Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network routing protocol protection method and system based on traffic behavior

A routing protocol and flow technology, applied in the field of network security, can solve problems such as fixed, lack of self-learning and intelligent update protection rules, and achieve the effect of improving the effectiveness of protection

Active Publication Date: 2022-03-29
北京网太科技发展有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The protection method of the network routing protocol is mainly realized by means of flow data packet filtering, state monitoring and proxy service. The protection rules are fixed, and the protection rules cannot be automatically changed according to the specific behavior of the data traffic. It does not have the function of self-learning and intelligent update of the protection rules.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network routing protocol protection method and system based on traffic behavior
  • A network routing protocol protection method and system based on traffic behavior
  • A network routing protocol protection method and system based on traffic behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0034] figure 1 A traffic behavior-based network router protocol protection method provided by an embodiment of the present invention, such as figure 1 As shown, the method includes:

[0035] Step 101, the security management platform issues the rule template to the firewall;

[0036] Step 102, the firewall monitors the threat of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention provides a network routing protocol protection method based on traffic behavior. The method includes: the security management platform sends the rule template to the firewall; the firewall monitors the threat of the flow data according to the rule template and reports the threat flow data packets obtained through monitoring to the security management platform; the threat flow data received by the security management platform After the packet reaches the first threshold, an instruction is issued to enable the firewall to count the number of identical times of the most threatening routing protocol field parameters; The management platform generates a new configuration template. Compared with traditional routing protocol protection methods, the invention can effectively improve the protection effectiveness.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network router protocol protection method and system based on traffic behavior. Background technique [0002] The network routing protocol belongs to the network layer in the seven-layer network protocol, and the network layer defines the end-to-end packet transmission. The traditional network routing protocol protection method is to establish a security control point at the boundary of the network connection. By allowing, denying or redefining the data flow through the firewall, it can audit and control the services and access to and from the internal network. [0003] The network routing protocol protection method is mainly implemented by means of traffic packet filtering, state monitoring and proxy service. The protection rules are fixed, and the protection rules cannot be automatically changed according to the specific behavior of the data traffic. It does not have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L43/16H04L45/00
CPCH04L63/1433H04L63/0236H04L63/0245H04L45/04H04L43/16
Inventor 卢敏胥斌王彤李亚峰杜爱红沈慧婷
Owner 北京网太科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products