CN111416865B - Protocol proxy processing method and system based on mimicry defense - Google Patents
Protocol proxy processing method and system based on mimicry defense Download PDFInfo
- Publication number
- CN111416865B CN111416865B CN202010213921.1A CN202010213921A CN111416865B CN 111416865 B CN111416865 B CN 111416865B CN 202010213921 A CN202010213921 A CN 202010213921A CN 111416865 B CN111416865 B CN 111416865B
- Authority
- CN
- China
- Prior art keywords
- message
- protocol
- message information
- information
- executive body
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/133—Protocols for remote procedure calls [RPC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/562—Brokering proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/26—Special purpose or proprietary protocols or architectures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a protocol agent processing method based on mimicry defense, which comprises the following steps: the protocol receiving port sends a protocol message to an input agent and the SDK; the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface; the input agent copies and distributes the protocol message to a plurality of heterogeneous executives; each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information; and each heterogeneous executive body judges whether the heterogeneous executive body is the main executive body or not according to the main executive body information issued by the scheduling module, and if the heterogeneous executive body is the main executive body, the heterogeneous executive body sends a protocol message processing result to the front-end interface. The invention also provides a protocol agent processing system based on the mimicry defense.
Description
Technical Field
The invention relates to the technical field of network space security, in particular to a protocol agent processing method and system based on mimicry defense.
Background
With the rapid development of networks, security problems of network spaces are more and more exposed, and traditional passive defense often fails to address increasingly complex network security problems. The cyberspace mimicry defense technology fundamentally changes passive defense against unknown problems of unknown environments into active defense.
The mimicry defense system generally comprises an input agent, an equivalent heterogeneous executive body, a resolver and a feedback controller. The input agent finishes copying and distributing external input information to the heterogeneous executors; the heterogeneous executive body executes the externally input information and outputs the result; the arbitrator carries out multi-mode arbitration on the input result; and the feedback controller processes the judgment result, adjusts the heterogeneous executive bodies and realizes the mimicry camouflage.
The mimicry defense system comprises a protocol function of a common exchange system, protocol messages are different from common commands, in the proxy process, messages received by all ports are forwarded to a specified port, such as linux _ proxy, so that source port information is lost, the port is used for identifying the source port number by modifying the messages forwarded to the linux _ proxy and adding information such as label marks on the messages, and the processing process of the protocol messages in the mimicry system is complex and tedious; while returning results from the executive may result in protocol message duplication.
Disclosure of Invention
In view of the above problems, the present invention needs to provide a protocol proxy processing method and system based on mimicry defense, which solves the problems of complicated protocol message processing and reduced protocol message repetition in the existing mimicry defense system.
The first aspect of the present invention provides a protocol packet processing method based on mimicry defense, which includes:
the protocol receiving port sends a protocol message to the input proxy and the SDK, wherein the protocol message comprises first message information; the first message information comprises source mac and vlan information;
the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface; the second message information comprises a source port number of a protocol receiving port;
the input agent copies and distributes the protocol message to a plurality of heterogeneous executors;
each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to the main executive body information issued by the subscription scheduling module, and if the heterogeneous executive body is the main executive body, a protocol message processing result is sent to a front-end interface; otherwise, no action is taken.
Based on the above, the obtaining, by each heterogeneous execution entity, the second packet information from the SDK according to the first packet information in the protocol packet specifically includes: and each heterogeneous executive body inquires whether the SDK stores the first message information or not through the first message information inquiry interface, if so, returns the second message information corresponding to the first message information, and if not, inquires again.
