[go: up one dir, main page]

CN109639699B - Network management method and device - Google Patents

Network management method and device Download PDF

Info

Publication number
CN109639699B
CN109639699B CN201811585178.1A CN201811585178A CN109639699B CN 109639699 B CN109639699 B CN 109639699B CN 201811585178 A CN201811585178 A CN 201811585178A CN 109639699 B CN109639699 B CN 109639699B
Authority
CN
China
Prior art keywords
packet
network device
characteristic information
communication channel
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811585178.1A
Other languages
Chinese (zh)
Other versions
CN109639699A (en
Inventor
陈正
朱建波
王大为
赵梦璧
唐宏
朱永庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201811585178.1A priority Critical patent/CN109639699B/en
Publication of CN109639699A publication Critical patent/CN109639699A/en
Application granted granted Critical
Publication of CN109639699B publication Critical patent/CN109639699B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0213Standardised network management protocols, e.g. simple network management protocol [SNMP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0668Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请提供一种网络管理方法和装置,能够解决网络设备被攻击时,无法接收其他网络设备发送的合法报文的问题。其方法为:第一网络设备确定第一网络设备的第一通信通道处于被攻击状态,发送第一报文,第一报文包括第一TLV,第一TLV包括攻击报文的特征信息;第一网络设备从第二网络设备接收第二报文,第二报文包括第二TLV,第二TLV包括第二网络设备待发送的第三报文的特征信息;第一网络设备根据第三报文的特征信息生成第二通信通道,第二通信通道与第一通信通道不同,第一网络设备通过第二通信通道接收第三报文。本申请实施例应用于自治系统的网络管理过程中。

The present application provides a network management method and device, which can solve the problem that when a network device is attacked, it cannot receive legal packets sent by other network devices. The method is as follows: the first network device determines that the first communication channel of the first network device is in an attacked state, and sends a first message, where the first message includes a first TLV, and the first TLV includes feature information of the attack message; A network device receives a second packet from a second network device, the second packet includes a second TLV, and the second TLV includes feature information of a third packet to be sent by the second network device; the first network device according to the third packet The feature information of the message generates a second communication channel, the second communication channel is different from the first communication channel, and the first network device receives the third message through the second communication channel. The embodiments of the present application are applied in the network management process of the autonomous system.

Description

一种网络管理方法和装置A network management method and device

技术领域technical field

本申请涉及通信领域,尤其涉及一种网络管理方法和装置。The present application relates to the field of communications, and in particular, to a network management method and apparatus.

背景技术Background technique

如图1所示,网络设备A、网络设备B和网络设备C处在同一个内部网关协议(Interior Gateway Protocol,IGP)域中。假设网络设备A正在被攻击服务器的标签分发协议(Label Distribution Protocol,LDP)报文攻击,而网络设备C需要向网络设备A发送报文(例如,合法的LDP报文)。此时,由于攻击服务器发送的LDP攻击报文(数量巨大)导致网络设备A的上送通信通道拥塞,网络设备A无法接收到网络设备C发送的合法LDP报文,从而网络设备C无法与网络设备A成功建立LDP会话。As shown in FIG. 1 , network device A, network device B, and network device C are in the same interior gateway protocol (Interior Gateway Protocol, IGP) domain. It is assumed that the network device A is being attacked by a Label Distribution Protocol (Label Distribution Protocol, LDP) packet of the attacking server, and the network device C needs to send a packet (for example, a legal LDP packet) to the network device A. At this time, due to the huge number of LDP attack packets sent by the attack server, the communication channel sent by network device A is congested, and network device A cannot receive the legitimate LDP packets sent by network device C. Therefore, network device C cannot communicate with the network. Device A successfully establishes an LDP session.

如图2所示,目前,网络设备的上送通道可以包括普通上送通道和白名单上送通道。若两个网络设备建立了LDP会话,LDP报文可以直接进入白名单通道,若两个网络设备未建立LDP会话,LDP报文进入普通上送通道。为了对攻击报文进行防御,如图3所示,当攻击报文进入普通上送通道,导致普通上送通道拥塞丢包后,可以对普通上送通道的攻击报文进行采样以识别出攻击报文的特征(如源端口/协议号等信息),再生成一个受限的特定带宽的上送通道专门用于传输符合上述特征的攻击报文。这样,当攻击报文的特征与合法报文完全不同时,合法报文进入普通上送通道,攻击报文进入受限上送通道,不影响被攻击的网络设备对合法报文的接收。As shown in FIG. 2 , at present, the upload channel of the network device may include a common upload channel and a whitelist upload channel. If two network devices establish an LDP session, LDP packets can directly enter the whitelisted channel. If the two network devices do not establish an LDP session, LDP packets enter the common upload channel. In order to defend against attack packets, as shown in Figure 3, when the attack packets enter the common upload channel, resulting in congestion and packet loss on the common upload channel, you can sample the attack packets on the common upload channel to identify the attack. The characteristics of the packet (such as source port/protocol number and other information) are generated, and then a limited and specific bandwidth upload channel is specially used to transmit attack packets that meet the above characteristics. In this way, when the characteristics of the attack packets are completely different from those of the legitimate packets, the legitimate packets enter the normal transmission channel, and the attack packets enter the restricted transmission channel, which does not affect the receiving of the legitimate packets by the attacked network device.

