Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operation and maintenance auditing system hybrid protocol agent system and method

A mixed protocol and protocol technology, applied in the transmission system, digital transmission system, electrical components, etc., can solve the problem that the protocol cannot be included in the monitoring and management of the operation and maintenance audit system, the operation and maintenance audit system cannot be operated and audited, and the operation and maintenance audit system protocol Unable to proxy and other issues

Inactive Publication Date: 2020-08-25
CHENGDU DBAPP SECURITY
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the existing operation and maintenance audit system supports the operation and maintenance audit of multiple protocols, which is convenient for users to control and control the operation and maintenance authority and audit retrospectively for different applications. However, the current operation and maintenance audit system only separates the listening ports of various protocols For the increasingly strengthened security management, when the firewall does not open more ports, some protocols cannot be included in the monitoring and management of the operation and maintenance audit system. Happening
[0003] In the current application scenario of the operation and maintenance audit system on the market, due to security control, the firewall usually blocks most ports, but usually does not block port 443, but the default ports of different application protocols are usually different, resulting in this limitation. Under these conditions, the operation and maintenance audit system cannot directly carry out the work of operation and maintenance and audit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation and maintenance auditing system hybrid protocol agent system and method
  • Operation and maintenance auditing system hybrid protocol agent system and method
  • Operation and maintenance auditing system hybrid protocol agent system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] A hybrid protocol agent method for an operation and maintenance audit system, such as figure 1 , mainly including the following steps in sequence:

[0039] Step S1: The listening program detects that a client initiates a request;

[0040] Step S2: forwarding the detected data to the application protocol multiplexer module for detecting the protocol type;

[0041] Step S3: The proxy engine receives the compatible result matched in the previous detection step, and initiates a connection to the target server.

[0042] Working principle: A mixed protocol proxy method for the operation and maintenance audit system described in this solution directly matches the decoded protocol for the data packets of unknown protocols sent by the client of the operation and maintenance audit system to the back-end virtual host of the operation and maintenance audit system Fields compare individual character protocols or graphics protocols or plaintext protocols.

Embodiment 2

[0044] In the present invention, on the basis of the above-mentioned embodiment 1, the method for detecting the protocol type of the protocol multiplexer is: extracting the first data packet after the three-way handshake, and directly matching the decoded protocol when the number of protocols is small field, confirm the protocol type according to the protocol field and send it to the proxy engine.

[0045] The method for judging the protocol type of the data packet by the application protocol multiplexer is: using a rule detection method: relying on the preset character string or binary sequence in the rule base for comparison and selection, recording the similarity, and recording the similarity in the data When the similarity between the packet and the pre-input protocol meets the threshold requirement, it is determined that the data packet belongs to the protocol.

[0046] When the application protocol multiplexer regularly matches the data packet to an incompatible protocol...

Embodiment 3

[0055] An operation and maintenance audit system hybrid protocol proxy system, such as figure 1 , including client, proxy engine, application protocol multiplexer,

[0056] Client: initiate a connection request to the proxy engine;

[0057] Proxy engine: forward the data packet sent by the client to the application protocol multiplexer, and according to the protocol type of the data packet detected by the application protocol multiplexer, mark the data packet and send it to different The protocol's exclusive proxy engine;

[0058] Application protocol multiplexer: receives the data packet forwarded by the proxy engine, judges the protocol type of the data packet according to the pre-input protocol field, and sends it to the proxy engine according to the detected protocol type.

[0059] Working principle: In the hybrid protocol proxy system of the operation and maintenance audit system described in this solution, for the data packets of unknown protocols sent by the client of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operation and maintenance auditing system hybrid protocol agent system and method. The invention relates to the field of protocol ports. The method comprises the following steps of: directly matching a decoded protocol field and comparing each character protocol or graphic protocol or plaintext protocol for a data packet of an unknown protocol sent by a client of an operation and maintenance auditing system, and directly determining the data packet matched with a corresponding protocol as an encrypted data packet of the protocol; using a rule detection method for a data packet which cannot be perfectly matched with a corresponding protocol; depending on a preset character string or binary sequence in a rule base, when the similarity is higher than a preset threshold value, determining that the data packet belongs to the protocol, forwarding the data packet to an agent engine, marking the data packet by the agent engine, sending the data packet to an exclusiveagent engine of different protocols, and sending the data packet to a target server by the exclusive agent engine; and for the data packet incompatible with the protocol, analyzing an information structure in the data packet, analyzing and storing the data packet according to attributes, and sending the processed data packet to a compatibility result display module for displaying.

Description

technical field [0001] The invention relates to the field of protocol ports, in particular to a hybrid protocol proxy system and method for an operation and maintenance audit system. Background technique [0002] At present, the existing operation and maintenance audit system supports the operation and maintenance audit of multiple protocols, which is convenient for users to control and control the operation and maintenance authority and audit retrospectively for different applications. However, the current operation and maintenance audit system only separates the listening ports of various protocols For the increasingly strengthened security management, when the firewall does not open more ports, some protocols cannot be included in the monitoring and management of the operation and maintenance audit system. Happening. [0003] In the current application scenario of the operation and maintenance audit system on the market, due to security control, the firewall usually bloc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/028H04L43/18H04L69/02H04L69/03
Inventor 叶雪松范渊吴永越郑学新刘韬
Owner CHENGDU DBAPP SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products