Method and device for security processing of data stream
A technology for secure processing and data flow, applied in the field of communication, which can solve the problems of low security performance and heavy load.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0077] Figure 1A It is a flow chart of the data stream security processing method provided by Embodiment 1 of the present invention, as shown in Figure 1A As shown, it specifically includes the following steps:
[0078] Step 101. Obtain feature information of a data stream, where the feature information includes source and destination information of the data stream;
[0079] Step 102. Determine the security level of the data flow according to the feature information;
[0080] When a data flow needs to be forwarded, the controller can obtain the characteristic information of the data flow and the link status of the current network device (such as port congestion, forwarding line speed, etc.), and then determine the link status and the characteristic information of the data flow For the security level of the data flow, the method for determining the security level is not limited in the present invention.
[0081] Step 103. Determine a forwarding path for transmitting the data...
Embodiment 2
[0104] Embodiment 2 is based on Embodiment 1, and is a specific description of determining different path search mechanisms according to different security levels in Embodiment 1. The path search mechanism in Embodiment 1 can be the shortest path search mechanism and the shortest safe path search mechanism. and the fastest detection path search mechanism, the path search mechanism of the present invention is not limited to the above three path search mechanisms.
[0105] The determination of the security level can be specifically exemplified in the following two ways, but is not limited to the following two ways.
[0106] Method 1: Divide the security level based on the source of the data flow. A specific example is to divide the security level according to the reliability of the data flow source. Different security levels correspond to different path search mechanisms. The specific division is shown in Table 1. .
[0107] Table 1. Mode 1 security level classification
[010...
Embodiment 3
[0196] Embodiment 3 is a combination of Embodiment 1 and Embodiment 2, and a specific description of the data flow security processing method. image 3 The flow chart of the data flow security processing method provided by Embodiment 3 of the present invention, as shown in image 3 As shown, it specifically includes the following steps:
[0197] Step 301, obtaining network topology information;
[0198] The network topology information includes the status information of the security device and the forwarding device, as well as the connection relationship between them. At the same time, the security capability information of the security device can be obtained. The security capability information includes the security capability information of layers 2-3 and the layer 2-7 security capability information.
[0199] Step 302, acquiring characteristic information of the data flow, and determining the security level of the data flow;
[0200] Step 303, determine according to the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 