但是,当攻击报文使用源地址遍历的欺骗攻击时,攻击报文的特征(如源端口/协议号等信息)包括(伪造)合法报文(即非攻击报文)的特征,导致网络设备无法识别攻击报文,由于攻击报文(数量巨大)会导致被攻击的网络设备的上送通信通道拥塞,从而导致被攻击的网络设备无法接收其他网络设备发送的合法报文。However, when the attack packet uses the spoofing attack of source address traversal, the characteristics of the attack packet (such as source port/protocol number and other information) include (forged) the characteristics of legitimate packets (that is, non-attack packets), causing network devices The attack packets cannot be identified, because the large number of attack packets will cause congestion on the communication channel sent by the attacked network device, so that the attacked network device cannot receive legitimate packets sent by other network devices.

发明内容SUMMARY OF THE INVENTION

本申请实施例提供一种网络管理方法和装置,能够解决网络设备被攻击时,无法接收其他网络设备发送的合法报文的问题。The embodiments of the present application provide a network management method and device, which can solve the problem that when a network device is attacked, it cannot receive legal packets sent by other network devices.

第一方面,本申请实施例提供一种网络管理方法,包括:第一网络设备确定第一网络设备的第一通信通道处于被攻击状态,第一网络设备发送第一报文;其中,第一报文包括第一类型长度值(type-length-value,TLV),第一TLV包括攻击报文的特征信息;第一网络设备从第二网络设备接收第二报文;其中,第二报文包括第二TLV,第二TLV包括第二网络设备待发送的第三报文的特征信息;第一网络设备根据第三报文的特征信息生成第二通信通道,第二通信通道与第一通信通道不同,第一网络设备通过第二通信通道接收第三报文。In a first aspect, an embodiment of the present application provides a network management method, including: a first network device determines that a first communication channel of the first network device is in an attacked state, and the first network device sends a first packet; wherein the first The packet includes a first type length value (type-length-value, TLV), and the first TLV includes feature information of the attack packet; the first network device receives the second packet from the second network device; wherein, the second packet Including a second TLV, the second TLV includes feature information of the third message to be sent by the second network device; the first network device generates a second communication channel according to the feature information of the third message, and the second communication channel communicates with the first The channels are different, and the first network device receives the third packet through the second communication channel.

基于本申请提供的方法,第一网络设备可以通过第二通信通道接收第三报文。由于第二通信通道与第一通信通道不同(即第二通信通道独立于第一通信通道),可以不受攻击报文的影响,因此第一网络设备可以成功接收第三报文,解决了网络设备(例如,第一网络设备)被攻击时,无法接收其他网络设备(例如,第二网络设备)发送的合法报文的问题。Based on the method provided in this application, the first network device may receive the third packet through the second communication channel. Since the second communication channel is different from the first communication channel (that is, the second communication channel is independent of the first communication channel), it is not affected by the attack packet, so the first network device can successfully receive the third packet, which solves the problem of network problems. When a device (for example, a first network device) is attacked, it cannot receive legitimate packets sent by other network devices (for example, a second network device).

在一种可能的实现方式中,攻击报文的特征信息或待发送的第三报文的特征信息包括以下至少一种参数:以太类型、协议类型、源端口、目的端口、源网际协议(InternetProtocol,IP)地址、目的IP地址、源媒体接入控制(Media Access Control,MAC)、目的MAC地址、生存时间(time to live,TTL)、报文长度或优先级要求;其中,待发送的第三报文的特征信息与攻击报文的特征信息不同或者不同。In a possible implementation manner, the characteristic information of the attack packet or the characteristic information of the third packet to be sent includes at least one of the following parameters: Ethernet type, protocol type, source port, destination port, source Internet Protocol (Internet Protocol) , IP) address, destination IP address, source media access control (Media Access Control, MAC), destination MAC address, time to live (time to live, TTL), packet length or priority requirements; The characteristic information of the three packets is different or different from the characteristic information of the attack packet.

在一种可能的实现方式中,待发送的第三报文的特征信息包括的参数的类型多于攻击报文的特征信息包括的参数的类型。例如,攻击报文的特征信息可以包括:协议号=协议无关组播(Protocol Independent Multicast,PIM)(103);第三报文的特征信息可以包括:协议号=PIM(103),目的IP地址=第一网络设备的IP地址,源IP地址=第二网络设备的IP地址,报文长度=100。In a possible implementation manner, the characteristic information of the third packet to be sent includes more types of parameters than the characteristic information of the attack packet includes. For example, the characteristic information of the attack packet may include: protocol number=Protocol Independent Multicast (PIM) (103); the characteristic information of the third packet may include: protocol number=PIM (103), destination IP address = IP address of the first network device, source IP address = IP address of the second network device, packet length = 100.

