computation layer is essential region, and the device quantity of other regions and all areas is by user according to network node flow monitoring Demand and determine.All kinds of boards support hot plug and automatically configured to come into force in equipment, are easy to dispose and safeguard.The convergence dress Put, including interface subcard and input card.Multiple interfaces subcard is provided with input card, interface subcard provides current main-stream The input interface of disparate networks link, the link of different type, different rates is uniformly accessed into equipment, carried out at concentration Reason, converts thereof into ethernet traffic data output, to switch, so as to realize high-speed backbone network multiclass link data It is unified to obtain convergence and protocol conversion output.
Wherein input card is based on ATCA standard implementations, for carrying multiple interfaces subcard, realizes a variety of link flows Processing and forwarding, each input card at most 4 interface subcards of carrying.Single input card is maximum to support 80G traffic aggregations.One Multiple converging devices can be according to demand set in platform equipment, could support up 4 pieces of converging devices.
Interface subcard is used to gather different link flow data, and interface subcard can select according to flow rate and discharge pattern Different subcard types.Interface subcard support standard modular interface, support ATM155M, ATM622M, POS155M, POS622M, POS2.5G, POS10G, POS40G, 10GE, 1GE interface type.
Interface subcard identifies data on flows bag according to the data stream list of maintenance, and is changed, then issues input card;It is defeated Enter the traffic filtering forwarding strategy that board is sent according to filter to forward the packet of reception or discard processing.
Filter is filtering board.Filter reads the data packet for exchanging board, identification by backplane interface The application protocol of flow, and parsed, obtained analysis result is supplied to user by exchanging the configuration interface of board, is used for Traffic filtering forwarding strategy is formulated, and the strategy is configured in filter;Filter identifies the current main net of more than 400 kinds Network flow protocol.By filtering board, the utility model realizes the load balancing of application layer.
Switch is exchange board.The multilink data on flows that converging device is sent is received in power board clamping, passes through exchange Backboard plate interface or front panel output interface, analysis is forwarded the traffic to according to traffic filtering forwarding strategy and calculates board, and Realize the exchange fusion between polylith input card data.Exchange board and configuration interface (serial ports or network interface) is provided, realize to equipment Local or Remote operation management;Wherein, all kinds of board Linktypes of converging device, link rate, link verification side can be set Formula.The load balancing of switching layer output flow, packet is averagely forwarded to by the Hash calculation to data traffic different Output port, it is main in Hash calculation to consider source IP address and purpose IP address factor, it is ensured that by same session data bag It is output to identical output interface.When certain output port failure, power board automatic identification and can bear output flow automatically It is downloaded to other several interfaces.The output weight of configuration output interface is supported, different flow export ratio is distributed for each output interface. Exchange board and realize flow copy function, while flow is transmitted into output interface, copy to other output interfaces.
Board front panel output interface is exchanged to be used to realize the cascade of equipment multilayer and calculate the function and property of analytical equipment Can extension.As shown in Figure 3.Multiple comprehensive safety monitoring analytical equipments use the form of multilayer cascade, comprehensive safety monitoring analysis Equipment is divided at least two-stage, and comprising at least a comprehensive safety in every one-level monitors analytical equipment, wherein, the output of switch Interface is connected with the input interface of the converging device of upper level comprehensive safety monitoring analytical equipment.Directly it can be connected by netting twine, Also can be connected by light pricker substitute mode.Data are unidirectional transmission upwards.
Analysis cluster is calculated to be used to extend flow analysis ability, including in performance and functionally, so as to realize equipment Distributed deployment and centralized and unified analysis.
Further, analyze computing device and calculate board for analysis.Analysis calculates the board analysis software for calculation that has been burning The general board of system, so as to complete specific flow analysis function, and export analyze data.User can be according to own analysis need Ask, select different analysis plates card insertions to enter in device board neck.The utility model provides intrusion detection module, abnormal behaviour point Analyse module, Network Content Audit module, malicious code trapping module, the alanysis software systems of fusion association analysis module five.According to Required according to analytical performance, five alanysis software systems, which can be combined, is positioned over same analysis calculating board, can also be individually placed at one Individual analysis calculates board, can also be positioned over server composition analysis computing cluster.
When the data traffic of processing is larger, analyzing can set multiple identical computing board cards to carry out simultaneously in computing module Row computing, therefore, when switch calculates to analysis sends packet, often send once, analysis computing module needs to consider The problem of data flow equilibrium assignment, the method that the utility model uses for:The packet sent for switch, extract data The source IP of bag and purpose IP, and Hash calculation is carried out to it:HASH (source IP, purpose IP), obtained binary result reconvert For decimal result;The decimal result is taken the remainder to the calculating board quantity n included in computation analysis module, and according to The value of the remainder carries out assignment of traffic:When remainder is 0, data flow is distributed into No. 1 calculating board, will when remainder is 1 Data flow distributes to No. 2 calculating board, and the rest may be inferred, and data stream is distributed according to the rule.
The analysis computing architecture is as shown in Figure 4:
Further, the intrusion detection module completes the network security threats in single packet with attack signature Alarm.Packet mainly is parsed by splitting, and the method compared with intrusion feature database is realized.Intrusion detection module is by computing board Card realizes function, and user calculates the quantity of board according to the demand to performance, selection, and inserts in device board neck.
The abnormal behaviour analysis module is completed to show the net of attack signature in network traffics in certain time window The alarm of network security threat.Mainly by counting, calculating security threat index, and the method reality compared with abnormal behavior storehouse It is existing.Abnormal behaviour analysis module realizes function by calculating board, and user calculates the number of board according to the demand to performance, selection Amount, and insert in device board neck.
The Network Content Audit module is completed to carry out security audit and to disobeying to the Web content transmitted in network traffics Rule information alarmed, mainly by reduce network application agreement, and then extract text message, compared again with violation information storehouse To method realize.Network Content Audit module realizes function by calculating board, and user calculates according to the demand to performance, selection The quantity of board, and insert in device board neck.
The program code that the malicious code trapping module is completed to transmit in network traffics carries out safety analysis function.Mainly By reducing network application agreement, the program code that extraction is transmitted and being thrown to integrated virtual execution environment monitoring programme generation Code malicious act, and then the step such as security threat of discriminating program code is realized.Malicious code trapping module is by calculating board Function is realized, user calculates the quantity of board according to the demand to performance, selection, and inserts in device board neck.
The fusion association analysis module completes analyzing again and convergence analysis function for above-mentioned module analysis result data.It is main By calling above-mentioned module, the different aspect of same security threat is analyzed by user collaborative.Association analysis module is merged by counting Calculate board and realize function, user calculates the quantity of board according to the demand to performance, selection, and inserts in device board neck.Melt The analysis result that association analysis module obtains other analysis modules is closed, when the analysis result of one of analysis module is prompted to occur During suspicious IP, fusion association analysis module calls other analysis modules analysis result related to the suspicious IP, collect point Analysis, and security incident is determine whether by the rule in correlation rule storehouse.
In summary, preferred embodiment of the present utility model is these are only, is not intended to limit of the present utility model Protection domain.All any modification, equivalent substitution and improvements within the spirit and principles of the utility model, made etc., all should be wrapped It is contained within the scope of protection of the utility model.

