Network security processing method and device

A network security and processing method technology, applied in the field of network security processing methods and devices, capable of solving problems such as intranet host attacks

Active Publication Date: 2016-11-16
NEW H3C TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] This application provides a network security processing method and device to solve the problem that the attackers in the existing NAT scheme can easily attack the intranet host through the NAT entry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security processing method and device
  • Network security processing method and device
  • Network security processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0025] refer to figure 1 , shows a flow chart of steps of a network security processing method in the embodiment of the present application. In this embodiment, the network security processing method may be, but not limited to, applied to data interaction between an external network device (external network sender) and internal and external devices (intranet receiver).

[0026] Wherein, the network security processing method includes:

[0027] Step 102, when receiving the external network data request message sent by the external network sender, determine whether the public network address of the external network sender exists in the first verification information.

[0028] Generally, the data exchange...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security processing method and device. The method comprises the steps of judging whether a public network address of an external network sender exists in first verification information or not when an external network data request message sent by the external network sender is received; forwarding the external network data request message if the public network address exists in the first verification information and the state corresponding to the public network address of the external network sender in the first verification information is a first state; updating the first verification information according to a session state between the external network sender and an internal network sender if the public network address does not exist in the first verification information; and forwarding the external network data request message when the state corresponding to the public network address of the external network sender in the updated first verification information is the first state. Through application of the method and the device, the problem that in an existing NAT (Network Address Translation) scheme, an attacker can easily carry out a network attack on an internal network host through NAT table items is solved.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a network security processing method and device. Background technique [0002] With the development of communication technology, there are more and more ways of data interaction, and the security of the communication network environment is becoming more and more important. [0003] For example, a common network security management method can be implemented based on NAT technology (Network Address Translation, network address translation). NAT technology can effectively avoid attacks from external networks while solving the shortage of IP (Internet Protocol, a protocol for interconnection between networks), and effectively hide and protect computers inside the network. Among them, the specific application scenario of NAT technology can be: when some hosts in the private network have already been assigned local IP addresses (that is, private addresses used onl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/2514H04L63/0236H04L63/0876H04L63/126
Inventor 王国利
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products