URL lookup method for URL filtering system

A technology of filtering system and establishing method, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as large storage space, search efficiency constraints, etc., and achieve the effects of high storage efficiency, fast search speed, and convenient and effective control.

Inactive Publication Date: 2009-12-16
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 2. Storing millions of URL strings in the blacklist requires huge storage space, and an effective method is needed to compress these URLs to a reasonable size;
[0008] 3. For the URL filtering system, the URL lookup m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • URL lookup method for URL filtering system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0076] Example 1: The request URL is: "http: / / network.cs.bit.edu.cn / research / projects / ", the specific search steps are as follows:

[0077] Step (1): Use the compression step in step 1 to compress the request URL into a string of (c / 8)*n bytes. In this example, c=32, n=3, so "http: / / network.cs.bit.edu.cn / research / projects / " is compressed into a 12-byte string 0x2336F04B57EB50C25C93B3A4;

[0078] The 2nd step: (c / 8)*n=12, m=4, the value of (c / 8)*n is not less than m, go to the 3rd step;

[0079] Step (3): B=2, m=4, using the hash function used in step 2 to set up the suffix table, the calculated hash value h=61515;

[0080] Step (4): B'=2, using the hash function used in step 2 to establish the prefix table, the value of the calculated "URL prefix" is 9014;

[0081] The 5th step: h=61515, the URL (0x2336F04BA4698DB2) pointed to by the SUFFIX[h] pointer is not empty, go to the 6th step;

[0082] Step (6): h=61515, the value of the URL (0x2336F04BA4698DB2) pointed to by the SU...

example 2

[0085] Example 2: The request URL is: "http: / / www.sina.com.cn / ", the specific search steps are as follows:

[0086]Step (1): Use the compression step in step 1 to compress the request URL into a string of (c / 8)*n bytes. In this example, c=32, n=1, so "http: / / www.sina.com.cn / " is compressed into a 4-byte string 0x24BCB313;

[0087] The 2nd step: (c / 8)*n=4, m=4, the value of (c / 8)*n is not less than m, go to the 3rd step;

[0088] Step (3): B=2, m=4, using the hash function used in step 2 to set up the suffix table, the calculated hash value h=45843;

[0089] Step (4): B'=2, using the hash function used in step 2 to establish the prefix table, the value of the calculated "URL_prefix" is 9404;

[0090] Step (5): h=45843, the URL (0x24BCB313) pointed to by the SUFFIX[h] pointer is not empty, go to step (6);

[0091] Step (6): The value of the URL (0x24BCB313) pointed to by the SUFFIX[h] pointer in the prefix table PREFIX is equal to "URL_prefix". Compare the URL (0x24BCB313) p...

example 3

[0092] Example 3: The request URL is: "http: / / www.baidu.com / ", the specific search steps are as follows:

[0093] Step (1): Use the compression step in step 1 to compress the request URL into a string of (c / 8)*n bytes. In this example, c=32, n=1, so "http: / / www.baidu.com / " is compressed into a 4-byte string 0x171BC50D;

[0094] The 2nd step: (c / 8)*n=4, m=4, the value of (c / 8)*n is not less than m, go to the 3rd step;

[0095] Step (3): B=2, m=4, using the hash function used in step 2 to set up the suffix table, the calculated hash value h=50445;

[0096] Step (4): B'=2, using the hash function used in step 2 to establish the prefix table, the value of the calculated "URL_prefix" is 5915;

[0097] Step (5): h=50445, the URL pointed to by the SUFFIX[h] pointer is empty, report "not found", and end the process.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network information security, in particular to a uniform resource locater (URL) lookup method. The invention combines a hash method and a multi-string matching method in the prior URL lookup method and provides a URL lookup method well meeting the requirements of performance and functions of a URL filtering system. Compared with the prior lookup method, the URL lookup method for the URL filtering system is quick in lookup, stable in performance and high in storage rate, can meet the storage requirements of a constantly increasing URL blacklist and supports premix matching. The URL lookup method is applicable to the URL filtering system, can realize the effective control of online behaviors of users conveniently and can also be used in other network applications such as search engine, web cache and layer-7 switching.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a method for searching a Uniform Resource Locator (URL), which is suitable for a URL filtering system. Background technique [0002] As the largest information center in the world, the Internet is developing at an astonishing speed. It consists of hundreds of millions of websites, each of which has a unique identifier called a URL. The information on the Internet is mixed, and there are quite a few websites that promote violence, pornography, reactionary and other harmful information. Visiting these sites can have a huge impact on a teenager's physical and mental health. In addition, there are also some suspicious websites that contain malicious software, which can threaten the user's personal privacy and even damage the user's computer. [0003] How to ensure the security of the Internet and maintain a healthy network environment has become an urgent prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/36
Inventor 嵩天周舟贾云得
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products