Application proxy-based network management system isolation control device

A technology for applying agents and control devices, applied in the network field, to achieve the effect of enhanced control

Inactive Publication Date: 2011-04-06
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF2 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, it is unavoidable for attackers to use the loopholes in the TCP / IP protocol itself to carry out network attacks, such as synchronous code flood attack (SynFlood attack), denial of service attack (DoS attack), field anomaly attack (Flag Exception attack), etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application proxy-based network management system isolation control device
  • Application proxy-based network management system isolation control device
  • Application proxy-based network management system isolation control device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Below, refer to the attached Figure 1~5 The application agent-based network management system isolation control device of the present invention is described in detail.

[0027] like figure 2 As shown, the application agent-based network management system isolation control device of the present invention includes an internal network processing unit, an external network processing unit and a data exchange unit.

[0028] Among them, the intranet processing unit includes an isolated switching control module and an application agent module, wherein the isolated switching control module of the intranet processing unit is used to realize the encapsulation and restoration of the special format of data transmitted between the internal and external network processing units, that is, from the bottom layer The driver obtains the data transmitted by the external network processing unit, encapsulates and restores it from the data link layer to the application layer in turn, and di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an application proxy-based network management system isolation control device, which comprises an intranet processing unit, an extranet processing unit and a data exchange unit, wherein the intranet processing unit comprises an isolation exchange control module and an application proxy module; the extranet processing unit comprises an isolation exchange control module and an application proxy module; and the data exchange unit consists of a special bus interface and a bus switch and is based on an non-(internet protocol) IP protocol, the special data bus exchanges the data between the intranet processing unit and the extranet processing unit, and prevents attack from the leaks of the transmission control protocol (TCP) / IP. In the invention, the network attack behavior aiming at a TCP stack can be prevented by adopting a specific non-IP protocol and an internal isolation exchange interface.

Description

technical field [0001] The invention relates to network technology, in particular to an isolation control device for a network management system based on an application agent. Background technique [0002] In order to achieve network isolation and data exchange between different network management systems, and to solve the problem of inability to isolate user flows and network flows between network systems, it is necessary to isolate and control network management systems based on application agents, especially to ensure that the Common Object Request Broker system protocol (Common Object Request Broker) Architecture, CORBA), Simple Network Management Protocol (Simple Network Management Protocol, SNMP) protocol, Common Management Information Protocol (Common Management Information Protocol, CMIP) and other effective isolation between different network management protocols. [0003] Traditional border logic isolation devices are generally packet filtering firewalls. At the ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56H04L12/24
Inventor 唐晋邹继伟刘晓毅曾梦岐
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products