A whole network traffic monitoring method

A network traffic and network monitoring technology, applied in the field of information security, can solve the problems of lack of application, not well applicable to the whole network big data monitoring, and increase the flow coverage

Active Publication Date: 2019-08-23
中国人民解放军防空兵学院
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing technology also conducts some improved research on the above-mentioned router sampling, but the current improvement method only focuses on the improvement of the solution of a single router, and is still not suitable for the monitoring of big data in the whole network.
In addition, these improved methods lack the generality of applications (e.g., different flow metrics require specific flow algorithms), and the fact that they do not take advantage of application
However, keeping track of a large number of flows increases router monitoring redundancy (each router tracks the same large set of flows), but does not increase flow coverage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A whole network traffic monitoring method
  • A whole network traffic monitoring method
  • A whole network traffic monitoring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0115] The difference between this embodiment and Embodiment 1 is that the above sampling list can also be calculated using the directed graph method to solve the edge E of the OD flow to the router 3 , the solution method is as follows: It is known to transform the entire network into a directed graph G, where V represents a node, and E represents an edge connecting each node;

[0116] V={source,sink}∪{OD i} 1≤i≤m ∪{R j} 1≤j≤n , where source represents the source point and sink represents the sink point;

[0117] E=E 1 ∪E 2 ∪E 3 , where E 1 Indicates the edge from the source point to the OD flow, E 2 represents the edge from the router to the sink, E 3 Indicates the edge of the OD flow to the router;

[0118]

[0119] Let f(x, y) represent the flow at the boundary (x, y)∈E, 1≤f≤m, and the constraints used for solving are:

[0120]

[0121]

[0122]

[0123]

[0124] Among them, T f Represents the number of OD flow f, R j Represents the resource con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for monitoring flow in the whole network, which comprises the following steps: 1. Select routers and collectors for monitoring flow in the whole network; 2. Obtain m OD flows, extract path information of OD flows, and construct OD flow flow matrix P. At the same time, OD encoding is carried out on the OD flow to form an OD-to-identification mapping table; three: use the OD flow flow matrix, the path information of the OD flow and the resource constraints of the router to calculate the sampling list of different ranges; four: assign the sampling list to Router, and distribute the OD pair identification mapping table at the same time at the entrance router; Five: The router and its collector monitor the data packets according to the OD pair identification mapping table and sampling list, and update the flow data in the flow table of the collector; Six: Collect The controller collects flow data and uploads it to form a monitoring report. In the monitoring method of the present invention, a large amount of redundancy will not be generated between routers, communication between collectors is not required, the network burden is small, the coverage rate of the entire network flow is large, and the processing efficiency is high.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a monitoring method for the entire network flow. Background technique [0002] In the prior art, network traffic monitoring relies on the number of flows at all levels collected on routers, but the monitoring capability of each router is limited, and network operators want to use the best way possible to utilize router monitoring capabilities. However, existing routers operate individually, and each router independently records the traffic it monitors. Not only does this approach not utilize router resources efficiently, but it also increases the network operator's impact on handling redundancy and data ambiguity due to multiple router monitoring. From a single point of view, the monitoring method in the prior art cannot achieve the purpose of directly specifying and realizing the whole network measurement by the network operator. And there is a primitive disconne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L12/771H04L45/60
CPCH04L43/04H04L43/06H04L43/08H04L43/50H04L45/60
Inventor 钱叶魁刘凤荣龚雁辉赵鑫张兆光邹富春杜江黄浩蒋文峰李宇翀王丙坤杨瑞朋夏军波
Owner 中国人民解放军防空兵学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products