Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for filtrating network rubbish information supported by multiple protocols

A spam and spam technology, applied in data exchange network, user identity/authority verification, digital transmission system, etc., can solve problems such as poor intelligence, inability to process large flow of information, and inability to block spam in real time

Inactive Publication Date: 2008-12-24
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Spam information cannot be blocked in real time. It will be analyzed after the spam information arrives. In this way, the bandwidth occupation caused by spam information has already formed.
[0005] 2 Working on the client side, it can only handle small flow information, but cannot handle large flow information
There are two main reasons for this preference in academic research: one is that during the long-term "fighting" between anti-spam supporters and spammers, the traditional black-and-white list-based and rule-based filtering Due to its inherent defects (such as: poor flexibility, poor intelligence, high false negative rate and false positive rate), the method has been difficult to cope with the increasingly sophisticated spammers, and the statistical method with learning ability is in theoretical research and In practical applications, it shows extraordinary superiority. Well-trained statistical filters can often block some spam with insignificant characteristics with high accuracy, and even identify some unknown spam through self-learning ; Another reason is the famous assertion made by Paul Graham, the pioneer who introduced the Naive Bayes method into the field of anti-spam processing, in the article "A Plan For Spam": "The Achilles heel of the spammersis their message."

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for filtrating network rubbish information supported by multiple protocols
  • Method and apparatus for filtrating network rubbish information supported by multiple protocols
  • Method and apparatus for filtrating network rubbish information supported by multiple protocols

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0174] The implementation of the technical solution will be further described in detail below in conjunction with the accompanying drawings.

[0175] see figure 1 , which is a general flowchart of the whole device. When the network information is transmitted from the source host to the destination host (110) through the internet (101), the data packet redirection module uses netfilter / iptables (102) to detain the relevant protocol information and store it in the IP packet queue. The receiving and re-injecting IP packet module (103) directs the data packet from the kernel state to the user state, and then performs protocol analysis (104) on the data packet, mainly completing IP fragmentation reassembly and TCP data flow reassembly. When the TCP data stream recombination is completed, the completed information, such as the completed mail, can be obtained, and the restored information is stored in the double buffer queue. The multi-thread scheduling analysis module (105) utili...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network garbage information filtering method supported by multiprotocols and based on the transparent bridge, and a device, which belongs to the information security domain. The method and the device comprise a transparent bridge, data packet redirection, IP packet receiving and reinjecting, protocol analysis, a multi-thread scheduling analysis module and filtering modules (such as a mail filtering module and a short message filtering module, etc.) of various protocols. The method and the device adopt the technical proposal that the related information in the network is detained on the well-built linux transparent bridge by using iptables / netfilter, then ip lamination processing is completed, tcp data stream is restored, and complete network information is obtained and stored in a double-buffering queue; then the worker thread in a thread-scheduling awakened thread pool retrieves information form the double-buffering queue, and different filtering modules are invoked for filtering; the information is discarded when being judged as the garbage information, otherwise, the information is released. The device can be positioned at the front end of the gateway of a large and medium-sized enterprise or deployed at the front end of a border router for filtering the network information.

Description

technical field [0001] The present invention relates to a garbage information filtering method and device supported by multi-protocols. The netfilter and iptables modules in Linux are used to detain the packets of related protocols, and then simulate the protocol stack to analyze and restore the protocols of ip and tcp layers to obtain complete Network information (complete email information, SMS or web page information, etc.). Finally, use behavior filtering, bayes filtering, rule filtering and other methods to analyze the information and determine its nature. Background technique [0002] There are some spam filtering products at home and abroad, most of which are based on hardware and can block in real time, but the price is very expensive. Please refer to the figure below for details. Most products have a common problem, poor scalability. In addition, the execution efficiency of the program is too dependent on the hardware. [0003] There are also many spam filtering ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04L9/32
Inventor 何兴高高嵘秦志光李晓程红蓉郑梅
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products