Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identification method of inside and outside network messages

A network message and identification method technology, which is applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems that affect the processing performance and cannot identify the message of forged address, and achieve limited resource usage and processing method simple effect

Inactive Publication Date: 2009-09-30
BEIJING VENUS INFORMATION TECH
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, internal and external network packets are mostly identified by defining internal network addresses, but this method needs to be configured during use, and multiple address comparisons are performed, which affects processing performance and cannot identify packets with forged addresses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method of inside and outside network messages
  • Identification method of inside and outside network messages
  • Identification method of inside and outside network messages

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] This embodiment is a method for identifying internal and external network messages. The hardware used in the method includes: the Internet, local area networks, computer terminals, servers, workstations, and routers to form an application environment, such as figure 1 shown. From the perspective of internal and external networks, the application environment can be divided into the following parts:

[0017] ●Internal network: refers to the internal local area network environment used for user work, generally including hosts, servers, network equipment, etc.;

[0018] ●External network: refers to the internet international network;

[0019] ●Network switching equipment: refers to the network equipment that completes the data exchange between the internal network and the external network, such as various routers, proxy servers, etc.;

[0020] Security monitoring equipment: Refers to the security monitoring equipment connected to the network switching equipment, receiving...

Embodiment 2

[0030] This embodiment is a refinement of embodiment one, and is about the sub-steps in the steps analyzed in embodiment one:

[0031] Determine whether it is an external network packet or an internal network packet according to the depreciation of the TTL value;

[0032] At the same time, read the TTL distribution table of the internal and external network packets, and confirm the relationship between the network identification words: 0 indicates abnormal packets, 1 indicates external network packets, and 2 indicates internal network packets, so as to determine the text and intranet messages.

[0033] figure 2 Describes the TTL distribution table of internal and external network packets. TTL is a time-to-live value of a network packet, which is decremented by one each time a packet passes through a router. Since the internal network is relatively simple and there are few or no routers, the value of TTL will not be decremented more than 5 times from the sending point of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identification method of inside and outside network messages, which is a method widely used for preventing network intrusion in a safety system and a network audit safety system for monitoring network messages. The identification method comprises an internet, a local area network, a computer terminal, a server, a workstation and a router, and comprises the steps of reading the network messages, obtaining TTL numerical values, analyzing and recording. The invention identifies the inside and the outside network messages according to the characteristics of the networkmessages, confirms the inside and outside network messages according to the decrement amounts of the TTL numerical values and identifies the inside network messages, the outside network messages and abnormal network messages according to the relation between the TTL numerical values and inside and outside network identification words. The method has very simple treatability method and very limited usage resources without special configurations and can achieve fast speed. The areas that attacking events occur can be confirmed by identifying the inside and outside network messages.

Description

technical field [0001] The invention relates to a method for identifying internal and external network messages, a method for ensuring computer network security, and a method widely used in a security system for monitoring network messages and a network audit security system to prevent network intrusion . Background technique [0002] Computer network security has become a very important issue. As any kind of network monitoring system, it is hoped to be able to distinguish the transmission direction attribute of the monitored network packets, so as to distinguish the processing, and carry out attacks from the internal network to the external network and from the external network to the internal network. Analysis of the results of cyber attacks, etc. The internal network refers to the local LAN, the external network refers to the Internet, the internal network message refers to the message sent from the internal network to the external network, and the external network messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/56H04L29/06H04L12/70
Inventor 许金鹏邓炜肖成民景晓辉
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products