The invention also provides a protocol message processing system based on mimicry defense, which comprises: the protocol receiving port is used for receiving and forwarding a protocol message, and the protocol message comprises first message information; the first message information comprises source mac and vlan information;
the SDK comprises a message information acquisition module, a storage module and a first message query interface, wherein the message information acquisition module is connected with the protocol receiving port and is used for extracting first message information in the received protocol message and acquiring second message information related to the protocol receiving port; the storage module is used for correspondingly storing the first message information and the second message information; the first message query interface is connected with the storage module and used for querying whether the storage module has first message information according to the received first message query request and returning corresponding second message information when the first message information exists; the second message information comprises a source port number of a protocol receiving port;
the input agent is connected with the protocol receiving port and copies and distributes the protocol message to a plurality of heterogeneous executors;
the scheduling module is connected with the heterogeneous executors and used for issuing the information of the main executors;
the heterogeneous executors are connected with the first message query interface in a remote calling mode and are used for sending a first message query request to the first message query interface and receiving returned second message information, and processing a protocol message according to the first message information and the second message information; and judging whether the mobile terminal is the main executive body or not according to the information of the main executive body, and outputting a protocol message processing result to the front panel port when the mobile terminal is the main executive body.
The invention has prominent substantive characteristics and remarkable progress, in particular to the following steps: the invention can obtain the message information of the protocol message while the heterogeneous executive body obtains the protocol message by adding the step that the SDK stores the message information of the protocol message and the heterogeneous executive body obtains the message information related to the protocol message from the SDK, and a user can realize the proxy of the network protocol such as the proxy of protocols such as stp, lldp, rip and the like without performing any operation on the message information, namely modifying the message forwarded to a protocol transceiving port by adding a label mark and the like to identify a source port number, thereby solving the problem of complex protocol message processing in the traditional mimicry system and simplifying the protocol message processing step; meanwhile, the heterogeneous executive body compares the subscribed main executive body message to judge whether the heterogeneous executive body is the main executive body, and only the main executive body inputs the protocol message processing result to the front panel port, so that the problem of protocol message repetition is reduced.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 shows a flow chart of the protocol agent processing method based on the mimicry defense of the invention.
Fig. 2 shows a schematic structural diagram of the protocol agent processing method based on mimicry defense.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
It will be understood that when an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
Example 1
As shown in fig. 1, a first aspect of the present invention provides a protocol packet processing method based on mimicry defense, including:
the protocol receiving port sends a protocol message to the input proxy and the SDK, wherein the protocol message comprises first message information; in specific application, a specified protocol receiving and reporting port can be selected according to the type of the protocol message to receive and send the protocol message;
the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface; specifically, a table similar to a mac table may be created in the SDK to store the first message information and the second message information;
the input agent copies and distributes the protocol message to a plurality of heterogeneous executors;
each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to the main executive body information issued by the subscription scheduling module, and if the heterogeneous executive body is the main executive body, a protocol message processing result is sent to a front-end interface; otherwise, no action is taken.
Preferably, in S3, the step of obtaining, by each heterogeneous executive body, the second message information from the SDK according to the first message information in the protocol message specifically includes: and each heterogeneous executive body inquires whether the SDK stores the first message information or not through the first message information inquiry interface, if so, returns the second message information corresponding to the first message information, and if not, inquires again.
In a specific application, all the heterogeneous executors query the SDK through a common first message information query interface to obtain corresponding second message information.
It should be noted that each heterogeneous executor needs to subscribe to the scheduling module, and the scheduling module issues the main executor information in a targeted manner.
For convenience of understanding, the stp protocol is taken as an example herein to describe in detail the specific implementation process:
the p _ in protocol receiving port sends an stp protocol message to an input agent and the SDK;
an input proxy forwards an stp protocol message to each heterogeneous executive, wherein the stp protocol message contains first message information, and the first message information comprises source mac and vlan information;
after receiving a protocol message sent by a protocol receiving and reporting port, the SDK acquires a source port number of a p _ in protocol receiving and reporting port as second message information, extracts source mac and vlan information from the protocol message, and stores the source mac and vlan information and the source port number in a one-to-one correspondence manner; creating a source mac and vlan information query interface;
each heterogeneous executive body inquires whether the SDK stores the source mac information and the vlan information or not through a source mac information inquiry interface and a vlan information inquiry interface, if so, the source port number corresponding to the heterogeneous executive body is returned, and if not, inquiry is carried out again;
each heterogeneous execution body processes the protocol message according to the source mac, the vlan information and the source port number, such as calculating a root bridge and a block port;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to the main executive body information issued by the subscribed scheduling module, and if the heterogeneous executive body is the main executive body, protocol stp bpdu information is sent to a front-end interface; otherwise, no action is taken.
