Network asset topology identification method based on flow perception

A network asset and identification method technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of underreporting network assets, occupying network resources, single identification method, etc., to ensure accuracy and improve use safety , the effect of reducing the network load

Inactive Publication Date: 2021-01-22
上海奇甲信息科技有限公司
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the active scanning method is used to detect surviving port records, and the identification method is relatively simple, and this method has some defects and deficiencies, such as the problem of identification of...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset topology identification method based on flow perception
  • Network asset topology identification method based on flow perception
  • Network asset topology identification method based on flow perception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0040] Such as Figure 1-3 As shown, a network asset topology identification method based on traffic perception proposed by the present invention includes active traffic detection and passive traffic detection;

[0041] Active traffic probing involves the following steps:

[0042] S1. Collect the port survival status of the network address of the entire network; as long as the network asset is connected to the network, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network asset topology identification method based on flow perception. The method comprises active flow detection and passive flow detection. The active flow detection comprises the following steps: S1, collecting the survival condition of a port; S2, sending a protocol detection packet; S3, acquiring port response information; S4, extracting equipment proprietary information, and matching the equipment proprietary information with the manufacturer information; S5, establishing an equipment fingerprint library; S6, establishing a network asset topological graph, wherein the passive flow detection comprises the following steps: S1, deploying a bypass flow mirror image; S2, collecting two-layer broadcast communication and three-layer IP communication messages; S3, loading a filtering rule, and extracting a network asset fingerprint; S4, establishing a network asset fingerprint database; and S5, supplementing the topological graph. According to the invention, active flow detection and passive flow detection are combined, so that a network asset detection result is more accurate and comprehensive; meanwhile, network asset change warning is set, so that the accuracy of the network asset fingerprint database is ensured, and the use safety of network assets is improved.

Description

technical field [0001] The invention relates to the technical field of network asset identification, in particular to a network asset topology identification method based on flow perception. Background technique [0002] Network assets are mainly various devices used in computer (or communication) networks. It mainly includes network equipment (routing, switching, etc.) and security equipment (firewall, etc.). At present, a large number of devices exposed on the Internet have become the first choice for attackers to launch large-scale DDoS attacks. If we capture the maliciously used IoT devices, And have accurately identified these devices, then you can search for all devices of this type exposed on the Internet through fingerprints, list these devices as key observation objects, and reduce the impact of future attacks through pre-prevention strategies influences. Network security risk assessment begins with the identification of network assets, so the ability to accuratel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L12/26
CPCH04L41/12H04L43/0805H04L43/10H04L43/12
Inventor 王榕腾石小川张晶陈鹭菲
Owner 上海奇甲信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products