Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Traffic safety control method and system based on DPI and cloud synchronization

A technology of security control and flow control, applied in transmission systems, electrical components, etc., can solve problems such as only finding WIFI providers, overwhelming free WIFI, and inability to achieve real-name Internet access, achieving significant social and economic benefits, Alter unsafe, broadly inclusive effects

Inactive Publication Date: 2017-10-20
XIDIAN UNIV
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are three major safety hazards in free WIFI: first, the public WIFI set up by businesses does not have a basic online recording function, and cannot realize real-name Internet access. Once a cyber crime occurs, the perpetrator cannot be found, only the WIFI provider; The second is that the merchant’s password is too simple, and various management ports have not been closed. Once someone enters the main router, tampers with the DSN server information, etc., and hijacks the router; Shen, it only takes a few minutes to steal personal information and passwords on mobile phones, including online banking passwords, stock trading account passwords, credit card passwords, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic safety control method and system based on DPI and cloud synchronization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] see figure 1 , the present invention provides a DPI-based and cloud-synchronized security traffic control system, including a traffic controller and a log server, a router / switch, a cloud server, and an upper-layer traffic provider respectively connected to the traffic controller.

[0031] Flow controller: used to realize the function of flow analysis, detection and filtration. At the same time, the system log will be uploaded to a dedicated log server, which is convenient for later error analysis and system tuning.

[0032] The flow control device is provided with a malicious website filtering module, a malicious behavior identification and response module, a VLAN isolation module and a secondary authentication module.

[0033] The malicious URL filtering module uses cloud synchronization technology to synchronize the malicious URL stored in the cloud database to the AP. When the user issues a command to visit a website, the AP will match the URL with the URL in the m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a traffic safety control method and system based on DPI and cloud synchronization. The method comprises the following steps: using DPI technology to perform depth analysis on each packet that flows through a router, distinguishing malicious traffic and normal traffic, intercepting the malicious traffic, jumping a user to a prompt interface, and reminding the user that web pages to be accessed are harmful; and if the malicious traffic is the severe malicious traffic, then directly performing an interception operation, and prohibiting the severe malicious traffic to communicate with a client. The traffic safety control method based on the DPI and the cloud synchronization provided by the invention fully considers the diversity of security threats and the continuous development of private information stealing means, stores malicious links in the way of cloud storage, and updates a malicious linked database regularly; and meanwhile, the method also considers the present situation that the user is very lack of information security knowledge, and transfers the responsibility of the user privacy protection from the user itself to a public WiFi system, so as to realize the private information protection of the user technically.

Description

technical field [0001] The invention belongs to the technical field of computer network security, and in particular relates to a flow security control method and system based on DPI and cloud synchronization. Background technique [0002] With people's increasing dependence on smart phones and wireless networks, the public WiFi industry has ushered in the spring of its development, but compared with its rapid growth momentum, its security and monitoring are still at a very low level, and users' information Security awareness is relatively weak, which gives criminals an opportunity to take advantage of. [0003] There are three major safety hazards in free WIFI: first, the public WIFI set up by businesses does not have a basic online recording function, and cannot realize real-name Internet access. Once a cyber crime occurs, the perpetrator cannot be found, only the WIFI provider; The second is that the merchant’s password is too simple, and various management ports have not...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0236H04L63/0272H04L63/08H04L63/1425H04L63/1441H04L67/1095
Inventor 张子祺魏俣童李嘉辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products