Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A hash storage method based on ip quintuple

A quintuple and hash technology, applied in the field of network session statistics and analysis, can solve the problems of slow addition and search, uneven distribution of hashes, etc., achieve uniform distribution of hash storage, reduce hash conflicts, and improve hash The effect of storage efficiency

Active Publication Date: 2019-01-11
GUANGDONG EFLYCLOUD COMPUTING CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of this, the embodiment of the present invention provides a hash storage method based on IP quintuples to solve the problems of uneven hash distribution, slow addition and search speed in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hash storage method based on ip quintuple
  • A hash storage method based on ip quintuple

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] figure 1 It is a schematic flowchart of an IP quintuple-based hash storage method provided by Embodiment 1. This method is applicable to the case of converting larger data information into smaller data information and storing them in a large-traffic network environment, which is convenient for access and statistical analysis. The method is executed by a device based on an IP quintuple hash storage method, the device can be set in a terminal, and can be realized in the form of software and / or hardware. For example, operators such as Internet Service Provider (ISP, Internet Service Provider), Internet Content Provider (ICP, Internet Content Provider), Internet Data Center (IDC, Internet Data Center) and other operators can use this method to detect and clean the traffic. Ensure the normal and stable operation of the network and the normal development of business.

[0023] Such as figure 1 As shown, the method includes:

[0024] S110. Receive a session information quer...

Embodiment 2

[0049] This embodiment is based on Embodiment 1, and further performs the following operations after traversing all session storage units pointed to by the current second hash array and searching for the session storage unit corresponding to the IP quintuple:

[0050] If the session storage unit corresponding to the IP quintuple is not found, then apply for a new session storage unit in the storage space, store the IP quintuple information in the new session storage unit, and use according to the first hash The first unit identifier and the second unit identifier calculated by the Hive function and the second hash function determine a final second hash array, and the final second hash array is used to point to the new session storage unit.

[0051] Further, if the final second hash array does not point to the session storage unit, directly make the final second hash array point to the new session storage unit, and then return to the new session storage unit session information...

Embodiment 3

[0056] figure 2 It is a schematic flowchart of an IP quintuple-based hash storage method provided by Embodiment 3. In this embodiment, on the basis of the foregoing embodiments, the entire solution is embodied and described in a complete manner for easy understanding. This embodiment only describes the hash storage method based on the IP quintuple but does not limit the method.

[0057] First, in this embodiment, the first hash function is set to F, and the second hash function is set to f. The length of the first hash array H is A, and the length of the second hash array h is a. Set the storage unit structure M{link[sip,dip,sport,dport,protocol],prev,next,count} to store IP quintuple information.

[0058] Such as figure 2 As shown, the method includes:

[0059] S210. Find the session according to the IP quintuple.

[0060] S220. Calculate and obtain the hash position H[h] through the function F and the function f.

[0061] Obtain the first unit ID and the second unit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an IP quintuple based Hash storage method. The method comprises a session information query request is received; according to the IP quintuple in the session information query request, a first unit identification of a first Hash array is determined based on a first Hash function, a second unit identification of a second Hash array is determined based on a second Hash function, and each unit in the first Hash array is used to store the second Hash array; a current second Hash array is determined according to the first unit identification and the second unit identification; a session storage unit corresponding to the IP quintuple is searched among all session storage units directed by the current second Hash array; and session information is obtained from the session storage unit. The method of the invention can be used to solve the problems that Hash distribution is not uniform, the addition speed is low and the searching speed is low in an IP quintuple Hash storage method in the prior art.

Description

technical field [0001] The invention relates to the field of statistical analysis of network sessions, in particular to an IP quintuple-based hash storage method. Background technique [0002] Denial of Service attack (DoS, Denial of Service) refers to using various service requests to exhaust the system resources of the attacked network, so that the attacked network cannot process the requests of legitimate users. With the rise of botnets, and due to the characteristics of simple attack methods, large impact, and difficulty in tracing, distributed denial of service attacks (DDoS, Distributed Denial of Service) have grown rapidly and become increasingly rampant. A botnet composed of tens of thousands of hosts provides the required bandwidth and hosts for DDoS attacks, forming a huge attack and network traffic, causing great harm to the attacked network. [0003] With the continuous improvement and development of DDoS attack technology, operators such as Internet Service Pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
CPCH04L41/142
Inventor 梁润强史伟麦剑黄衍博曾宪力
Owner GUANGDONG EFLYCLOUD COMPUTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products