Firewall equipment regular matching method and device and computer readable storage medium

A matching method and firewall technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of regular matching, such as poor scalability, poor flexibility, and investment in manpower development, to achieve the effect of reducing protocol configuration and improving scalability

Active Publication Date: 2020-10-09
武汉思普崚技术有限公司
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, at present, manufacturers use regular expressions in fixed fields, that is, only when a certain protocol field is configured under a policy or rule to use regular expressions. After the rules are loaded, regular expressions can be matched during the engine matching process. This method has disadvantages. , which protocol segment you want to use regularization needs to increase the configuration of the corresponding protocol. If there are too many fields, the configuration will be too many
[0004] Since most of the existing schemes add policies or rule configurations according to the protocol field to determine whether to perform regular matching and how to perform matching, these schemes will cause a lot of configurations, the device restart configuration recovery time will be long, and the flexibility is poor. If you want to use regular To match whether there is an "abc" field in the request body of the HTTP protocol POST method and the corresponding response body, two configurations need to be added. If you need to check whether a certain string exists in more fields, you need to add more Configuration is not very convenient for users, and the scalability of regular matching is poor. According to the current implementation plan, if only the rule matching of the HTTP protocol is considered in the early stage of development, the front end and the firewall background only develop the matching process related to the HTTP protocol. If it is necessary to develop the DNS protocol, it is necessary to re-invest in human resources to develop and test the front-end and back-end

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firewall equipment regular matching method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] The embodiment of the present invention provides a regular matching method for a firewall device, and its flowchart is as follows: figure 1 As shown, the regular matching method of the firewall device includes the following steps:

[0025] Determine the regular expression containing the protocol position modifier according to the actual requirements of the firewall, and configure the regular expression to the firewall engine;

[0026] Parse the protocol position modifier of the regular expression configured in the firewall engine to determine the protocol segment of the regular expression, and set the protocol segment matching flag of the regular expression;

[0027] After the firewall receives the network message, it extracts the corresponding protocol segment in the network message, matches the protocol segment corresponding to the network message with the protocol segment of the regular expression, obtains the matching result, and determines whether to proceed accord...

Embodiment 2

[0136] The present invention also provides a regular matching device for firewall equipment, including a processor and a memory, and a computer program is stored in the memory, and when the computer program is executed by the processor, the implementation of any of the above-mentioned embodiments can be realized. Firewall device regular matching method.

Embodiment 3

[0138] The present invention also provides a computer-readable storage medium, on which a computer program is stored. When the computer program is executed by a processor, the firewall device regular matching method as described in any embodiment is realized.

[0139] It should be noted that the parts that are not repeatedly described in Embodiments 1-3 can be used for reference.

[0140] The invention discloses a firewall equipment regular matching method, device and computer-readable storage medium. The regular expression including the protocol position modifier is determined according to the actual requirements of the firewall, and the regular expression is configured to the firewall engine; the analysis is configured in the firewall engine The protocol position modifier of the regular expression determines the protocol segment of the regular expression, and the protocol segment matching flag of the regular expression is set; after the firewall receives the network message, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a firewall equipment regular matching method and device and a computer readable storage medium, belongs to the technical field of firewall equipment auditing and safety protection, and solves the problems of more protocol configurations and poor regular matching ductility when a protocol segment uses regularities in the prior art. The firewall equipment regular matching method comprises the following steps: determining a regular expression containing a protocol position modifier, and configuring the regular expression to a firewall engine; determining a protocol segmentof the regular expression, and setting a protocol segment matching flag bit of the regular expression; and after the firewall receives the network message, extracing a corresponding protocol segmentin the network message, matching the protocol segment corresponding to the network message with the protocol segment of the regular expression to obtain a matching result, and determining whether to perform corresponding action processing and log sending according to the matching result. According to the method provided by the invention, the protocol configuration when the protocol segment uses the regularization is reduced, and the ductility of the regular matching is improved.

Description

technical field [0001] The invention relates to the technical field of firewall equipment auditing and security protection, in particular to a firewall equipment regular matching method, device and computer-readable storage medium. Background technique [0002] At present, the common auditing function and security protection function software implemented in the firewall equipment of various manufacturers basically use regular matching for the bottom matching. This is because regular matching can complete the work faster than string matching, and also In terms of capturing strings, such as intercepting the domain name of the url or other content, etc., regularization can also complete the work very well. [0003] However, at present, manufacturers use regular expressions in fixed fields, that is, only when a certain protocol field is configured under a policy or rule to use regular expressions. After the rules are loaded, regular expressions can be matched during the engine m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0263H04L69/22
Inventor 李登云
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products