Link protection system and method based on dynamic planning

A technology of dynamic planning and protection system, applied in the field of information security, can solve problems affecting the development of national information security, personal leakage of privacy, etc., to ensure safe transmission, high security, and reduce the risk of data hijacking.

Active Publication Date: 2017-08-18
WUHAN HONGXU INFORMATION TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially in the process of network node transfer, after the node server is attacked as a bot, it is easy to carry out DNS hijacking, which is used by hackers for Trojan horse implantation and traffic analysis, which will eventually leak privacy for individuals, and for confidential enterprises and governments. It is said that the leakage of confidential data will affect the development of the company and the information security of the country

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link protection system and method based on dynamic planning
  • Link protection system and method based on dynamic planning
  • Link protection system and method based on dynamic planning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Below in conjunction with accompanying drawing and embodiment describe in detail:

[0056] 1. System

[0057] 1. Overall

[0058] Such as figure 1 , the system includes a link management and control center 100, a transit link server cluster 200, a user terminal 300 and a target server 400;

[0059] The link management and control center 100 interacts with the transit link server cluster 200, and the transit link server cluster 200 interacts with the user terminal 300 and the target server 400 respectively;

[0060] The link management and control center 100 includes a transit server management module 110, a link dynamic planning module 120 and a link data interaction module 130 that interact sequentially;

[0061] The transit link server cluster 200 includes the first, 2...N transit servers 210, 220...2N0, N is a natural number, 2≤N≤100;

[0062] Each transit server includes a remote interaction module, a link node acquisition module and a data forwarding module, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a link protection system and method based on dynamic planning, and relates to the field of information security. The system comprises a link management and control center (100), a transit link server cluster (200), a user terminal (300) and a target server (400); the link management and control center (100) interacts with the transit link server cluster (200), and the transit link server cluster (200) separately interacts with the user terminal (300) and the target server (400). The method comprises the following steps: (1) dynamic planning method; and (2) data forwarding method. The link protection system and method provided by the invention have the following advantages and positive effects: (1) the timeliness is strong; (2) the dynamic planning path algorithm is simple and efficient; (3) the system safety is high; (4) the system is extensible; and (5) the IP tracing is prevented.

Description

technical field [0001] The invention relates to the field of information security, in particular to a dynamic programming-based link protection system and a method thereof. Background technique [0002] With the development of network technology, the network has become the main way of people's life and work. According to the 38th "Statistical Report on Internet Development in China" by the China Internet Network Information Center, as of June 2016, the number of Internet users in China reached 710 million, and the Internet penetration rate reached 51.7%, exceeding the global average by 3.1 percentage points. The Asian average is 8.1 percentage points. The vigorous development of network technology has also brought a series of security problems, the most important of which is traffic hijacking on link nodes. The so-called traffic hijacking refers to controlling the user's online behavior through certain technical means, allowing you to open unwanted web pages and see unwant...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/727H04L45/121
CPCH04L45/121H04L63/1416H04L63/20H04L67/06H04L67/10H04L67/2866
Inventor 王骏涛
Owner WUHAN HONGXU INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products