Claims (9)

1. a kind of comprehensive safety monitoring analytical equipment based on network traffics, it is characterised in that including cabinet, converging device, mistake Filter device, switch and analysis computing device;Wherein, converging device, filter, switch, analysis computing device lead to Cross the backboard interconnection of cabinet;
The analysis computing device calculates board by the analysis of analysis software for calculation by least one burning and formed;
The converging device includes interface subcard and input card;Interface subcard is arranged on input card;Interface subcard conduct The input interface of disparate networks link, data on flows bag, and the network that will be received are identified according to the data stream list of self maintained Link data is converted into ethernet traffic data, is then issued to input card;
The input card turns according to the traffic filtering forwarding strategy that filter is sent to the packet received from interface subcard Issue exchange board or make discard processing;
The filter reads the packet for exchanging board by the backboard, identifies the application protocol of flow, and solved Analysis, obtained analysis result is supplied to user by exchanging the configuration interface of board, for formulating traffic filtering forwarding strategy, uses Traffic filtering forwarding strategy is formulated and the strategy has been configured in filter in family;
The switch receives the data on flows that converging device is sent, and is connect by power board backplane interface or front panel output Mouthful, the analysis according to corresponding to forwarding the traffic to the traffic filtering forwarding strategy that filter is sent is calculated in board, thus right Data carry out specific flow analysis.
2. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that described Switch provides configuration interface, realizes the Local or Remote operation management to comprehensive safety monitoring analytical equipment.
3. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that described Cabinet also includes power supply, board slot, communication system and heat abstractor.
4. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that described Cabinet uses ATCA standard implementations.
5. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that each Comprehensive safety monitoring analytical equipment sets multiple converging devices according to demand.
6. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that described Interface subcard support standard modular interface, support ATM155M, ATM622M, POS155M, POS622M, POS2.5G, POS10G, POS40G, 10GE, 1GE interface type.
7. a kind of comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that described Analysis, which calculates board, includes intrusion detection module, abnormal behaviour analysis module, Network Content Audit module, malicious code capture mould Block or one kind, two kinds, three kinds, four kinds or five kinds of modules in fusion association analysis module.
A kind of 8. comprehensive safety monitoring analytical equipment based on network traffics as claimed in claim 1, it is characterised in that analysis The analysis of computing device, which calculates board, to be included merging the analysis knots that association analysis module calculates board for obtaining other analyses Fruit, when suspicious IP occurs in the analysis result prompting that one of analysis calculates board, fusion association analysis module is called other Analysis calculates the board analysis result related to the suspicious IP, and carries out Macro or mass analysis, determines whether security incident.
9. the cascade system of any one of comprehensive safety monitoring analytical equipment in a kind of 1-8 based on claim, it is special Sign is, including multiple comprehensive safeties monitoring analytical equipment, the form cascaded using multilayer, i.e.,:Comprehensive safety monitoring analysis is set Back-up is at least two-stage, per one-level in comprise at least a comprehensive safety and monitor analytical equipment, wherein, the output of switch connects Mouth is connected with the input interface of the converging device of upper level comprehensive safety monitoring analytical equipment.
CN201720341273.1U 2017-04-01 2017-04-01 A kind of comprehensive safety monitoring analytical equipment based on network traffics Expired - Fee Related CN206820776U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201720341273.1U CN206820776U (en) 2017-04-01 2017-04-01 A kind of comprehensive safety monitoring analytical equipment based on network traffics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201720341273.1U CN206820776U (en) 2017-04-01 2017-04-01 A kind of comprehensive safety monitoring analytical equipment based on network traffics

