Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Uniform intimidation managing device and loading method of intimidation defense module

A technology for managing equipment and equipment, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as random packet discarding, hardware acceleration, and software that cannot meet equipment processing performance, and achieve the effect of ensuring throughput

Inactive Publication Date: 2008-07-23
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in most cases, the unified threat management device needs to perform security analysis and detection on a large amount of message content, such as anti-spam, anti-virus, etc., all need to scan the content of the entire message to determine the security of the message , and the software in the existing unified threat management device cannot meet the processing performance requirements of the device, and the use of hardware acceleration will increase the cost of the device rapidly
[0007] 2) Once the network traffic exceeds the processing capacity of the unified threat management device, the packets will be randomly discarded, and all services may be greatly affected, and the operation of key services cannot be guaranteed
However, after the QOS function is enabled, the overall performance of the unified threat management device will be further reduced, and the throughput cannot be increased.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Uniform intimidation managing device and loading method of intimidation defense module
  • Uniform intimidation managing device and loading method of intimidation defense module
  • Uniform intimidation managing device and loading method of intimidation defense module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The unified threat management device in the embodiment of the present invention will be described below with reference to the accompanying drawings.

[0024] FIG. 2 is a schematic structural diagram of a unified threat management device according to an embodiment of the present invention. include:

[0025] At least one threat defense module 1 is used to perform security detection on the message;

[0026] The adaptive loading module 2 is configured to dynamically load the threat defense module 1 according to the processing performance information of the unified threat management device.

[0027] As shown in FIG. 3 , the threat defense module 1 in the embodiment of the present invention can be any multiple of a firewall module 11 , a URL filtering module 12 , a spam filtering module 13 , a virus scanning module 14 , and an intrusion detection module 15 . The types and combinations of threat defense modules can be loaded according to actual needs, and this embodiment onl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The example of the invention discloses a method for loading unified threat management equipment and a threat defending module, the equipment comprises at least a threat defending module and a self-adaptive loading module which is used to dynamically load the threat defending module according to processing performance information of the unified threat management equipment, the method comprises: obtaining the processing performance information of the unified threat management equipment after the unified threat management equipment receives message and loading the threat defending module according to the processing performance information. From the above technical scheme, the example of the invention dynamically loads the threat defending module through a self-adaptive dynamic adjustment mode namely the processing performance of the equipment, which considers to various security defending functions and normal service processing abilities of the equipment and guarantees the throughput of the equipment to the maximum.

Description

technical field [0001] The invention relates to a network processing device and an application method thereof, in particular to a unified threat management device and a method for loading a threat defense module. Background technique [0002] With the development of network applications, network security requirements are also being updated. Traditional firewalls are mainly aimed at the attack detection of a single packet, and their defense capabilities against application-layer threats are insufficient. Therefore, based on the existing firewalls, a unified threat management is proposed. (Unified Threat Management, UTM) solution. The unified threat management device integrates the firewall and some application-layer threat defense functions, including anti-virus (Anti Virus, AV), intrusion prevention system (Intrusion Prevention System, IPS), anti-spam (Anti Spam, AS), and unified resource location (Uniform ResourceLocation, Uniform Resource Location) filtering, etc. These f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/36H04L29/06
CPCH04L63/1441
Inventor 倪秀英
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products