Supercharge Your Innovation With Domain-Expert AI Agents!

Flow limit system and method thereof based on network processor

A network processor and traffic limitation technology, applied in the field of network information security, can solve problems such as difficulty in guaranteeing QoS, lag, and inability to guarantee QoS, and achieve the effects of shortening the development cycle, ensuring QoS, and ensuring stability

Inactive Publication Date: 2010-08-11
SOUTH CHINA UNIV OF TECH
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the abnormal traffic restriction technology matched with the abnormal traffic detection technology is relatively lagging behind
At present, traffic limitation is generally associated with load balancing, and traffic limitation is adopted only for the purpose of system load balancing. Although this can ensure system stability, it is difficult to guarantee high-quality QoS (Quality of Service, Quality of Service) )
On the other hand, the TCP / IP protocol itself has congestion control technology related to flow limitation, which has a good control effect on normal flow and can also guarantee the necessary QoS, but when it comes to abnormal flow, it seems powerless , cannot guarantee the necessary QoS
Furthermore, most of the existing traffic limitation methods lack adaptability and intelligence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flow limit system and method thereof based on network processor
  • Flow limit system and method thereof based on network processor
  • Flow limit system and method thereof based on network processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described in detail below in conjunction with the embodiments and drawings, but the embodiments of the present invention are not limited thereto.

[0040] like figure 1 As shown, a flow limiting system based on a network processor includes a network processor and a host computer; the network processor is connected with a DRAM memory and an SRAM memory.

[0041] Among them, the DRAM memory is used to store the original information of the data packet, including source address, destination address, source port number, destination port number, protocol type and data packet size, etc.; Status information includes flow size and time, etc.

[0042] The network processor is composed of micro-engine cluster, Xscale Core and MSF switching structure in hardware.

[0043] The software of the network processor includes MSF switching structure, traffic sniffing micromodule, traffic filtering micromodule, learning machine and Xscale management i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a flow limit system and a method thereof based on a network processor, the system comprises a network processor and a supervisory computer; the network processor is connected with a DRAM memory and a SRAM memory; the network processor is provided with an MSF exchanging structure, a flow sniffing micromodule, a flow filtering micromodule, a learning machine and an Xscale management interface. The high speed performance of the network processor is effectively utilized, a relevant flow limiting policy is made through the self-learning function of the learning machine, different flow limiting policies are carried out according to the state of network packets which are stored in the DRAM memory and a policy table in the SRAM memory, normal network flow is ensured to be unblocked, and the data flow of untrusted users and blacklist users can be quickly and effectively limited, thereby achieving the purpose of protecting the system.

Description

technical field [0001] The invention relates to the field of network information security, in particular to a flow limiting system and method based on a network processor. Background technique [0002] With the rapid development of the network, the problem of network security is becoming more and more serious. From the analysis of most network security incidents, the network traffic will show abnormality when a security threat occurs, so the detection and restriction of network traffic has a very positive significance for ensuring network security. Abnormal network traffic refers to obvious irregular changes in network traffic within a certain period of time. In general, the causes of abnormal network traffic can be roughly divided into two categories: system or network configuration errors that cause network traffic to reach the environmental tolerance limit; malicious network attacks occur. So far, a large number of domestic and foreign researchers have conducted in-dept...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/06H04L12/801
Inventor 谢胜利赖粤赖运娥关广才
Owner SOUTH CHINA UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More