Supercharge Your Innovation With Domain-Expert AI Agents!

Telnet proxy method and architecture separated from protocol stack, and medium

A protocol stack and heterogeneous technology, which is applied in the field of telnet proxy from the protocol stack to solve the problem of packet retransmission, increase security, and reduce CPU overhead.

Active Publication Date: 2021-04-09
河南信大网御科技有限公司 +1
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In a heterogeneous system, user data needs to be forwarded to the internal heterogeneous platform, and the input agent must be able to maintain connections with different heterogeneous modules in the heterogeneous platform. The most typical network connection is a telnet connection; the usual telnet input agent Need to run on the protocol stack, maintain the connection through reverse proxy, need to establish multiple telnet connections at the same time, due to the open source nature of the protocol stack, there will inevitably be loopholes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Telnet proxy method and architecture separated from protocol stack, and medium
  • Telnet proxy method and architecture separated from protocol stack, and medium
  • Telnet proxy method and architecture separated from protocol stack, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] as attached figure 1 And attached image 3 Shown, a kind of telnet proxy method breaking away from protocol stack, described telnet proxy method breaking away from protocol stack comprises the following steps:

[0032] The input agent reads the connection list after receiving the first telnet message request packet, and judges whether the client sending the first telnet message request packet is registered in the connection list; if the client is registered in In the connection list, the first telnet message request packet is forwarded to the main heterogeneous module of the heterogeneous platform, and the TCP header in the first telnet message request packet is modified and repackaged into a second telnet message request packet. After requesting the packet, forward it to the slave heterogeneous module of the heterogeneous platform;

[0033] Build a data cache list, and register the second telnet message request packet forwarded to the slave heterogeneous module in th...

Embodiment 2

[0052] The difference between this embodiment and Embodiment 1 is that when modifying the TCP header in the first telnet message request packet and repackaging it into the second telnet message request packet, execute:

[0053] The input agent reads the initial synchronization identification code SEQ of the master heterogeneous module and the initial synchronization identification code SEQ of the slave heterogeneous module. Specifically, the master heterogeneous module corresponds to the initial synchronization identification code SEQ1, and the slave heterogeneous module 1 corresponds to the initial synchronization identification code SEQ2, corresponding to the initial synchronization identification code SEQ3 from the heterogeneous module 2, and so on; the initial synchronization identification code SEQ1 is randomly generated by the master heterogeneous module, and the initial synchronization identification code SEQ2 is randomly generated from the heterogeneous module 1 , the i...

Embodiment 3

[0071] The difference between this embodiment and the foregoing embodiment is that, after registering the second telnet message request packet in the data cache list, execute:

[0072]Judging whether there is a second telnet message request packet that has not responded from the heterogeneous module in the data cache list, if there is a second telnet message request packet that has not responded from the heterogeneous module, then the corresponding slave Add 1 to the number of missed responses of the structural module, and retransmit the corresponding second telnet message request packet to the corresponding slave heterogeneous module, thereby solving the problem of message retransmission from the heterogeneous module.

[0073] It should be noted that, as attached Figure 4 As shown, the request data sent by the client is added to the data cache list. The data cache list has three operations: add / delete / find. According to the response identification code acknum of the data pac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a telnet proxy method and architecture separated from a protocol stack and a medium, and the method comprises the following steps: reading a connection list after an input proxy receives a first telnet message request packet, and judging whether a client sending the first telnet message request packet is registered in the connection list or not; if the client is registered in the connection list, forwarding the first telnet message request packet to a main heterogeneous module of a heterogeneous platform, modifying a TCP header in the first telnet message request packet, repackaging the TCP header into a second telnet message request packet, and forwarding the second telnet message request packet to a slave heterogeneous module of the heterogeneous platform; and after a telnet message response packet returned by a certain heterogeneous module is received, if the heterogeneous module sending the telnet message response packet is a main heterogeneous module, forwarding the telnet message response packet to the target client.

Description

technical field [0001] The present invention relates to the technical field of mimicry defense, in particular, relates to a telnet proxy method, framework and medium that are separated from the protocol stack. Background technique [0002] With the rapid development of the Internet, network security has gradually become a potentially huge problem. Introducing the active defense method into the cyberspace can solve cyberspace security problems, especially in the face of the current biggest security threats - unknown vulnerabilities, backdoors, virus Trojans and other uncertain threats. It has a significant effect and overcomes the existence of traditional security methods. In view of many problems, the theory of Cyberspace Mimic Defense (CMD) came into being. [0003] The purpose of CMD technology is to integrate multiple active defense elements: to change the similarity and unity of the target system with heterogeneity, diversity or diversity; to change the static and deter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1441H04L63/1466H04L63/0281H04L67/1095H04L67/60
Inventor 李松泽郭义伟冯志峰鲍尚策
Owner 河南信大网御科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More