Publications (1)

Publication Number Publication Date
CN206820776U true CN206820776U (en) 2017-12-29

Family

ID=60753061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201720341273.1U Expired - Fee Related CN206820776U (en) 2017-04-01 2017-04-01 A kind of comprehensive safety monitoring analytical equipment based on network traffics

Country Status (1)

Country Link
CN (1) CN206820776U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107688743A (en) * 2017-08-14 2018-02-13 北京奇虎科技有限公司 The determination method and system of a kind of rogue program
CN111082861A (en) * 2019-12-02 2020-04-28 广东省电信规划设计院有限公司 Millimeter wave communication test system
CN112702278A (en) * 2020-12-30 2021-04-23 恒安嘉新(北京)科技股份公司 Load balancing method, convergence diverter and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107688743A (en) * 2017-08-14 2018-02-13 北京奇虎科技有限公司 The determination method and system of a kind of rogue program
CN107688743B (en) * 2017-08-14 2021-01-29 北京奇虎科技有限公司 Malicious program detection and analysis method and system
CN111082861A (en) * 2019-12-02 2020-04-28 广东省电信规划设计院有限公司 Millimeter wave communication test system
CN112702278A (en) * 2020-12-30 2021-04-23 恒安嘉新(北京)科技股份公司 Load balancing method, convergence diverter and storage medium
CN112702278B (en) * 2020-12-30 2022-08-12 恒安嘉新(北京)科技股份公司 Load balancing method, convergence diverter and storage medium

Similar Documents

Publication Publication Date Title
CN104506507B (en) A kind of sweet net safety protective system and method for SDN
CN106375384B (en) The management system and control method of image network flow in a kind of virtual network environment
US7773529B2 (en) Director device and methods thereof
CN206820776U (en) A kind of comprehensive safety monitoring analytical equipment based on network traffics
CN110224990A (en) A kind of intruding detection system based on software definition security architecture
CN101197715B (en) Method for centrally capturing mobile data service condition
CN103684922B (en) Outlet information privacy checking detection platform system based on SDN (self-defending network) and detection method
CN102801738B (en) Distributed DoS (Denial of Service) detection method and system on basis of summary matrices
CN107645542A (en) A kind of data acquisition device applied to cloud auditing system
CN104168144A (en) Method for auditing SDN
CN109558366A (en) A kind of firewall based on multiple processor structure
CN106161395A (en) A kind of prevent the method for Brute Force, Apparatus and system
CN106254338B (en) Message detecting method and device
CN106972985A (en) Accelerate the method and DPI equipment of the processing of DPI device datas and forwarding
CN102510524A (en) Control system for broadcasting network
CN101483649A (en) Network safe content processing card based on FPGA
CN107645472A (en) A kind of virtual machine traffic detecting system based on OpenFlow
CN107689958A (en) A kind of network audit subsystem applied to cloud auditing system
CN106411863A (en) Virtualization platform for processing network traffic of virtual switches in real time
CN111191247A (en) Database security audit system
CN103701824A (en) Security isolation management and control system
CN103346905B (en) A kind of method and system of signalling analysis
CN109286594A (en) The processing method and processing device of address analysis protocol message
CN102215125B (en) Network service control system
CN106878340A (en) A kind of comprehensive safety monitoring analysis system based on network traffics

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171229