Flow monitoring method and system

A flow monitoring and flow technology, applied in transmission systems, digital transmission systems, electrical components, etc., to solve problems such as inability to trace the source of flow

Inactive Publication Date: 2009-06-10
CHINA UNITED NETWORK COMM GRP CO LTD +1
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a flow monitoring method and system to solve the problem that the source of flow cannot be traced and realize active flow monitoring and defense

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flow monitoring method and system
  • Flow monitoring method and system
  • Flow monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solution of the present invention will be described in further detail below with reference to the drawings and embodiments.

[0028] figure 1 It is a flow chart of the first embodiment of the flow monitoring method of the present invention. Such as figure 1 As shown, the flow monitoring method of the present invention includes:

[0029] Step 100, the router adds a packet identifier to the data packet in the passing data stream;

[0030] Step 200, the flow monitoring device monitors the flow of incoming and outgoing data streams of the protected system in real time, and when an abnormal data flow is detected, an abnormal data flow sample is extracted from the abnormal data flow, and the abnormal data flow sample is sent to the traffic management server ;

[0031] Step 300, the traffic management server receives the abnormal data flow sample sent by the traffic monitoring device, analyzes and processes the abnormal data flow sample, and locates the acces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for flow rate monitoring. The method comprises: a router adds packet identifiers in data packets in data flows passing through; a flow rate monitoring device monitors the flow rates of data flows entering or leaving a system under protection in real time and extracts an abnormal data flow sample from the abnormal data flows when monitoring the abnormal data flows and sends the abnormal data flow sample to a flow rate management server; the flow rate management server analyzes and processes the abnormal data flow sample and positions access routers of the abnormal data flows according to the packet identifiers in the data packets of the abnormal data flow sample; and the access routers process the abnormal data flows according to control commands sent by the flow rate management server. The system comprises routers, the flow rate monitoring device and the flow rate management server. The method and the system use the packet identifiers to trace the sources of the abnormal data flows and process the abnormal data flows in the access routers through which the abnormal data flow pass, realize the control and blockage of the sources of the abnormal data flows and can effectively handle DDoS attack.

Description

technical field [0001] The invention relates to network traffic monitoring technology, in particular to a traffic monitoring method and system. Background technique [0002] With the continuous development of the Internet, hacker technology is also constantly developing. Using the implantation of backdoor software, more and more broadband users have been reduced to "puppet machines" that help the evildoers. The puppet network is getting bigger and bigger. The temptation of economic interests, The difficulty of tracing the source of the attack has led more and more hackers to take risks and use puppet networks to launch attacks as the only magic weapon to get rich. These factors have led to more frequent and larger-scale distributed denial of service (Distributed Denial of Service) attacks in the network. These DDoS attacks not only cause the paralysis of the target client server and network, but also seriously It threatens the security of the operator's MAN and arouses wide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/56H04L29/06
Inventor 刘惠明
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products