Unified threat management system and data processing method thereof

A technology for managing systems and data, applied in the field of network security, can solve the problems of sensitive propagation of faults, affecting the function processing of predecessor modules, data privatization, etc., to achieve the effect of improving processing speed and strong dynamic scalability

Inactive Publication Date: 2012-03-21
BEIJING VENUS INFORMATION TECH +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(3) The input of each functional module is passive, which means that the data input is pushed by other modules, and the type of input data cannot be proposed by itself
[0007] The directly coupled integrated security gateway software structure has the following deficiencies: (1) Data privatization caused by direct coupling is not conducive to the dynamic expansion of system functions
When a module outputs data, it is necessary to ensure that the receiver of the data is alive and able to receive the data. Once the subsequent module cannot receive and process data in time, it may affect the functional processing of the previous module.
This backward dependence makes the system more sensitive to the propagation of faults, which is not conducive to the fault tolerance and stability of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified threat management system and data processing method thereof
  • Unified threat management system and data processing method thereof
  • Unified threat management system and data processing method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Embodiment 1, a unified threat management system, such as figure 2 shown, including:

[0063] The data storage module 102 includes a plurality of data pools, each data pool is used to store a type of data, and the types of data stored in each data pool are different from each other; The type is divided into different storage sub-modules, and each storage sub-module is called a data pool;

[0064] The service processing module 103 includes one or more computing pools, each computing pool is used to perform a processing operation to realize a service function, and read data from the data pool used to store the type of data required by the computing pool, Output the processed data to the data pool for storing this type of data; the service functions provided by each computing pool are different from each other; that is to say, the service processing module 103 is divided into different service sub-modules according to the different service functions provided, Each servi...

Embodiment 2

[0088] Embodiment 2, a unified threat management system includes the service processing module 103 , data storage module 102 and management center 101 in Embodiment 1.

[0089] In this embodiment, each data pool is as Figure 5 As shown, they can specifically include:

[0090] The memory is used to save the data of the type corresponding to the data pool, and to save the second identification of all the computing pools that need the data of this type;

[0091] The data monitor 1021 is configured to store and record the data in the memory when receiving data (which may be the original network packet data, or the data output by the computing pool in the service processing module 103) storage location; after each save, a data extraction notification is generated, sent to the computing pool corresponding to the second identifier saved in the memory, and the data storage location of this record is carried in the data extraction notification; and when a computing pool is received ...

Embodiment 3

[0097] Embodiment 3, a unified threat management system includes the service processing module 103 , the data storage module 102 and the management center 101 in Embodiment 1 or 2.

[0098] In this embodiment, each computing pool is as Figure 6 As shown, they can specifically include:

[0099] The executor 1032 is used to execute one or more processing processes that implement the service functions corresponding to the computing pool; when there are multiple processing processes, these processing processes can be the same or different; each processing process processes the input data and then outputs ; Executor 1032 can be regarded as a set of processing processes;

[0100] The service manager 1031 is configured to, after receiving the data extraction notification from a data pool, return a data extraction message to the data pool when the data needs to be used, which carries the data storage location carried in the data extraction notification; from After the data is extra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a unified threat management system and a data processing method thereof. The system comprises a data storage module, a service processing module and a management center, wherein the data storage module comprises a plurality of data pools; all the data pools are respectively used for storing data of one type; the service processing module comprises one or more than one computing pool; all computing pools are respectively used for performing processing operation for achieving one service function, reading the data from the data pools used for storing the data of which the type is required by the computing pools, and outputting the processed data to the data pools used for storing the data of the type; and the management center is used for saving a first corresponding relation between each data pool and each type of the data, and a second corresponding relation between each computing pool and each service function. The unified threat management system and the data processing method thereof provided by the invention are capable of overcoming defects in the aspects of dynamic expansibility and fault tolerance in a directly coupled integrated security gateway.

Description

technical field [0001] The invention relates to the field of network security, in particular to a unified threat management system and a data processing method thereof. Background technique [0002] UTM (Unified Threat Management, security gateway) is a gateway product, and the software structure should be conducive to improving the overall performance. UTM, as a unified threat management product, covers many functions such as intrusion prevention, anti-virus, anti-spam, content filtering and traffic management, so it must include multiple analysis and processing engines, how to integrate analysis and processing engines, and combine performance consumption The key business unit becomes the primary consideration in the design of UTM product software structure. A more popular way in the industry is to introduce an integrated design concept into the software structure design of the integrated security gateway. The analysis and processing engine of various functions such as in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24
CPCG06F11/00
Inventor 周力丹胡振宇叶润国袁智辉
Owner BEIJING VENUS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products