Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security monitoring service recovery method and system

A technology of security monitoring and recovery method, applied in the field of network communication, can solve the problems of client discarding, inconvenient maintenance, user inconvenience, etc., and achieve the effect of recovering security monitoring services

Active Publication Date: 2009-05-13
CHINA TELECOM CORP LTD
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the security binding table can not only be dynamically established according to the DHCP Reply message, but also can be statically configured, but this method has a large workload and is not easy to maintain, so there are many application restrictions
[0003] The monitoring device can use a single-group network or a dual-homing network (active and standby monitoring device) in networking. When DHCP monitoring is enabled, if the monitoring device fails, the service will be interrupted, and the user will not be able to communicate for a long time. Happening
For a stand-alone network, the monitoring device restarts to restore the service, but the security binding table information dynamically learned before the restart will be lost, and all client packets will be discarded. The client can only wait until the contract is renewed or the lease expires, and the client reapplies. Communication can only be resumed after the address
For a dual-homing network, when the active monitoring device restarts due to a fault, other functions (STP series protocols deployed in a layer 2 network, VRRP protocol deployed in a layer 3 network, etc.) can be rerouted to the backup monitoring device. There is no relevant security binding table information on the standby monitoring device, and all client packets will be discarded, and the business will be interrupted. Communication can only be resumed after the client re-applies for an address.
[0004] In order to overcome the inconvenience caused by the interruption of communication in the dual-homing network, in the prior art, all the messages of the client are forwarded to the standby monitoring device without matching the security binding table. Uninterrupted, but can no longer provide security monitoring services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security monitoring service recovery method and system
  • Security monitoring service recovery method and system
  • Security monitoring service recovery method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0063] The present invention backs up the security binding table of the monitoring device through the backup device, and sends the backup security binding table to the monitoring device that continues the original business after the backup device fails, so as to quickly restore the security monitoring service on the monitoring device, Ensure the safety of users using services.

[0064] Such as figure 1 As shown, it is a schematic flow chart of an embodiment of the method for restoring the security monitoring service under the single-unit network of the present invention. This embodiment includes the following steps:

[0065] Step 101, after the monitoring device fails and restarts, send a fault alarm notification to the backup device with the backup security binding table;

[0066] Step 102, after the backup device r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method of single fighter under mesh security monitor service recovery which comprises the following steps: transmitting trouble alarm notification to backing up device with a security binding table after audio monitor trouble-rebooting; transmitting security binding table to the audio monitor after received trouble alarm notification by backing up device; recovering legal message check according to security binding table after received the security binding table by audio monitor. The invention also relates to a method of double-returning group under mesh security monitor service recovery, and under mesh security monitor service recovery system of single fighter and double-returning group. Backing up the security binding table in backing up device before monitoring device or main monitoring device trouble, and transmitting security binding table back through backing up device after trouble, to make the monitoring device or backing up device can rebuild the security binding table rapidly and recover security monitor service.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method and a system applicable to network operators of Internet Protocol (Internet Protocol, referred to as IP) to quickly restore safety monitoring services when monitoring equipment fails. Background technique [0002] When the Dynamic Host Configuration Protocol (DHCP) is applied in the network, security problems such as Denial of Service (DOS) and man-in-the-middle attacks may be encountered, which are usually caused by attackers with bad intentions spoofing The IP address and the Medium Access Control (MAC for short) address use an Address Resolution Protocol (ARP for short) message or an IP message to launch an attack. In order to solve this kind of spoofing attack, the DHCP snooping (DHCP Snooping) function is usually enabled on the routing device or switching device, and the IP address, MAC address, interface and virtual local area network (Virtual LAN Local Area N...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/12
Inventor 孙颖
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products