在一种可能的实现方式中,待发送的第三报文的特征信息与攻击报文的特征信息包括至少一个不同取值的参数。例如,攻击报文的特征信息可以包括:协议号=PIM(103),源IP地址=1.0.0.0/8;第三报文的特征信息可以包括:协议号=PIM(103),源IP地址=第二网络设备的源IP地址(2.0.0.1/32)。In a possible implementation manner, the feature information of the third packet to be sent and the feature information of the attack packet include at least one parameter with different values. For example, the characteristic information of the attack packet may include: protocol number=PIM(103), source IP address=1.0.0.0/8; the characteristic information of the third packet may include: protocol number=PIM(103), source IP address = Source IP address of the second network device (2.0.0.1/32).

在一种可能的实现方式中,第一报文或第二报文为链路状态协议数据单元(linkstate protocol data unit,LSP)报文或链路状态公告(link-state advertisement,LSA)报文。In a possible implementation manner, the first packet or the second packet is a link state protocol data unit (LSP) packet or a link state advertisement (link-state advertisement, LSA) packet .

在一种可能的实现方式中,第二TLV还包括第二通信通道的带宽要求或优先级要求中的至少一个。这样一来,若待发送的第三报文的速率要求较高,可以将第二通信通道的带宽要求设置得较大,以便终端设备根据第二通信通道的带宽要求建立一个较大带宽的第二通信通道,从而满足第三报文的速率要求。若待发送的第三报文的优先级要求较高,可以将第二通信通道的优先级设置得较高,以便终端设备建立第二通信通道后,优先处理该第二通信通道中的第三报文。In a possible implementation manner, the second TLV further includes at least one of a bandwidth requirement or a priority requirement of the second communication channel. In this way, if the rate requirement of the third packet to be sent is relatively high, the bandwidth requirement of the second communication channel can be set to be larger, so that the terminal device can establish a larger bandwidth third packet according to the bandwidth requirement of the second communication channel. Two communication channels, so as to meet the rate requirement of the third packet. If the priority of the third packet to be sent is higher, the priority of the second communication channel can be set higher, so that after the terminal device establishes the second communication channel, it preferentially processes the third packet in the second communication channel. message.

在一种可能的实现方式中,当第一网络设备确定第一通信通道处于拥塞状态时,第一网络设备确定第一通信通道处于被攻击状态;或者,当第一网络设备确定第一通信通道的错误报文的数量达到第一阈值或者错误报文的速率达到第二阈值时,第一网络设备确定第一通信通道处于被攻击状态;或者,当第一网络设备确定第一通信通道的第一特征的报文的数量达到第三阈值或者第一特征的报文的速率达到第二阈值时,第一网络设备确定第一通信通道处于被攻击状态。In a possible implementation manner, when the first network device determines that the first communication channel is in a congested state, the first network device determines that the first communication channel is in an attacked state; or, when the first network device determines that the first communication channel is in a congested state When the number of error packets reaches the first threshold or the rate of error packets reaches the second threshold, the first network device determines that the first communication channel is in an attacked state; or, when the first network device determines that the first communication channel is in an attacked state; When the number of packets of a characteristic reaches the third threshold or the rate of packets of the first characteristic reaches the second threshold, the first network device determines that the first communication channel is in an attacked state.

第二方面,本申请实施例提供一种网络管理方法,包括:第二网络设备接收第一报文;其中,第一报文包括第一TLV,第一TLV包括攻击报文的特征信息;第二网络设备发送第二报文;其中,第二报文包括第二TLV,第二TLV包括第二网络设备待发送的第三报文的特征信息;第二网络设备基于第三报文的特征信息向第一网络设备发送第三报文。In a second aspect, an embodiment of the present application provides a network management method, including: a second network device receiving a first packet; wherein the first packet includes a first TLV, and the first TLV includes feature information of an attack packet; The second network device sends a second packet; wherein, the second packet includes a second TLV, and the second TLV includes feature information of the third packet to be sent by the second network device; the second network device is based on the characteristics of the third packet The information sends a third message to the first network device.

基于本申请提供的方法,第二网络设备可以基于第三报文的特征信息向第一网络设备发送第三报文,即第二网络设备可以通过第二通信通道向第一网络设备发送第三报文。由于第二通信通道与第一通信通道不同(即第二通信通道独立于第一通信通道),可以不受攻击报文的影响,因此第一网络设备可以成功接收第三报文,解决了网络设备(例如,第一网络设备)被攻击时,无法接收其他网络设备(例如,第二网络设备)发送的合法报文的问题。Based on the method provided in this application, the second network device can send the third packet to the first network device based on the feature information of the third packet, that is, the second network device can send the third packet to the first network device through the second communication channel message. Since the second communication channel is different from the first communication channel (that is, the second communication channel is independent of the first communication channel), it is not affected by the attack packet, so the first network device can successfully receive the third packet, which solves the problem of network problems. When a device (for example, a first network device) is attacked, it cannot receive legitimate packets sent by other network devices (for example, a second network device).

