Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Extended access control method based on traffic statistics

A technology for traffic statistics and access control, applied in the field of network security, it can solve the problems of limited matching rules, reduced device security, and insufficient flexibility, so as to improve performance and security, refine classification, and improve flexibility. Effect

Inactive Publication Date: 2019-01-15
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Under the existing technology, the application of the access control list is still limited to the above basic means, the rules that can be matched are limited, only relatively rough filtering can be performed, and the flexibility of control is not enough, resulting in a decrease in device security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extended access control method based on traffic statistics
  • Extended access control method based on traffic statistics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] An extended access control method based on traffic statistics in this embodiment includes the following steps:

[0033] 1. When the data packet flows through a certain port of the network device, the standard second and third layer processing is first performed on the data packet;

[0034] 2. Determine whether the port has enabled the access control function, if enabled, go to step 3, otherwise go directly to step 7;

[0035] 3. Perform ACL rule matching on the data packet, if it matches, go to step 4, otherwise, repeat step 3, and continue to match the next rule;

[0036] 4. Determine whether the user has enabled access control based on traffic statistics, if enabled, go to step 5, otherwise go to step 6;

[0037] 5. Calculate the traffic statistics that match the ACL rules, including total traffic or average traffic, byte or packet-based traffic statistics, and continue to match with user configurations. If matched, perform corresponding actions and go to step 7, oth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, particularly an extended access control method based on traffic statistics. The extended access control method based on flow statistics of the invention extracts statistical information of corresponding flow on the basis of access control rules, further expands the access control list, and improves the flexibility of access controland the safety of network equipment.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an extended access control method based on traffic statistics. Background technique [0002] In order to ensure the security of network communication, some security policies need to be adopted to ensure that unauthorized users can only access specific network resources, so as to achieve reasonable and effective access control to the network. [0003] Access control is the main strategy of network security prevention and protection, and its main task is to ensure that network resources are not illegally used and accessed. It is one of the most important core strategies to ensure network security. Access control involves a wide range of technologies, including network access control, network authority control, directory-level control, and attribute control. [0004] Access Control Lists (ACLs) are lists of commands applied to router interfaces. These instruction lists a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/0876H04L63/101
Inventor 杨贵永韩德亮吴登勇王则陆
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products