The invention can obtain the message information of the protocol message while the heterogeneous executive body obtains the protocol message by adding the step that the SDK stores the message information of the protocol message and the heterogeneous executive body obtains the message information related to the protocol message from the SDK, and a user can realize the proxy of the network protocol such as the proxy of protocols such as stp, lldp, rip and the like without performing any operation on the message information, namely modifying the message forwarded to a protocol transceiving port by adding a label mark and the like to identify a source port number, thereby solving the problem of complex protocol message processing in the traditional mimicry system and simplifying the protocol message processing step; meanwhile, the heterogeneous executive body compares the subscribed main executive body message to judge whether the heterogeneous executive body is the main executive body, and only the main executive body inputs the protocol message processing result to the front panel port, so that the problem of protocol message repetition is reduced.
Example 2
As shown in fig. 2, the present invention further provides a protocol message processing system based on mimicry defense, which includes:
the protocol receiving port is used for receiving and forwarding a protocol message, and the protocol message comprises first message information;
the SDK comprises a message information acquisition module, a storage module and a first message query interface, wherein the message information acquisition module is connected with the protocol message receiving port and is used for extracting first message information in a received protocol message and acquiring second message information related to the protocol message receiving port; the storage module is used for correspondingly storing the first message information and the second message information; the first message query interface is connected with the storage module and used for querying whether the storage module has first message information according to the received first message query request and returning corresponding second message information when the first message information exists;
the input agent is connected with the protocol receiving port and copies and distributes the protocol message to a plurality of heterogeneous executors;
the scheduling module is connected with the heterogeneous executors and used for issuing the information of the main executors;
the heterogeneous executors are connected with the first message query interface in a remote calling mode and are used for sending a first message query request to the first message query interface and receiving returned second message information, and processing a protocol message according to the first message information and the second message information; and judging whether the mobile terminal is the main executive body or not according to the information of the main executive body, and outputting a protocol message processing result to the front panel port when the mobile terminal is the main executive body.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (5)
1. A protocol message processing method based on mimicry defense is characterized by comprising the following steps:
the protocol receiving port sends a protocol message to the input agent and the SDK, wherein the protocol message comprises first message information; the first message information comprises source mac and vlan information;
the SDK acquires second message information related to a protocol message receiving port, extracts first message information from the protocol message, stores the first message information and the second message information in a one-to-one correspondence manner, and creates a first message information query interface; the second message information comprises a source port number of a protocol receiving and reporting port;
the input agent copies and distributes the protocol message to a plurality of heterogeneous executives;
each heterogeneous executive body obtains second message information from the SDK according to the first message information in the protocol message and processes the protocol message according to the first message information and the second message information;
each heterogeneous executive body judges whether the heterogeneous executive body is a main executive body or not according to the main executive body information issued by the scheduling module, and if the heterogeneous executive body is the main executive body, a protocol message processing result is sent to a front-end interface; otherwise, no action is taken.
2. The protocol packet processing method according to claim 1, wherein: each heterogeneous executive body specifically comprises the following steps of obtaining second message information from the SDK according to the first message information in the protocol message: and each heterogeneous executive body inquires whether the SDK stores the first message information or not through the first message information inquiry interface, if so, the heterogeneous executive body returns the second message information corresponding to the heterogeneous executive body, and if not, the heterogeneous executive body inquires again.
3. The protocol message processing method according to claim 1 or 2, characterized in that: each heterogeneous executive needs to subscribe to the scheduling module.
4. The protocol packet processing method according to claim 3, wherein: and the scheduling module issues the main executive body information at regular time.