在一种可能的实现方式中,攻击报文的特征信息或待发送的第三报文的特征信息包括以下至少一种参数:以太类型、协议类型、源端口、目的端口、源IP地址、目的IP地址、源MAC地址、目的MAC地址、TTL、报文长度或优先级要求;其中,待发送的第三报文的特征信息与攻击报文的特征信息不同。In a possible implementation manner, the characteristic information of the attack packet or the characteristic information of the third packet to be sent includes at least one of the following parameters: ether type, protocol type, source port, destination port, source IP address, destination IP address, source MAC address, destination MAC address, TTL, packet length or priority requirements; wherein, the characteristic information of the third packet to be sent is different from the characteristic information of the attack packet.

在一种可能的实现方式中,待发送的第三报文的特征信息包括的参数的类型多于攻击报文的特征信息包括的参数的类型;或者,待发送的第三报文的特征信息与攻击报文的特征信息包括至少一个不同取值的参数。In a possible implementation manner, the characteristic information of the third packet to be sent includes more types of parameters than the characteristic information of the attack packet; or, the characteristic information of the third packet to be sent The feature information of the attack packet includes at least one parameter with a different value.

在一种可能的实现方式中,第一报文或第二报文为LSP报文或LSA报文。In a possible implementation manner, the first packet or the second packet is an LSP packet or an LSA packet.

在一种可能的实现方式中,第二TLV还包括第二通信通道的带宽要求或优先级要求中的至少一个。In a possible implementation manner, the second TLV further includes at least one of a bandwidth requirement or a priority requirement of the second communication channel.

第三方面,本申请实施例提供了一种第一网络设备,包括:确定单元,用于确定第一网络设备的第一通信通道处于被攻击状态;发送单元,用于发送第一报文;其中,第一报文包括第一TLV,第一TLV包括攻击报文的特征信息;接收单元,用于从第二网络设备接收第二报文;其中,第二报文包括第二TLV,第二TLV包括第二网络设备待发送的第三报文的特征信息;处理单元,用于根据第三报文的特征信息生成第二通信通道,第二通信通道与第一通信通道不同,第一网络设备通过第二通信通道接收第三报文。In a third aspect, an embodiment of the present application provides a first network device, including: a determining unit configured to determine that a first communication channel of the first network device is in an attacked state; a sending unit configured to send a first packet; The first packet includes a first TLV, and the first TLV includes feature information of the attack packet; the receiving unit is configured to receive the second packet from the second network device; wherein the second packet includes the second TLV, and the first packet includes the second TLV. The second TLV includes characteristic information of the third packet to be sent by the second network device; the processing unit is configured to generate a second communication channel according to the characteristic information of the third packet. The second communication channel is different from the first communication channel, and the first communication channel is different from the first communication channel. The network device receives the third packet through the second communication channel.

在一种可能的实现方式中,攻击报文的特征信息或待发送的第三报文的特征信息包括以下至少一种参数:以太类型、协议类型、源端口、目的端口、源IP地址、目的IP地址、源MAC地址、目的MAC地址、TTL、报文长度或优先级要求;其中,待发送的第三报文的特征信息与攻击报文的特征信息不同。In a possible implementation manner, the characteristic information of the attack packet or the characteristic information of the third packet to be sent includes at least one of the following parameters: ether type, protocol type, source port, destination port, source IP address, destination IP address, source MAC address, destination MAC address, TTL, packet length or priority requirements; wherein, the characteristic information of the third packet to be sent is different from the characteristic information of the attack packet.

在一种可能的实现方式中,待发送的第三报文的特征信息包括的参数的类型多于攻击报文的特征信息包括的参数的类型;或者,待发送的第三报文的特征信息与攻击报文的特征信息包括至少一个不同取值的参数。In a possible implementation manner, the characteristic information of the third packet to be sent includes more types of parameters than the characteristic information of the attack packet; or, the characteristic information of the third packet to be sent The feature information of the attack packet includes at least one parameter with a different value.

在一种可能的实现方式中,确定单元用于:当确定第一通信通道处于拥塞状态时,确定第一通信通道处于被攻击状态;或者,当确定第一通信通道的错误报文的数量达到第一阈值或者错误报文的速率达到第二阈值时,确定第一通信通道处于被攻击状态;或者,当确定第一通信通道的第一特征的报文的数量达到第三阈值或者第一特征的报文的速率达到第二阈值时,确定第一通信通道处于被攻击状态。In a possible implementation manner, the determining unit is configured to: when it is determined that the first communication channel is in a congested state, determine that the first communication channel is in an attacked state; or, when it is determined that the number of error packets of the first communication channel reaches When the first threshold or the rate of error packets reaches the second threshold, it is determined that the first communication channel is in an attacked state; or, when it is determined that the number of packets of the first characteristic of the first communication channel reaches the third threshold or the first characteristic When the rate of the packets reaches the second threshold, it is determined that the first communication channel is in an attacked state.

