Unlock instant, AI-driven research and patent intelligence for your innovation.

Security policy acceleration table construction method and device

A security policy and construction method technology, applied in the field of network security, can solve the problems of memory consumption, security policy check failure, long duration, etc., to reduce the consumption of memory and CPU resources, reduce the probability of check failure, and speed up the construction. Effect

Active Publication Date: 2019-10-25
NEW H3C SECURITY TECH CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the refresh cycle of the security policy acceleration table of the network device has not yet arrived, the corresponding relationship between the IP address and the security policy of each domain name that undergoes address switching at the current moment cannot be written into the security policy acceleration table, which will cause the security policy check to fail.
[0004] In addition, the acceleration table construction process consumes a lot of memory and CPU, and lasts for a long time
Network devices such as gateways need to access a large number of domain names. Switching between multiple IP addresses for each domain name will cause a large number of domain name change events to be processed by the network device. All domain names that need to be processed cannot be completed within one security policy acceleration table refresh cycle. Change events, the corresponding relationship between the IP address and the security policy cannot be written into the security policy acceleration table at the current moment, resulting in the failure of the security policy check

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy acceleration table construction method and device
  • Security policy acceleration table construction method and device
  • Security policy acceleration table construction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0032] The words appearing in the embodiments of the present application are explained below.

[0033] Security policy rules: including matching items and action items. After receiving the data packet, the network device matches the data packet with the matching item, determines the matching item matching the data packet, and processes the data packet according to the action item corresponding to the matching item.

[0034] Domain name change event: the network device determines th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a security policy acceleration table construction method and device. According to the scheme, the method comprises the following steps: storing an address cache table with a plurality of address cache table entries; wherein each address cache entry is an IP address set of different domain names, each IP address set is used for storing M IP addresses, and the aging time of each IP address is greater than M + 1 domain name address switching periods; receiving a first domain name system protocol message; searching a first address cache entry matched with adomain name carried by the first domain name system protocol message; if it is determined that the IP address set of the first address cache entry contains the IP address carried by the first domainname system protocol message, not generating an event for triggering refreshing of the security policy acceleration table; and refreshing the storage time of the IP address carried by the first domainname system protocol message in the IP address set of the first address cache entry. By applying the technical scheme provided by the embodiment of the invention, the consumption of memory and CPU resources can be reduced, and the probability of security policy check failure is reduced.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and device for constructing a security policy acceleration table. Background technique [0002] In order to improve the efficiency of message security processing, the network device uses the IP (Internet Protocol, Internet Protocol) address corresponding to the domain name of the website specified by the user as the Key (key), and the security policy rule corresponding to the IP address as the Value (value), and constructs The security policy acceleration table calculates the hash value according to the IP address of the domain name, quickly finds the security policy of the domain name corresponding to the IP address of the domain name, and avoids the security policy of looking up the domain name in the policy table according to the IP address of the domain name one by one. [0003] In a load balancing network, multiple servers provide the same service...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/12H04L29/06H04L29/08
CPCH04L63/20H04L67/1036H04L61/58H04L61/4511
Inventor 岳伟国
Owner NEW H3C SECURITY TECH CO LTD