Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for securely processing network data streams

A security processing and data flow technology, which is applied in the field of network data flow security processing, can solve the problem of being unable to block malicious applications, achieve the effects of reducing response time, improving visualization, and solving static identification

Active Publication Date: 2020-09-25
北京云杉世纪网络科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, formulating security policies based on applications cannot block such malicious applications, and App-ID is insufficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for securely processing network data streams
  • A method and device for securely processing network data streams
  • A method and device for securely processing network data streams

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0041] figure 1 It shows a schematic flowchart of a method for securely processing network data streams provided by an embodiment of the present invention, as shown in figure 1 As shown, the security processing method of the network data flow in this embodiment includes:

[0042] S101. Perform an application identification APP-ID on the target data flow, and determine which application the (network) target data flow belongs to.

[0043] Specifically, according to the characteristic value of the data of the application, the decryption and encryption of the TLS (Transport Layer Security) / SSL (Secure Sockets Layer) protocol and SSH (File Transfer Protocol), and the dec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a safety processing method and a safety processing device for a network dataflow. The method comprises the steps of performing application identification APP-ID on the target dataflow to judge that the target dataflow belongs to which application; determining behavior classification of the target dataflow according to the application to which the learned target dataflow belongs, a pre-built application service portrait and a client application portrait; and performing preset processing operation corresponding to the behavior classification on the target dataflow according to the behavior classification of the target dataflow. According to the method and the device provided by the embodiment of the invention, security of a network can be improved, static identification of the App-ID on traffic is achieved, reaction response time is reduced, and warning information can be sent out in advance; an APT is continuously tracked by dynamically updatingthe client application portrait; visualization can be further improved, and what the network dataflow do not just the network dataflow belongs to which application can be learned.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of network security, and in particular to a method and device for securely processing network data streams. Background technique [0002] Identification and authentication of information flows in enterprise-level network security is a fundamental element of network security. This basic element is the basis for the development of security policies. The administrator specifies corresponding network policies according to different security elements to ensure network security. The well-known core function of NG-FIRWALL is App-ID (application identification). App-ID determines the application identification of data flow based on DPI (deep packet inspection) core technology. This technology enables the identification of traffic based on the real content of the traffic rather than the port, protocol; and can identify traffic using evasion techniques. This technology breaks the visualization...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/851H04L12/26
Inventor 吴坪向阳王凯苑超
Owner 北京云杉世纪网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products