第四方面,本申请实施例提供了一种第二网络设备,其特征在于,包括:接收单元,用于接收第一报文;其中,第一报文包括第一TLV,第一TLV包括攻击报文的特征信息;发送单元,用于发送第二报文;其中,第二报文包括第二TLV,第二TLV包括第二网络设备待发送的第三报文的特征信息;发送单元,还用于基于第三报文的特征信息向第一网络设备发送第三报文。In a fourth aspect, an embodiment of the present application provides a second network device, characterized by comprising: a receiving unit configured to receive a first packet; wherein the first packet includes a first TLV, and the first TLV includes an attack feature information of the message; a sending unit, configured to send a second message; wherein, the second message includes a second TLV, and the second TLV includes feature information of a third message to be sent by the second network device; the sending unit, It is also used for sending a third packet to the first network device based on the feature information of the third packet.

在一种可能的实现方式中,攻击报文的特征信息或待发送的第三报文的特征信息包括以下至少一种参数:以太类型、协议类型、源端口、目的端口、源IP地址、目的IP地址、源MAC地址、目的MAC地址、TTL、报文长度或优先级要求;其中,待发送的第三报文的特征信息与攻击报文的特征信息不同。In a possible implementation manner, the characteristic information of the attack packet or the characteristic information of the third packet to be sent includes at least one of the following parameters: ether type, protocol type, source port, destination port, source IP address, destination IP address, source MAC address, destination MAC address, TTL, packet length or priority requirements; wherein, the characteristic information of the third packet to be sent is different from the characteristic information of the attack packet.

在一种可能的实现方式中,待发送的第三报文的特征信息包括的参数的类型多于攻击报文的特征信息包括的参数的类型;或者,待发送的第三报文的特征信息与攻击报文的特征信息包括至少一个不同取值的参数。In a possible implementation manner, the characteristic information of the third packet to be sent includes more types of parameters than the characteristic information of the attack packet; or, the characteristic information of the third packet to be sent The feature information of the attack packet includes at least one parameter with a different value.

第五方面,本申请实施例提供了一种装置,该装置以芯片的产品形态存在,该装置的结构中包括处理器和存储器,该存储器用于与处理器耦合,保存该装置必要的程序指令和数据,该处理器用于执行存储器中存储的程序指令,使得该装置执行上述方法中第一方面以及任意一个实现方式中的第一网络设备或者第二方面以及任意一个实现方式中的第二网络设备的功能。In a fifth aspect, an embodiment of the present application provides a device, the device exists in the form of a chip product, and the structure of the device includes a processor and a memory, and the memory is used for coupling with the processor and storing necessary program instructions of the device and data, the processor is used to execute the program instructions stored in the memory, so that the apparatus executes the first aspect of the above method and the first network device in any implementation manner or the second aspect and the second network in any implementation manner function of the device.

第六方面,本申请实施例提供了一种第一网络设备和第二网络设备,该第一网络设备和第二网络设备可以实现上述方法实施例中相应的功能,功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个上述功能相应的模块。In a sixth aspect, the embodiments of the present application provide a first network device and a second network device. The first network device and the second network device can implement the corresponding functions in the above method embodiments, and the functions can be implemented by hardware, or The corresponding software implementation can be performed by hardware. The hardware or software includes one or more modules corresponding to the above functions.

在一种可能的设计中,该第一网络设备或第二网络设备的结构中包括处理器和通信接口,该处理器被配置为支持该第一网络设备或第二网络设备执行上述方法中相应的功能。该通信接口用于支持该第一网络设备或第二网络设备与其他网元之间的通信。该第一网络设备或第二网络设备还可以包括存储器,该存储器用于与处理器耦合,其保存该第一网络设备或第二网络设备必要的程序指令和数据。In a possible design, the structure of the first network device or the second network device includes a processor and a communication interface, and the processor is configured to support the first network device or the second network device to perform the corresponding method in the above method. function. The communication interface is used to support communication between the first network device or the second network device and other network elements. The first network device or the second network device may also include a memory for coupling with the processor and storing necessary program instructions and data for the first network device or the second network device.

第七方面,本申请实施例提供一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行第一方面或第二方面提供的任意一种方法。In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, including instructions, which, when executed on a computer, cause the computer to execute any one of the methods provided in the first aspect or the second aspect.

第八方面,本申请实施例提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行第一方面或第二方面提供的任意一种方法。In an eighth aspect, an embodiment of the present application provides a computer program product containing instructions, which, when executed on a computer, causes the computer to execute any one of the methods provided in the first aspect or the second aspect.