5. A protocol message processing system based on mimicry defense is characterized by comprising:
the protocol receiving port is used for receiving and forwarding a protocol message, and the protocol message comprises first message information; the first message information comprises source mac and vlan information;
the SDK comprises a message information acquisition module, a storage module and a first message query interface, wherein the message information acquisition module is connected with the protocol message receiving port and is used for extracting first message information in a received protocol message and acquiring second message information related to the protocol message receiving port; the storage module is used for correspondingly storing the first message information and the second message information; the first message query interface is connected with the storage module and used for querying whether the storage module has first message information or not according to the received first message query request and returning corresponding second message information when the storage module has the first message information; the second message information comprises a source port number of a protocol receiving and reporting port;
the input agent is connected with the protocol receiving port and copies and distributes the protocol message to a plurality of heterogeneous executors;
the scheduling module is connected with the heterogeneous executors and used for issuing the information of the main executors;
the heterogeneous executors are connected with the first message query interface in a remote calling mode and used for sending a first message query request to the first message query interface, receiving returned second message information and processing a protocol message according to the first message information and the second message information; and judging whether the main executive body is the main executive body or not according to the main executive body information, and outputting a protocol message processing result to the front panel port when the main executive body is the main executive body.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010213921.1A CN111416865B (en) | 2020-03-24 | 2020-03-24 | Protocol proxy processing method and system based on mimicry defense |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010213921.1A CN111416865B (en) | 2020-03-24 | 2020-03-24 | Protocol proxy processing method and system based on mimicry defense |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111416865A CN111416865A (en) | 2020-07-14 |
CN111416865B true CN111416865B (en) | 2022-12-13 |
Family
ID=71493182
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010213921.1A Active CN111416865B (en) | 2020-03-24 | 2020-03-24 | Protocol proxy processing method and system based on mimicry defense |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111416865B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112187865B (en) * | 2020-09-02 | 2022-11-01 | 中国人民解放军战略支援部队信息工程大学 | Open shortest path priority message processing method and mimicry equipment |
CN112511441A (en) * | 2020-11-18 | 2021-03-16 | 潍柴动力股份有限公司 | Message processing method and device |
CN112637238B (en) * | 2020-12-31 | 2022-08-16 | 河南信大网御科技有限公司 | Telnet proxy method, architecture and medium for protocol stack detachment |
CN113347085B (en) * | 2021-06-02 | 2022-12-13 | 河南信大网御科技有限公司 | Method for realizing STP protocol under mimicry environment |
CN113422721B (en) * | 2021-08-24 | 2021-11-09 | 之江实验室 | Method for realizing mimicry industrial edge computing gateway |
CN114915657B (en) * | 2022-04-24 | 2024-01-26 | 中国人民解放军战略支援部队信息工程大学 | Mimicry application distributed tracking method based on OpenTraing specification |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102480462A (en) * | 2010-11-23 | 2012-05-30 | 中国电信股份有限公司 | Universal protocol adapting method and device |
CN106992982A (en) * | 2017-03-31 | 2017-07-28 | 中国人民解放军信息工程大学 | A kind of dynamic routing protocol based on SDN performs body and realizes device and method |
CN107819774A (en) * | 2017-11-16 | 2018-03-20 | 郑州云海信息技术有限公司 | A kind of SDN isomeries multi-controller Synergistic method and system |
CN110177046A (en) * | 2019-04-18 | 2019-08-27 | 中国人民解放军战略支援部队信息工程大学 | Secure exchange chip, implementation method and the network switching equipment based on mimicry thought |
CN110247928A (en) * | 2019-06-29 | 2019-09-17 | 河南信大网御科技有限公司 | A kind of mimicry interchanger safe traffic control device and method |
