Network security redirection method and device

A redirection and security technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as inability to realize flexible application and relatively large security policy restrictions

Active Publication Date: 2019-02-15
XIAMEN ANSCEN NETWORK TECH CO LTD
View PDF7 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

None of these redirection technologies can be used flexibly based on processes, source/destination addresses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security redirection method and device
  • Network security redirection method and device
  • Network security redirection method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0072] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0073] The present invention provides a method for safe redirection of network communication, such as figure 1 shown, including the following steps:

[0074] S1: The process, IP address, port, and protocol target data packets of the specified network communication are filtered through the WFP-driven layered design, and the process, IP address, port, and protocol target data packets are pre-filtered using BPF rules to filter out t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network communication security redirection method, comprising the following steps: S1, realizing filtering on process, IP address, port and protocol target data packets in designated network communication by virtue of WFP-driven hierarchical design, and adopting BPF rules for performing pre-filtration treatment to filter out target network data packets; S2, setting capture based on a process, an IP address, a port and a protocol as well as interception, capturing the target network data packets and performing analysis and restoration according to a TCP/IP protocol stack, encapsulating the target network data packets and forwarding; S3, according to a Socks5 proxy protocol, establishing communication with a proxy server; and S4, by virtue of the proxy server and based on the Socks5 proxy protocol, performing redirection proxy forwarding on the target network data packets, and realizing TCP redirection, UDP redirection and remote DNS redirection. The invention also provides a redirection module, comprising a WFP driving module, a TCP/IP protocol decapsulation module and a redirection service module and completing TCP redirection, UDP redirection and remote DNS redirection functions.

Description

technical field [0001] The present invention relates to the field of network redirection, in particular to a method and device for network security redirection. Background technique [0002] Today, the development of the Internet has penetrated into many aspects of personal life and business behavior, such as social networking, cross-border e-commerce, online payment, communication and other applications. These Internet applications have problems such as geographical restrictions, information leakage, and small bandwidth. , So people began to study related network communication technologies to improve the shortcomings based on the traditional Internet, and gradually formed solutions based on virtual private networks, anonymous communication networks and other tunnel proxy networks. These solutions usually consist of three parts: redirection software, dial-up client, and relay server. The dial-up client and relay server mainly provide network communication tunnel construction...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0281H04L63/1425H04L63/1441H04L69/162
Inventor 姚先洪廖宁罗佳林山
Owner XIAMEN ANSCEN NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products