第九方面,提供了一种用于网络管理的系统,该系统包括第三方面提供的第一网络设备和第四方面提供的第二网络设备。其中:In a ninth aspect, a system for network management is provided, the system including the first network device provided in the third aspect and the second network device provided in the fourth aspect. in:

第一网络设备用于:确定第一网络设备的第一通信通道处于被攻击状态,发送第一报文;其中,第一报文包括第一TLV,第一TLV包括攻击报文的特征信息;The first network device is used to: determine that the first communication channel of the first network device is in an attacked state, and send a first packet; wherein the first packet includes a first TLV, and the first TLV includes feature information of the attack packet;

第二网络设备用于:接收第一报文;The second network device is used for: receiving the first message;

第二网络设备还用于:发送第二报文;其中,第二报文包括第二TLV,第二TLV包括第二网络设备待发送的第三报文的特征信息;The second network device is further configured to: send a second packet; wherein the second packet includes a second TLV, and the second TLV includes feature information of a third packet to be sent by the second network device;

第一网络设备还用于:从第二网络设备接收第二报文;The first network device is further configured to: receive the second packet from the second network device;

第一网络设备还用于:根据第三报文的特征信息生成第二通信通道,第二通信通道与第一通信通道不同;The first network device is further configured to: generate a second communication channel according to the feature information of the third packet, where the second communication channel is different from the first communication channel;

第二网络设备还用于:基于第三报文的特征信息向第一网络设备发送第三报文;The second network device is further configured to: send a third packet to the first network device based on the feature information of the third packet;

第一网络设备还用于:通过第二通信通道接收第三报文。The first network device is further configured to: receive the third packet through the second communication channel.

附图说明Description of drawings

图1为现有技术中的一种IGP域的示意图;1 is a schematic diagram of an IGP domain in the prior art;

图2为现有技术中的一种上送通道的示意图;Fig. 2 is the schematic diagram of a kind of upstream channel in the prior art;

图3为现有技术中的又一种上送通道的示意图;Fig. 3 is a schematic diagram of another upstream channel in the prior art;

图4为本申请实施例提供的一种适用于网络管理方法的系统架构示意图;4 is a schematic diagram of a system architecture applicable to a network management method provided by an embodiment of the present application;

图5为本申请实施例提供的一种适用于网络管理方法的信号交互示意图;FIG. 5 is a schematic diagram of signal interaction applicable to a network management method according to an embodiment of the present application;

图6为本申请实施例提供的一种第一网络设备的结构示意图;FIG. 6 is a schematic structural diagram of a first network device according to an embodiment of the present application;

图7为本申请实施例提供的又一种第一网络设备的结构示意图;FIG. 7 is a schematic structural diagram of still another first network device provided by an embodiment of the present application;

图8为本申请实施例提供的一种第二网络设备的结构示意图;FIG. 8 is a schematic structural diagram of a second network device according to an embodiment of the present application;

图9为本申请实施例提供的又一种第二网络设备的结构示意图;FIG. 9 is a schematic structural diagram of still another second network device provided by an embodiment of the present application;

图10为本申请实施例提供的一种适用于网络管理系统示意图。FIG. 10 is a schematic diagram of a network management system according to an embodiment of the present application.

具体实施方式Detailed ways

为了下述各实施例的描述清楚简洁,首先给出相关概念或技术的简要介绍:In order to describe the following embodiments clearly and concisely, a brief introduction of related concepts or technologies is first given:

通信通道:网络设备可以包括硬件处理单元和软件处理单元。当网络设备接收到数据报文时,首先由硬件处理单元解析数据报文的报文头,确定是否需要发送给该网络设备的软件处理单元处理。若不需要,可以直接将该数据报文转发给其他网络设备,若需要,则通过硬件处理单元到软件处理单元之间的通信通道(也称为上送通道或传输通道,下文统称为通信通道)将数据报文发送到软件处理单元进行处理。需要说明的是,由于硬件处理单元的处理能力远远高于软件处理单元的处理能力,因此通信通道往往会进行一定的限速,避免软件处理单元来不及处理大量的数据报文导致网络设备瘫痪。Communication channel: A network device may include a hardware processing unit and a software processing unit. When the network device receives the data packet, the hardware processing unit first parses the packet header of the data packet to determine whether it needs to be sent to the software processing unit of the network device for processing. If not required, the data packet can be directly forwarded to other network devices. If necessary, the communication channel between the hardware processing unit and the software processing unit (also referred to as the upload channel or transmission channel, hereinafter collectively referred to as the communication channel ) sends the data message to the software processing unit for processing. It should be noted that since the processing capability of the hardware processing unit is much higher than that of the software processing unit, the communication channel is often limited in speed to prevent the software processing unit from being too late to process a large number of data packets and causing the network equipment to be paralyzed.

LSP报文:在中间系统到中间系统(intermediate system to intermediatesystem,ISIS)协议中,当一个网络设备(例如,路由器)初始化或当网络结构发生变化(例如链路状态发生变化)时,该网络设备可以发送LSP报文通知其他网络设备。LSP message: In the intermediate system to intermediate system (ISIS) protocol, when a network device (eg, router) initializes or when the network structure changes (eg, link state changes), the network device You can send LSP packets to notify other network devices.

LSA报文:在开放式最短路径优先(Open Shortest Path First,OSPF)协议中,当一个网络设备(例如,路由器)初始化或当网络结构发生变化(例如链路状态发生变化)时,该网络设备可以发送LSA报文以通知其他网络设备。LSA packet: In the Open Shortest Path First (OSPF) protocol, when a network device (for example, a router) is initialized or when the network structure changes (for example, a link state changes), the network device LSA packets can be sent to notify other network devices.

