Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for identifying protocol and content, storage device, security gateway, server

A protocol, a technology to be identified, applied in the direction of data exchange network, digital transmission system, electrical components, etc., to achieve the effect of improving computing efficiency and speed

Active Publication Date: 2021-07-30
紫光恒越技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are few researches on the identification and analysis of protocols (for example, audio and video transmission protocols). Traditional protocol identification and analysis mostly focus on existing protocols, such as protocol identification based on ports or packet loads, but for unknown Protocol and private protocol research is in the development stage, and how to improve the accuracy and efficiency of identification is also the key point of protocol identification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying protocol and content, storage device, security gateway, server
  • Method for identifying protocol and content, storage device, security gateway, server
  • Method for identifying protocol and content, storage device, security gateway, server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0048] It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second" and the like are only used to distinguish descriptions, and cannot be understood as indicating or implying relative importance.

[0049] Most network protocol identification technologies in related technologies mainly include port-based identification technology, payload-based identification technology (or protocol content-based identification technology), dynamic feature-based identification technology, and the like. Among them, the port-based identification technology is relatively sim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present application provide a method for identifying protocols and content, a storage device, a security gateway, and a server. The method for identifying protocols includes: acquiring and analyzing the data flow of the network protocol to be identified; confirming the transmission of the data packets included in the data flow If the port number carried by the layer belongs to the registered port number, then identify the protocol type of the data packet again according to the protocol content feature and the pattern string in the first feature library; or confirm the port carried by the transport layer of the data packet included in the data flow If the number belongs to a dynamic port number or a port number whose usage frequency is less than a set threshold, the extracted protocol feature of the data flow is matched with the pattern string in the second feature library to confirm the protocol type of the data flow. In the embodiment of the present application, for the protocol type determined by the port number, the protocol type needs to be confirmed again according to the protocol content, so as to improve the accuracy rate of identifying the protocol type of the fixed port.

Description

technical field [0001] The present application relates to the field of network protocol type identification, and specifically, the embodiments of the present application relate to a method for identifying protocols and contents, a storage device, a security gateway, and a server. Background technique [0002] With the current rapid development of technologies such as 5G and cloud services, the proportion of audio-visual media content such as webcasting and video-on-demand in the network is constantly increasing, and audio-visual media content has become an indispensable part of people's lives. However, in high-throughput audio-visual media data, there are some non-compliant or garbage audio and video streams. At the same time, some network transmission mechanisms need to count the proportion of various protocols (such as audio and video protocols) in the network. There are many, and there are some proprietary protocols that can also transmit data (for example, audio and vide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06
CPCH04L43/18H04L69/22
Inventor 肖洪涛王东升周木子孙亮王特
Owner 紫光恒越技术有限公司