TCP connection managing method for internet bypass monitoring system

A monitoring system and Internet technology, applied in the field of network security, can solve problems such as the complexity of timer management, and achieve the effect of guaranteed analysis and processing

Active Publication Date: 2009-06-03
BEIJING HIGH WAY TELECOMMUNICTION TECH CO LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (3) In order to ensure the reliability of the TCP connection, multiple timers are maintained in the standard TCP connection, and different timers are used in different states, which makes the timer management too complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TCP connection managing method for internet bypass monitoring system
  • TCP connection managing method for internet bypass monitoring system
  • TCP connection managing method for internet bypass monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] The embodiment of the present invention is a TCP connection management method of an Internet bypass monitoring system, and the method specifically includes the following processing steps:

[0035] After the monitoring system is initialized, the data packet is received, and the connection node corresponding to the data packet is searched according to the data packet;

[0036] If the connection node corresponding to the data packet is found, the connection state of the node is set; if the connection node corresponding to the data packet is not found, the application layer data processing is carried out, and the result is found according to the processing result. The application layer protocol to which the data packet belongs to establish a connection node, and add the established connection node to the timeout queue;

[0037] Set and check the connection status of the node. If the connection status changes to the end state, delete the connection node and update the timeou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a TCP connection managing method for an internet bypass monitoring system. The method comprises the following steps: the monitoring system receives a data packet after the finish of initialization and searches the connection corresponding to the data packet according to the data packet; if a connection node corresponding to the data packet is found, the connection state of the node is set; if no connection node corresponding to the data packet is found, application layer data processing is carried out, the connection node is established according to an application layer protocol found according to a processing result, and the established connection node is added into an overtime alignment; the connection state of the node is set and examined, and if the connection state changes into a finish state, the connection node is deleted and the overtime alignment is updated; if the connection state does not change into the finish state, a timer maintained by the connection node is updated and time length of the timer is set according to the state of the connection node; whether the overtime alignment needs examining is judged, and if so, the overtime connection node is examined and deleted. The method realizes the convenient management of the TCP connection monitored by the monitoring system.

Description

technical field [0001] The invention relates to network security technology, in particular to a TCP connection management method in bypass data monitoring in the Internet. Background technique [0002] Data monitoring refers to the behavior of restoring the original data in the network, analyzing the network status or filtering network data to manage the protocol connection status in the network. Through data monitoring, administrators can monitor whether network resources are legally used. [0003] The TCP / IP (Trans control protocol / Internet Protocol) protocol stack has become the actual connection standard in the Internet at present. The TCP protocol belongs to the transport layer in the TCP / IP protocol stack, which provides a connection-oriented and reliable byte stream service to the application layer. Connection-oriented means that two TCP applications, usually a client and a server, must establish a TCP connection before exchanging data with each other. When the conn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/24H04L29/08
Inventor 王湘煜袁丹
Owner BEIJING HIGH WAY TELECOMMUNICTION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products