Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for defending network attack

A network attack and priority technology, applied in the field of data communication, to reduce the impact and improve the ability to defend against network attacks

Inactive Publication Date: 2009-01-07
ZTE CORP
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the forwarding level of existing network equipment is processed by hardware processing units with high performance and relatively simple logic such as ASIC or NP, it is impossible to realize complex functions of detecting and defending against network attacks at this level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for defending network attack
  • Method and apparatus for defending network attack
  • Method and apparatus for defending network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The method of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments of the present invention.

[0035] figure 2 It is a schematic diagram of the functional structure and working process of the network equipment in the embodiment of the present invention, such as figure 2 As shown, the network device includes three processing layers: forwarding layer-A, control layer-B, and management layer-C, and an internal communication interface-D; the forwarding layer-A includes a network interface 201, an upload service filter 202 ; The control plane-B includes a plurality of different business service modules 203; the management plane-C includes a plurality of business service modules 203 and an upload service filter configuration module 204; the forwarding plane-A passes an internal The communication interface-D communicates with the control plane-B and the management plane-C respectively for data communic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for defending network attacks, filter rules of data massages are configured for a sending-up business filter on a forwarding plane of a network device, the data massages of a user with forbidden access are filtered according to the rules, the data massages which are corresponding to each user are divided into different priorities according to the different identifies of the users who access the network device, and the data massages are transmitted into a business service module of a control plane and / or a management plane through the different priority channels in an internal communication interface for carrying out the processing. The method and the device can distinguish the useful data massages and network attack massages, filter the data massages of illegal users, effectively reduce the load on the network device due to the network attack massages and improve the ability of the network device for defending the network attacks.

Description

technical field [0001] The invention relates to network security technology in the field of data communication, in particular to a method and device for defending against network attacks. Background technique [0002] With the rapid development of Internet technology and the deepening of Internet applications, the scale of Internet users is also growing. Many people cannot work and live without the Internet. At the same time, network security issues are becoming more and more important. . Due to the openness of the Internet Protocol (IP) network, various network devices in the Internet, such as routers and Layer 3 switches, have also become targets of network hackers and various network virus attacks. Since network devices with complex and advanced functions require in-depth analysis and processing of user packets, they are more vulnerable to attacks from the network. Taking routers as an example, this type of network equipment occupies a relatively high position in the ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56
Inventor 黎定军
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products