A message storage method and device
A technology for saving methods and messages, which is applied in the field of Internet security and can solve problems such as low data access efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034]In the specific implementation process, the DPI device allocates a continuous first storage space for the IP segment that needs to be detected in advance, and allocates a continuous block for the source IP address in the first storage space for each source IP address in the IP segment. In the second storage space, a continuous third storage space is allocated for each source port to be detected, and a continuous third storage space is allocated for each transport layer protocol to be detected in the third storage space In the fourth storage space, a continuous fifth storage space is allocated for each destination IP address to be detected in the fourth storage space, and a continuous fifth storage space is allocated for each destination port to be detected in the fifth storage space. Six storage spaces, wherein each sixth storage space is used to store a data flow meeting the message detection condition.
[0035] In addition, each source IP address in the IP segment can ...
Embodiment 2
[0066] The embodiment of the present application uses a linear table to manage the data flow. The DPI device provides an interface for adding, deleting, modifying, and checking externally. The usage method is consistent with the existing usage method, and the original system structure of the DPI device will not be destroyed. The main difference is the internal implementation.
[0067] Such as Figure 4 As shown, the internal implementation block diagram of the DPI device provided by the embodiment of the present application includes three parts: operation interface, feature map and structured storage, wherein:
[0068] 1. Operation interface: Provide insert, delete, update, and query interfaces for other application systems, and at the same time shield the internal implementation methods, and other systems will not be aware of the internals of the DPI device.
[0069] 2. Feature mapping: Complete the conversion and mapping between the original data and the internal storage st...
Embodiment 3
[0094] Based on the same inventive concept, the embodiment of the present application also provides a message storage device corresponding to the message storage method. Since the problem-solving principle of the device is similar to the message storage method of the embodiment of the application, the implementation of the device Reference can be made to the implementation of the method, and repeated descriptions will not be repeated.
[0095] Such as Figure 11 As shown, it is a structural diagram of the message storage device provided in the embodiment of the present application, including:
[0096] An extracting module 1101, configured to extract the quintuple information of the message when receiving the message;
[0097] The determining module 1102 is configured to determine that the message meets the message detection condition according to the quintuple information, then perform addressing based on the quintuple information and the first address of the first storage sp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


