Unlock instant, AI-driven research and patent intelligence for your innovation.

A network management model of network forensics equipment based on udt reverse penetration technology

A network and equipment technology, applied in the field of network management model of network forensics equipment, can solve problems such as failure of forensics tasks, inability to manage access to forensics equipment, and no external network IP address, etc.

Active Publication Date: 2019-12-03
武汉白虹软件科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, if a machine needs to be accessed remotely, the machine must have an accessible external network IP address. In the prior art, the data packets between the network forensics equipment and the management terminal are transmitted through the external network IP address. , but in the actual forensics work, for some reasons, the forensics equipment does not have an accessible external network IP address, which makes the network management equipment unable to effectively manage and access the forensics equipment, resulting in the failure of the forensics task

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network management model of network forensics equipment based on udt reverse penetration technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The network management model of network forensics equipment based on UDT reverse traversal technology of the present invention will be described in more detail below in conjunction with schematic diagrams, wherein a preferred embodiment of the present invention is shown, and it should be understood that those skilled in the art can modify the present invention described here , while still realizing the advantageous effects of the present invention. Therefore, the following description should be understood as the broad knowledge of those skilled in the art, but not as a limitation of the present invention.

[0020] Such as figure 1 As shown, the present invention proposes a network management model of network forensics equipment based on UDT reverse penetration technology, comprising the following steps:

[0021] In the first step, the network forensics device 2 establishes a UDT connection with the network management server 3 through a fixed port number by means of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a network management model of network evidence collection equipment based on UDT reverse penetration technology. The network management server of the network establishes a connection, so that the network forensics device has the function of communicating with the external network device without the external network IP address, and then the management terminal can remotely manage the network forensics device without the external network IP address, that is to say It can allow a machine to access a device without an external IP address, and then pair it with a network management server with an external IP address to realize the function of remote management of this machine. When the network card is not enough or it is not convenient to equip In the case of IP, it is necessary to obtain the connection with the external network, which has potential application prospects.

Description

technical field [0001] The invention relates to the field of computers, in particular to a network management model of network forensics equipment based on UDT reverse penetration technology. Background technique [0002] At present, network forensics technology has achieved great development in our country. Network forensics is mainly based on certain methods and network core routing communication data forensics system to obtain some illegal network behavior and cyber crime evidence of the target object. The entrance of the communication equipment is equipped with temporary detection and evidence collection equipment, which analyzes and monitors the short-term and short-distance network communication behavior of the target object, and then obtains the electronic evidence of the target object's first-hand illegal network activities and behaviors. [0003] At present, if a machine needs to be accessed remotely, the machine must have an accessible external network IP address. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/08H04L29/12
CPCH04L41/14H04L61/2567H04L67/125H04L67/565
Inventor 胡彬
Owner 武汉白虹软件科技有限公司