Aging method, apparatus and system for data stream list

A data flow and network device technology, applied in the network field, can solve problems such as the upper limit of the data flow table of firewall equipment, the inability to establish data flow, and affect the normal operation of business, so as to achieve the effect of accelerating aging and reducing memory usage

Active Publication Date: 2009-02-18
XFUSION DIGITAL TECH CO LTD
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The life cycle of the data flow table is specified according to the empirical value. When the specified life cycle is too long, the data flow table has not aged, but the data flow has stopped. If there are a large number of data flow tables, it is easy to reach the data flow table of the firewall device. upper limit, resulting in the inability to establish new data streams, affecting the normal operation of the business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Aging method, apparatus and system for data stream list
  • Aging method, apparatus and system for data stream list
  • Aging method, apparatus and system for data stream list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] like figure 1 As shown, it is a flow chart of an aging method for a data flow table in an embodiment of the present invention, which may include the following steps:

[0033] Step 101, receiving the first packet of the data flow, establishing a data flow table according to the first packet of the data flow, and recording the establishment time of the data flow table.

[0034] After receiving the first packet of the data flow, a data flow table ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The inventive example discloses a data stream list degradation method, device and system. The method comprises: receiving first packet of data stream, establishing data stream list according to first packet of data stream, recording the establishment time of data stream list, counting following messages of received data stream in preset time using establishment time of the data stream as starting point, checking if counting number of following messages is smaller than preset number, if so, deleting the data stream list. The inventive example adopts degradation method based on counting following messages, accelerates degradation of data stream list, and reduces occupation of data stream for memory.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a data flow table aging method, device and system. Background technique [0002] Currently, more than 99% of data flows on the network are based on TCP (Transmission Control Protocol, Transmission Control Protocol) or UDP (User Datagram Protocol, User Datagram Protocol). How to detect and prevent attack packets in the data stream is a problem that security firewall products need to solve. The security firewall products of all equipment manufacturers in the industry are state-based. Stateful firewalls can detect the interaction status of all passing application data flows, and dynamically generate a data flow table for each application data flow. The most basic elements of the data flow table include: source address, source port, protocol number (TCP / UDP), destination port and destination address, referred to as five-tuple. [0003] Data flow tables are dynamically generated. G...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56H04L45/74
Inventor 徐耀伟
Owner XFUSION DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products