Unlock instant, AI-driven research and patent intelligence for your innovation.

A Data Integrity Merging System

A data integrity and integrity technology, applied in the Internet field, can solve problems such as inability to merge data, inability to deduplicate data, etc., to achieve the effect of improving integrity, improving analysis accuracy and reliability

Active Publication Date: 2022-04-12
科来网络技术股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The second scenario is: due to the routing design, the uplink and downlink traffic will take different routing loops
However, it is impossible to deduplicate and fill incomplete data at different collection points, perform centralized merging, and cannot perform continuous merging of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Data Integrity Merging System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] see figure 1 , a data integrity merging system, including a storage module, and also includes a merging module and an integrity evaluation module, the storage module uses the IP port quadruple as the KEY to store the traffic as the session focal point, and stores the original traffic and Combining flows are stored separately; the merging module first establishes the four-tuple flow table of UDP and TCP, and the data packets of the same session are merged in the same session by four-tuple and protocol identification, and the merging of all flows is simplified as Merge of a single session; then perform MD5 calculation on the whole packet, and use the MD5 value to judge the deduplication. If there is already a packet with the same MD5 in the session, it will be considered as a duplicate packet and discarded; if the packet is not a duplicate , are divided into UDP and TCP; the integrity assessment module estimates the integrity of the overall traffic by weighting the integr...

Embodiment 2

[0025] see figure 1 , a data integrity merging system, including a storage module, and also includes a merging module and an integrity evaluation module, the storage module uses the IP port quadruple as the KEY to store the traffic as the session focal point, and stores the original traffic and Combining flows are stored separately; the merging module first establishes the four-tuple flow table of UDP and TCP, and the data packets of the same session are merged in the same session by four-tuple and protocol identification, and the merging of all flows is simplified as Merge of a single session; then perform MD5 calculation on the whole packet, and use the MD5 value to judge the deduplication. If there is already a packet with the same MD5 in the session, it will be considered as a duplicate packet and discarded; if the packet is not a duplicate , are divided into UDP and TCP; the integrity assessment module estimates the integrity of the overall traffic by weighting the integr...

Embodiment 3

[0028] see figure 1 , a data integrity merging system, including a storage module, and also includes a merging module and an integrity evaluation module, the storage module uses the IP port quadruple as the KEY to store the traffic as the session focal point, and stores the original traffic and Combining flows are stored separately; the merging module first establishes the four-tuple flow table of UDP and TCP, and the data packets of the same session are merged in the same session by four-tuple and protocol identification, and the merging of all flows is simplified as Merge of a single session; then perform MD5 calculation on the whole packet, and use the MD5 value to judge the deduplication. If there is already a packet with the same MD5 in the session, it will be considered as a duplicate packet and discarded; if the packet is not a duplicate , are divided into UDP and TCP; the integrity assessment module estimates the integrity of the overall traffic by weighting the integr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data integrity merging system, which belongs to the technical field of the Internet, and includes a storage module, and is characterized in that: it also includes a merging module and an integrity evaluation module, and the merging module first establishes a UDP and TCP quadruple stream Table, the data packets of the same session are combined in the same session through the quadruple and the protocol identifier, and the combination of all traffic is simplified to the combination of a single session; then the MD5 calculation is performed on the whole package, and the MD5 value is used to deduplicate Judgment; the integrity evaluation module estimates the integrity of the overall traffic by weighting the integrity of all valid TCP sessions within the entire event range. The present invention can deduplicate and make up for incomplete data at different collection points, perform centralized merging, can evaluate the completeness of the flow before merging and the flow after merging and display it as a percentage value, and data merging can be carried out continuously.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a system for merging data integrity. Background technique [0002] Existing network traffic analysis products can usually only handle complete traffic scenarios. For example: a complete session has 10 data packets, but only 5 of them can be captured, and there will be problems in the statistics of the number of session data packets. There are two scenarios that will result in the failure to capture the complete data flow, which will affect the subsequent analysis and processing process. [0003] The first scenario is: the collection point set suffers from serious packet loss, but multiple collections can complement each other to form a more complete flow. [0004] The second scenario is: Due to routing design, upstream and downstream traffic will take different routing loops. However, if a packet capture device is deployed at a specific network location, the session will ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L69/16H04L67/14H04L9/40H04L43/0876
CPCH04L69/16H04L67/14H04L63/123H04L43/0876
Inventor 王思宇林鹏林康
Owner 科来网络技术股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More