TLV:TLV包括T字段、L字段和V字段。其中,T字段表示报文类型,L字段表示报文长度、V字段往往用来存放报文的内容。LSP报文和LSP报文中可以携带TLV。TLV: TLV includes T field, L field and V field. Among them, the T field represents the message type, the L field represents the message length, and the V field is often used to store the content of the message. TLVs can be carried in LSP packets and LSP packets.

LDP:通过建立LDP会话和发送LDP信息来进行标签的分配控制和保持,该协议可以使用传输控制协议(Transmission Control Protocol,TCP)和用户数据报文协议(userdatagram protocol,UDP)进行承载。LDP: Control and maintain label allocation by establishing LDP sessions and sending LDP information. This protocol can be carried by Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

PIM:表示可以利用静态路由或者任意单播路由协议(例如,OSPF协议或ISIS协议等)所生成的单播路由表为IP组播提供路由。组播路由与所采用的单播路由协议无关,只要能够通过单播路由协议产生相应的组播路由表项即可。PIM: Indicates that a static route or a unicast routing table generated by any unicast routing protocol (eg, OSPF protocol or ISIS protocol, etc.) can be used to provide routes for IP multicast. Multicast routing has nothing to do with the unicast routing protocol used, as long as the corresponding multicast routing table entry can be generated through the unicast routing protocol.

本申请实施例提供一种网络管理方法,应用于自治系统(autonomous system,AS)的网络管理过程中。在该自治系统中可以采用IGP(包括ISIS协议和OSPF协议)、LDP、PIM和BGP等。The embodiment of the present application provides a network management method, which is applied in the network management process of an autonomous system (autonomous system, AS). In this autonomous system, IGP (including ISIS protocol and OSPF protocol), LDP, PIM and BGP can be used.

如图4所示,为本申请实施例提供的一种适用于网络管理方法的系统架构示意图,包括第一网络设备、第二网络设备和攻击服务器。第一网络设备和第二网络设备可以通过IGP协议进行通信。攻击服务器可能采用攻击报文(例如,LDP报文、PIM报文或BGP报文、)攻击第一网络设备的通信通道。As shown in FIG. 4 , a schematic diagram of a system architecture applicable to a network management method provided by an embodiment of the present application includes a first network device, a second network device, and an attack server. The first network device and the second network device may communicate through the IGP protocol. The attack server may attack the communication channel of the first network device by using an attack packet (for example, an LDP packet, a PIM packet, or a BGP packet).

下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请的描述中,除非另有说明,“至少一个”是指一个或多个,“多个”是指两个或多于两个。另外,为了便于清楚描述本申请实施例的技术方案,在本申请的实施例中,采用了“第一”、“第二”等字样对功能和作用基本相同的相同项或相似项进行区分。本领域技术人员可以理解“第一”、“第二”等字样并不对数量和执行次序进行限定,并且“第一”、“第二”等字样也并不限定一定不同。The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application. Wherein, in the description of the present application, unless otherwise specified, "at least one" refers to one or more, and "a plurality" refers to two or more than two. In addition, in order to clearly describe the technical solutions of the embodiments of the present application, in the embodiments of the present application, words such as "first" and "second" are used to distinguish the same or similar items with basically the same function and effect. Those skilled in the art can understand that the words "first", "second" and the like do not limit the quantity and execution order, and the words "first", "second" and the like are not necessarily different.

为了便于理解,以下结合附图对本申请实施例提供的网络管理方法进行具体介绍。For ease of understanding, the network management method provided by the embodiments of the present application will be specifically introduced below with reference to the accompanying drawings.

如图5所示,本申请实施例提供一种网络管理方法,包括:As shown in FIG. 5 , an embodiment of the present application provides a network management method, including:

501、第一网络设备确定第一网络设备的第一通信通道处于被攻击状态。501. The first network device determines that the first communication channel of the first network device is in an attacked state.

当第一网络设备确定第一通信通道无法正常处理业务(收发报文),第一网络设备确定第一通信通道处于被攻击状态。When the first network device determines that the first communication channel cannot normally process services (receive and receive packets), the first network device determines that the first communication channel is in an attacked state.

在一种可能的设计中,当第一网络设备确定第一通信通道的错误报文的数量达到第一阈值或者错误报文的速率达到第二阈值时,第一网络设备确定第一通信通道处于被攻击状态。其中,错误报文满足以下情况中的至少一种:报文的密码错误,简单网络管理协议(Simple Network Management Protocol,SNMP)中的community字段错误,UDP校验错误或缺少必要报文头。In a possible design, when the first network device determines that the number of error packets of the first communication channel reaches the first threshold or the rate of error packets reaches the second threshold, the first network device determines that the first communication channel is in attacked state. The error message satisfies at least one of the following conditions: the password of the message is incorrect, the community field in the Simple Network Management Protocol (SNMP) is incorrect, the UDP checksum is incorrect, or a necessary header is missing.

