Method for raising network security via message processing

A message processing and security technology, applied in the field of network communication, can solve the problems of complicated ACL specification configuration and maintenance work, abnormal network equipment, and heavy equipment maintenance workload, so as to improve the anti-attack capability and network reliability, Guarantee the effect of stable operation

Active Publication Date: 2007-01-03
北京知方知识产权管理有限公司
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the format and content of these packets are normal, in the case of abnormally large traffic, it will also cause abnormalities in network devices.
Secondly, ACL specification configuration and maintenance work is more complicated
There are various types of network attacks, and new attack methods are constantly emerging. At this time, it is necessary to design new ACL rules for new attack packets. Therefore, the workload of device maintenance is heavy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for raising network security via message processing
  • Method for raising network security via message processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to facilitate those skilled in the art to understand and implement the present invention, the embodiments of the present invention are now described with reference to the accompanying drawings.

[0026] Such as figure 1 As shown, the basic idea of ​​the present invention is: the hardware recognizes the received messages, and the messages that need to be handed over to the CPU for processing are prioritized according to the message protocol type and placed in the message between the CPU and the hardware forwarding plane. In the buffer queue corresponding to the priority of the message channel; for the messages that do not need to be handed over to the CPU for processing, if they are normal messages, they are directly forwarded, otherwise other unrecognized or illegal messages are directly discarded. The method for improving the ability to prevent network attacks through message processing of the present invention will be described in detail below.

[0027] Refer to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for raising network safety by utilizing message treatment includes placing message in buffer queue with relevant priority level and at channel between central processing unit and hardware retransmission plane separately according to priority level of message, carrying out treatment on message in buffer queue by central processing unit according to dispatch rule, carrying out treatment on message not required to be processed by control processing unit according to property of message and identifying those message according to specific rule for raising antiattack ability of network device.

Description

Technical field [0001] The invention relates to a network communication technology, in particular to a method for improving network security through message processing. Background technique [0002] A network attack is a behavior that maliciously damages the network and endangers network security. There are generally two types of network attacks. One type refers to intruding or destroying servers (hosts) on the Internet; the other type is a network attack that directly destroys network devices. With the development of social economy, the relationship between the network and people's production and life has become closer, and the possible harm caused by network attacks is also increasing. In particular, attacks on network equipment, such as equipment problems, may cause the entire network service to be abnormal, which also puts forward higher requirements on the anti-attack capability of the network equipment. [0003] Existing mid-to-high-end network devices basically use an arch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56G06F13/42H04L47/6275
Inventor 周澜
Owner 北京知方知识产权管理有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products