Data transmission method, device and system based on virtualized network

A data transmission method and virtualized network technology, applied in the field of data transmission method, device and system based on virtualized network, can solve problems such as uncontrollable, unable to defend in a fundamentally effective way, affecting client resource access, etc. Achieve the effect of preventing intrusion attacks and improving security

Active Publication Date: 2021-10-08
于洪 +2
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the risks at the software level are mainly reflected in: (1) The traditional network security defense method is to passively detect virus samples, intrusion signature samples and other mechanisms. What can be released and what can be blocked, but in actual network communication, hackers are often simulated as ordinary users who can be released to access, and are directly released by the network security gateway to enter the user's intranet, which causes uncontrollable risks; (2) The traditional network security is a tower defense. Various security software products are stacked and accumulated, and various static passive defenses are superimposed on each other. It is impossible to defend in a fundamentally effective way. It can only be found and repaired, which cannot be realized. Dynamic + unknown automatic defense; (3) Traditional application software, network equipment, and network security equipment are all marked with clear IP identifiers, such as IP addresses or MAC addresses, which will create opportunities for hackers to scan and detect network IP with hacking tools. address or MAC address and then find the risk of corresponding vulnerabilities to attack; (4) In addition, common application software or system software is often infinitely enlarged due to continuous expansion and boundary expansion of system vulnerabilities or patches, if hackers exploit software vulnerabilities, it will The risk of launching an intrusion attack, thus bringing new risks and hidden dangers
[0005] In terms of hardware-level risks, traditional network security devices operate in an inline mode for network operation and maintenance. To connect and debug your own equipment, there will be a potential risk that the network security protection equipment is exposed in the network, that is to say, any node in the network can connect to this equipment as long as the network route is reachable. At that time, hackers can use brute force password cracking to continuously try user names, passwords, or log in to the browser vulnerabilities of this security device or find backdoors for intrusion attacks; at the same time, the network security device itself also has a CPU that is physically attacked. The crystal oscillator attack and the side channel attack on memory resources, these two attack methods can directly bypass any security protection and directly take over the core control unit, reaching the risk of arbitrary control of the device
In addition, there is another problem that if you want to disconnect the client's access to a certain resource of the server, you need to disconnect the actual physical link to really prevent the client from accessing, and the disconnection of the actual physical line will affect the client's access to the server. Access to other business resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method, device and system based on virtualized network
  • Data transmission method, device and system based on virtualized network
  • Data transmission method, device and system based on virtualized network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0052] Here, it should also be noted that, in order to avoid obscuring the present invention due to unnecessary details, only the structures and / or processing steps closely related to the solution according to the present invention are shown in the drawings, and the related Other details are not relevant to the invention.

[0053] It should be emphasized that the term "comprises / comprises / has" when used herein refers to the presence of a feature, element, step or component, but does not exclude the presence or addition of one or more other features, elements, steps or components.

[0054] In o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data transmission method, device and system based on a virtualized network. The method comprises the steps that first safety equipment located on the side of a communication initiator obtains a service request message sent from the communication initiator through the hijacking technology; and the first safety equipment compiles the network address of the initiator based on a pre-stored first compiling strategy by using a first compiler to obtain a virtual network address of the initiator so as to create a virtualized network based on the virtual network address, a data message with the virtual network address is sent to the receiver by using a physical line established between the initiator and the receiver; and after second safety equipment located at a communication receiver side receives the data from the first safety equipment, a second compiler is utilized to analyze the compiled virtual network address of the initiator based on a pre-stored first analysis strategy, and a service request message identified by the initiator is transmitted to the receiver after successful analysis.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a virtualized network-based data transmission method, device and system. Background technique [0002] In recent years in our country, with the development of network technology and the popularization and enrichment of network applications, the problem of network security has become increasingly serious. High-tech crimes using information technology have shown an increasing trend. Therefore, building a secure communication environment is an inevitable trend. [0003] Due to the diversity of connection forms, the uneven distribution of terminals, and the openness and interconnectivity of the network, it is possible for attackers to detect and scan asset devices in the network, eavesdrop on information on the network, and steal user information. Passwords, database information; it is also possible to tamper with the contents of the database, forge user identities, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/0272H04L61/10H04L63/1441
Inventor 于洪吴胜姜春晓于芷澜于业浩杨丽萍
Owner 于洪
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products