Check patentability & draft patents in minutes with Patsnap Eureka AI!

Message processing method, system and equipment

A message processing and message technology, which is applied in the field of network communication, can solve the problems of message attack security, fault location and troubleshooting, and behavior without tracking records, etc., to achieve the effect of convenient location and troubleshooting

Active Publication Date: 2007-10-24
HUAWEI TECH CO LTD
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide a packet processing method, system, and device to solve the defect that in the prior art, when DHCP Snooping is used to solve the packet attack security problem, there is no tracking record for the behavior of the attacker, and it is difficult to locate and eliminate faults.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message processing method, system and equipment
  • Message processing method, system and equipment
  • Message processing method, system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below with specific embodiments in conjunction with the accompanying drawings.

[0028] The embodiment of the present invention provides a message processing method. The binding table in the prior art only includes KEY, such as source MAC, source IP, PORT and VLAN as shown in Figure 1, the embodiment of the present invention adds two One field is used to indicate the type of the binding table, one is the normal DHCP Snooping binding entry, the other is the abnormal DHCP Snooping binding entry, because a message does not hit the normal binding entry The binding entry created by extracting relevant information from the message is also called a blacklist binding entry; another field is used to indicate the frequency of the blacklist binding entry being hit. Through the statistics of the hit frequency of the user terminal information in the blacklist binding table entry, the attacker's behavior and information can be effectiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed message process method comprises: receiving message including mark, determining whether hitting the normal bonding item according to the mark; if not, storing the mark in blacklist. This invention is benefit to locate and remove fault.

Description

technical field [0001] The present invention relates to the technical field of network communication, in particular to a message processing method, system and equipment. Background technique [0002] With the expansion of the network scale and the improvement of the network complexity, the network configuration becomes more and more complicated, and the situation that the location of the computer changes and the number of computers exceeds the IP address that can be allocated often occurs. The existing technology usually adopts DHCP (Dynamic Host Configuration Protocol, dynamic host Configuration protocol), to solve the problem of dynamic allocation of IP addresses, DHCP has the function of automatically assigning re-used network addresses and additional configuration options. [0003] DHCP encounters many security problems in the application process. The main means for attackers to use DHCP to attack include: DoS (Denial Of Service, denial of service) attack, DHCP Server sp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/06H04L12/66H04L12/26H04L12/24H04L12/46
CPCH04L61/2015H04L63/1416H04L63/101H04L61/5014
Inventor 谭学飞
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More