Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Flow protection method, electronic equipment and storage medium

A flow and firewall technology, applied in the computer field, can solve problems such as downtime, drainage plug-in errors, etc., and achieve the effect of avoiding additional expenses

Pending Publication Date: 2022-02-11
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of this application provides a traffic protection method to solve the downtime problem caused by the error of the drainage plug-in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flow protection method, electronic equipment and storage medium
  • Flow protection method, electronic equipment and storage medium
  • Flow protection method, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.

[0047] Like numbers and letters denote similar items in the following figures, so that once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second" and the like are only used to distinguish descriptions, and cannot be understood as indicating or implying relative importance.

[0048] figure 1 It is a schematic diagram of the application scenario of the traffic protection method provided by the embodiment of this application. Such as figure 1 As shown, the application scenario includes a firewall management terminal 11 and a computing node 12 deployed on a cloud platform. Computing node 12, namely the host computer hereinafter, is a computer or server instal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a flow protection method, electronic equipment and a storage medium, the method is applied to a host machine, the host machine is deployed with a virtualization firewall and a service virtual machine, and the method comprises the following steps: issuing an eBPF program on an XDP network hook of a network card driving program; through the eBPF program, redirecting the traffic sent out by the service virtual machine to the virtualized firewall; and sending the flow which is detected, confirmed and released by the virtualization firewall to a target virtual machine or a target physical network card through the eBPF program. According to the method, the eBPF program is adopted, the situation that the host machine crashes and the like cannot be caused even if the BUG exists, and different Linux kernel versions can be adapted.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a traffic protection method, electronic equipment, and a computer-readable storage medium. Background technique [0002] As one of today's hot technologies, virtualization has been widely used in cloud computing platforms, storage, virtual desktops, virtual terminals and other fields. At the same time, the security of virtualization is becoming more and more important. The security protection based on the agentless mode refers to the protection of virtual When deploying a security protection system in a virtualized environment, there is no need to install any agent software in the virtual machine. It is only necessary to deploy a virtualized firewall and a drainage plug-in on the physical host / computing node in the cloud platform to redirect the communication traffic of the virtual machine to the virtualized firewall. , and then pass the cleaned traffic to the tar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G06F9/455
CPCH04L63/02H04L63/12H04L63/1441H04L63/1408G06F9/45558G06F2009/45575G06F2009/45591G06F2009/45595
Inventor 杨强
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products