Logging records of traffic in computer network

A computer program, computer system technology, applied in the direction of computer security devices, computing, data exchange networks, etc., can solve problems such as inability to take, no intrusion detected, unclear computer network security, compromised computer network, etc.

Active Publication Date: 2019-03-15
网安护盾有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is often the case that the network owner may not even detect the intrusion, and thus be unable to take necessary action
Furthermore, if an intrusion is detected, it may not be clear to what extent the computer network security has been compromised and what data and parts of the computer network were affected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Logging records of traffic in computer network
  • Logging records of traffic in computer network
  • Logging records of traffic in computer network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In the following, several embodiments of the invention will be described in the context of example computer hardware arrangements and example computer hardware elements. Note, however, that the invention is not limited to any particular hardware or software. The different embodiments have application in virtually any environment where logging of computer network traffic is required, and they may be implemented with different hardware and software arrangements. For example, the examples given in this specification can be combined into any working combination for logging and analyzing computer network traffic.

[0016] In packet data networks, data is transmitted in finite-length packets containing an envelope and a payload. Identifiers such as sender and receiver are provided in the packet, along with some information that usually describes the payload. In a layered network model, data is encapsulated into packets on several layers. For example, inside a layer 2 packe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method, system and computer program product for logging communication packets from a communication signal in a communication network. The communication network comprises oneor more perimeters. A split signal is formed of said communication signal, the communication signal comprising information, and the split signal being identical in information content to the communication signal. The communication packets of the split signal are captured by using a network interface controller into a transitory memory. The network interface controller operates in real promiscuousmode. A virtual network interface controller may be operated from an isolated user space container, and the isolated user space container can access said transitory memory as an isolated memory range. The communication packets may be captured into the isolated memory range, and the data of the communication packets may be written from the isolated memory range to the non-transitory memory.

Description

Background technique [0001] Computer network security is becoming more and more important. With advances in the computing power of personal computers and other computing hardware and the widespread use of networks connected to the Internet, network security breaches have become quite common. However, it is often the case that the network owner may not even detect the intrusion, and thus be unable to take necessary action. Furthermore, if an intrusion is detected, it may not be clear to what extent the security of the computer network has been compromised and what data and portions of the computer network were affected. For these and other reasons, even lawmakers (eg in the European Union) are requiring companies to improve their ability to detect and track computer network intrusions. [0002] Therefore, a solution for logging traffic in computer networks is needed. Contents of the invention [0003] An improved method and technical equipment for implementing the method h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06H04W24/00H04L9/40H04L43/04H04L43/12
CPCH04L63/1425H04L43/12G06F21/552H04L63/306H04L43/00H04W24/00H04L43/04H04L43/14H04L49/9078H04L9/40
Inventor H.鲁帕拉A.皮卡雅维
Owner 网安护盾有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products