Multilevel aggregation-based abnormal flow control method and system

A technology for abnormal flow and control system, applied in transmission systems, digital transmission systems, data exchange networks, etc., to improve the utilization rate of network bandwidth, improve utilization efficiency, and reduce bandwidth waste.

Inactive Publication Date: 2007-05-23
ZTE CORP
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing technologies cannot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multilevel aggregation-based abnormal flow control method and system
  • Multilevel aggregation-based abnormal flow control method and system
  • Multilevel aggregation-based abnormal flow control method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0045] The present invention provides a brand-new method and system for Aggregates-Oriented Multi-Levels Anomaly Traffic Control Mechanism in Router (A.M.A.T, Aggregates-Oriented Multi-Levels Anomaly Traffic Control Mechanism in Router), which has high detection efficiency and detection accuracy. The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0046] The abnormal flow control system based on multi-level aggregation of the present invention includes the following subsystems:

[0047] Abnormal traffic identification subsystem: It mainly conducts data sampling for different occasions, and performs address aggregation through an address aggregation and its improved algorithm and cusum algorithm. The subsystem uses advanced identification algorithms and a history information table to increase the accuracy of attack judgments. At the same time, it also uses an anti-jitter algorithm in the address aggr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an abnormal flux control system based on multistage accumulation, wherein it comprises following subsystems: abnormal flux recognize subsystem for sampling data and accumulating address; abnormal flux classifying rule automatic generating subsystem for designing accumulation mode, accumulating second mode, packing class and data management; abnormal flux match and reject method executing subsystem for based on the result of second mode accumulation setting different priorities on the speed limit of each accumulation, and using quick method to limit the abnormal accumulation. The invention also provides a relative control method. The invention process first address accumulation and second mode accumulation analysis on the data, to reduce the bandwidth waste on transmission attach flux, to improve utilization of route and bandwidth utilization.

Description

technical field [0001] The invention relates to the routing technology in computer network and telecommunication network, in particular to the technology of detecting and preventing abnormal traffic on the router. Background technique [0002] With the expansion of the network scale, due to the open structure of the network and the TCP / IP protocol itself that constitutes the Internet (Internet) does not take security into consideration, the network security problem has become a major problem that network operators must face and solve. At present, various open hacking tools are flooding on the Internet, and only a little network knowledge is required to easily complete the destruction of the network. Therefore, monitoring and controlling the use of network bandwidth is a very important topic. [0003] Traditional network security technologies focus on system-level intrusion detection, anti-virus and firewalls of user networks. Such security measures usually cannot reduce abn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L47/41
Inventor 陈建业李斌孙知信宫婧
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products