CN110380961A (en) * | 2019-07-05 | 2019-10-25 | 中国人民解放军战略支援部队信息工程大学 | A kind of device and method of conventional router mimicryization transformation |
CN110557437A (en) * | 2019-08-05 | 2019-12-10 | 上海拟态数据技术有限公司 | universal mimicry distribution voting scheduling device and method based on user-defined protocol |
CN110740077A (en) * | 2019-09-24 | 2020-01-31 | 华东计算技术研究所(中国电子科技集团公司第三十二研究所) | Simulation system heterogeneity testing system, method and device based on network packet capturing |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8412945B2 (en) * | 2011-08-09 | 2013-04-02 | CloudPassage, Inc. | Systems and methods for implementing security in a cloud computing environment |
US10367834B2 (en) * | 2015-05-12 | 2019-07-30 | CloudPassage, Inc. | Systems and methods for implementing intrusion prevention |
-
2020
- 2020-03-24 CN CN202010213921.1A patent/CN111416865B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102480462A (en) * | 2010-11-23 | 2012-05-30 | 中国电信股份有限公司 | Universal protocol adapting method and device |
CN106992982A (en) * | 2017-03-31 | 2017-07-28 | 中国人民解放军信息工程大学 | A kind of dynamic routing protocol based on SDN performs body and realizes device and method |
CN107819774A (en) * | 2017-11-16 | 2018-03-20 | 郑州云海信息技术有限公司 | A kind of SDN isomeries multi-controller Synergistic method and system |
CN110177046A (en) * | 2019-04-18 | 2019-08-27 | 中国人民解放军战略支援部队信息工程大学 | Secure exchange chip, implementation method and the network switching equipment based on mimicry thought |
CN110247928A (en) * | 2019-06-29 | 2019-09-17 | 河南信大网御科技有限公司 | A kind of mimicry interchanger safe traffic control device and method |
CN110380961A (en) * | 2019-07-05 | 2019-10-25 | 中国人民解放军战略支援部队信息工程大学 | A kind of device and method of conventional router mimicryization transformation |
CN110557437A (en) * | 2019-08-05 | 2019-12-10 | 上海拟态数据技术有限公司 | universal mimicry distribution voting scheduling device and method based on user-defined protocol |
CN110740077A (en) * | 2019-09-24 | 2020-01-31 | 华东计算技术研究所(中国电子科技集团公司第三十二研究所) | Simulation system heterogeneity testing system, method and device based on network packet capturing |
Non-Patent Citations (2)
Title |
---|
"CAOHS:一种混合软件定义网络控制器架构";崔世建等;《信息工程大学学报》;20190630;第20卷(第3期);全文 * |
基于动态异构冗余机制的路由器拟态防御体系结构;马海龙等;《信息安全学报》;20170115(第01期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111416865A (en) | 2020-07-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111416865B (en) | Protocol proxy processing method and system based on mimicry defense | |
CN102938794B (en) | ARP message forwarding method, switch and controller | |
EP3734913A1 (en) | Communication method and communication apparatus | |
CN101674255B (en) | Method, server and system for forwarding messages of enterprise service bus | |
CN104270302B (en) | The transmission system of online order and transfer approach | |
CN101175000A (en) | Method and device for automatic IP address detection | |
CN106921578B (en) | Method and device for generating forwarding table item | |
CN102263774A (en) | Method and device for processing source role information | |
CN110233834B (en) | Network system, method, device and equipment for intercepting attack message | |
CN109802951B (en) | Message forwarding method, device and storage device | |
CN107547346B (en) | Message transmission method and device | |
CN103441932A (en) | Host routing table entry generating method and device | |
CN101345657A (en) | Method and system for cluster management of multiple network elements based on simple network management protocol | |
CN100446509C (en) | Method for realizing re-oriented message correctly repeat and first-part and second-part | |
CN107465621A (en) | A kind of router finds method, SDN controllers, router and network system | |
CN106452954B (en) | HTTP data characteristics analysis method and system | |
CN100586124C (en) | Securing communications equipment for processing data packets according to the send mechanism | |
CN108471440B (en) | Digital talkback method and system | |
CN105700859A (en) | Network-processor-based hardware table traversal method and apparatus | |
EP2124487A1 (en) | Service processing method and processing system and service control point | |
CN112165537B (en) | Virtual IP method for ping reply | |
CN101605301A (en) | A kind of group system and request message distribution method that carries out the multinode transaction | |
CN104717216A (en) | Network access control method, device and core equipment | |
CN111125493B (en) | High-speed data query system and method based on protocol non-perception forwarding | |
CN101902699B (en) | Message number-based message processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |