Method and system for combing firewall policies based on network traffic in Internet of Things

A firewall strategy and network traffic technology, applied in the firewall field, can solve the problems of high maintenance pressure, difficulty, and low efficiency of operation and maintenance personnel, and achieve the effect of reducing the difficulty of the screening process and solving unreasonable configurations

Pending Publication Date: 2022-05-03
深圳铸泰科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the screening process faces the problems of high maintenance pressure, difficulty and low efficiency for the operation and maintenance personnel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for combing firewall policies based on network traffic in Internet of Things
  • Method and system for combing firewall policies based on network traffic in Internet of Things
  • Method and system for combing firewall policies based on network traffic in Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, a clear and complete description will be made below in conjunction with the technical solutions in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, and Not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] The method for sorting out firewall policies based on network traffic in the Internet of Things in a preferred embodiment of the present invention, such as figure 1 shown, see also Figure 2-9 , including the following steps:

[0036] Data collection (step a):

[0037] Collect the TCP network traffic data between the source address and the destination address and the destination port to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for combing firewall policies based on network traffic in the Internet of Things, which comprises the following steps of: collecting TCP network traffic data from a source address to a destination address and from a destination port to obtain original data, and performing data processing on the original data to obtain traffic data of three handshakes; carding the obtained traffic data of the three-way handshake according to a source address or a destination address, and outputting a carding result; according to the embodiment of the invention, sorting is carried out by counting the flow data and counting the source address, the destination address and the destination port of the field, and targeted screening is carried out according to the sorting result, so that the problem caused by unreasonable configuration or configuration error is solved.

Description

technical field [0001] The present invention relates to the technical field of firewalls, and more specifically, to a method and system for sorting out firewall policies based on network traffic in the Internet of Things. Background technique [0002] A firewall is a kind of protective barrier between the inside and outside of the computer by organically combining various software and hardware devices for security management and screening to ensure the security of the computer network. The firewall can control the traffic entering and leaving the computer network according to the policy to achieve the purpose of ensuring the security of the computer network. As the first barrier of computer network security, the firewall plays an important basic role in enterprise information facilities. With the development of the Internet, the scale of the network is also continuously expanding, and the data packets are also increasing day by day. As a security barrier, the firewall plays...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/0236
Inventor 张树贵
Owner 深圳铸泰科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products