Flow linkage control method, apparatus and system

A linkage control system and linkage control technology, applied in the network field, can solve problems such as inability to control illegal traffic, achieve the effect of improving the ability to resist malicious traffic attacks and improving security

Active Publication Date: 2011-06-01
CHINA UNITED NETWORK COMM GRP CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problem that the network security equipment located on a single layer cannot fully control the illegal traffic caused by the flow of illegal traffic between high / low network layers in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flow linkage control method, apparatus and system
  • Flow linkage control method, apparatus and system
  • Flow linkage control method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] figure 1 It is a flow chart of the first embodiment of the traffic linkage control method of the present invention, as shown in figure 1 As shown, the traffic linkage control method of the present invention includes:

[0025] Step 100, the network security decision-making device acquires network traffic data of each network layer;

[0026] Step 101, if there is abnormal traffic in the acquired network traffic data of each network layer, the network security decision-making device judges whether the abnormal traffic belongs to illegal traffic that needs to be controlled;

[0027] Among them, the abnormal traffic may be divided into many situations. For example, if the abnormal traffic is only a large amount of traffic but there is no malicious attack, the abnormal traffic is not illegal traffic and does not need to be controlled. If the traffic size is normal but there are Malicious attacks are illegal traffic and need to be controlled.

[0028] Step 102, if the abn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method, a device and a system for controlling flow in a linked mode. The method comprises the following steps: acquiring network flow data of each network layer; judging whether the abnormal flow belongs to illegal flows required to be controlled if an abnormal flow exists in the network flow data; and triggering network safety devices on each network layer related to the illegal flows to perform linked control on the illegal flows according to the types and the flow directions of the illegal flows if the abnormal flow belongs to the illegal flow. The device comprises an acquiring module, a first judging module and a processing module. The system comprises a network safety decision device and a network safety device. The method, the device and the system solve the problem that the network safety device positioned on a single layer cannot perform comprehensive control on the illegal flows when the illegal flows flow among high / low network layers, and adopt a linked control mode of a high / low network layer safety device to achieve the comprehensive control on the illegal flows.

Description

technical field [0001] The invention relates to network security technology, in particular to a traffic linkage control method, device and system, belonging to the field of network technology. Background technique [0002] According to the network structure, the IP metropolitan area network can be divided into: access layer, aggregation layer and backbone layer. The access layer is located in the low-level network layer, usually directly connected to user terminals, and introduces user traffic into the network; the aggregation layer is located in the middle layer of the network, and processes traffic from All communication traffic of the access layer equipment provides an uplink to the backbone layer; the backbone layer is located in the high-level network layer for high-speed information transmission. When the network is attacked or invaded by malicious illegal traffic, in many cases, these illegal traffic flows from the low-level network layer to the high-level network lay...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L29/06H04L12/801
Inventor 张超夏俊杰冯霄鹏刘惠明
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products