在一种可能的设计中,当第一网络设备确定第一通信通道的第一特征的报文的数量达到第三阈值或者第一特征的报文的速率达到第二阈值时,第一网络设备确定第一通信通道处于被攻击状态。其中,第一特征的报文可以是具有相同源IP地址的报文,或者具有相同源端口的报文,或者具有相同协议号的报文等等。In a possible design, when the first network device determines that the number of packets of the first characteristic of the first communication channel reaches a third threshold or the rate of packets of the first characteristic reaches a second threshold, the first network device It is determined that the first communication channel is under attack. The packets of the first feature may be packets with the same source IP address, or packets with the same source port, or packets with the same protocol number, and so on.

在一种可能的设计中,当第一网络设备确定第一通信通道处于拥塞状态时(检测到第一通信通道的全部报文的数量或速率达到第五阈值),或者,当第一网络设备确定第一通信通道的拥塞持续时间达到第六阈值时,第一网络设备确定第一通信通道处于被攻击状态。In a possible design, when the first network device determines that the first communication channel is in a congested state (detects that the number or rate of all packets of the first communication channel reaches a fifth threshold), or, when the first network device When it is determined that the congestion duration of the first communication channel reaches the sixth threshold, the first network device determines that the first communication channel is in an attacked state.

其中,第一阈值到第六阈值可以是第一网络设备预先设置的,并且可以根据业务的变化进行相应的调整。Wherein, the first threshold to the sixth threshold may be preset by the first network device, and may be adjusted accordingly according to service changes.

502、第一网络设备发送第一报文。502. The first network device sends a first packet.

在本申请实施例中,第一网络设备发送第一报文也可以为第一网络设备泛洪第一报文。或者,第一报文可以为第一泛洪报文。In this embodiment of the present application, sending the first packet by the first network device may also flood the first packet for the first network device. Alternatively, the first packet may be the first flooding packet.

其中,第一报文可以为LSP报文或LSA报文。第一报文包括第一TLV,第一TLV包括攻击报文的特征信息。第一网络设备可以通过发送第一报文将第一网络设备的受攻击状态通告给IGP域内的其他网络设备。在一种可能的设计中,第一TLV可以包括第一通信通道的特征信息,第一通信通道的特征信息包括攻击报文的特征信息。可选的,第一通信通道的特征信息还可以包括第一通信通道的带宽要求或优先级要求中的至少一个。根据第一通信通道的带宽要求或优先级要求可以获取被攻击的第一通信通道更细粒度的特征。The first packet may be an LSP packet or an LSA packet. The first packet includes a first TLV, and the first TLV includes feature information of the attack packet. The first network device may notify other network devices in the IGP domain of the attacked state of the first network device by sending the first packet. In a possible design, the first TLV may include characteristic information of the first communication channel, and the characteristic information of the first communication channel includes characteristic information of the attack packet. Optionally, the characteristic information of the first communication channel may further include at least one of a bandwidth requirement or a priority requirement of the first communication channel. More fine-grained characteristics of the attacked first communication channel may be acquired according to bandwidth requirements or priority requirements of the first communication channel.

其中,攻击报文的特征信息包括攻击报文的以下至少一种参数:以太类型、协议类型、源端口、目的端口、源IP地址、目的IP地址、源MAC地址、目的MAC地址、TTL、报文长度或优先级要求。可选的,每个参数可以用具体的字段来表示。例如,攻击报文的报文长度(参数)可以用IP头的total length字段表示。或者,每个参数可以用位置特征(例如,采用偏移,长度和值)来表示。例如,攻击报文的报文长度(参数)可以用偏移为4,长度为1,值为84的位置特征来表示。The characteristic information of the attack packet includes at least one of the following parameters of the attack packet: Ethernet type, protocol type, source port, destination port, source IP address, destination IP address, source MAC address, destination MAC address, TTL, text length or priority requirements. Optionally, each parameter can be represented by a specific field. For example, the packet length (parameter) of the attack packet can be represented by the total length field of the IP header. Alternatively, each parameter can be represented by positional features (eg, using offset, length, and value). For example, the packet length (parameter) of an attack packet can be represented by a position feature with an offset of 4, a length of 1, and a value of 84.

示例性的,第一TLV的格式如表1所示:Exemplarily, the format of the first TLV is shown in Table 1:

表1Table 1

Type(1字节)Type (1 byte) Length(1字节)Length (1 byte) ValueValue 攻击报文的特征信息Feature information of attack packets SUB_TLV的长度Length of SUB_TLV SUB_TLVSUB_TLV

也就是说,第一TLV中的Type表示第二报文用于描述攻击报文的特征信息的参数,Value为SUB_TLV,Length根据Value的长度填充(即Length为SUB_TLV的长度)。That is to say, Type in the first TLV indicates a parameter used in the second packet to describe the feature information of the attack packet, Value is SUB_TLV, and Length is filled according to the length of Value (that is, Length is the length of SUB_TLV).

其中,SUB_TLV包括具体的攻击报文的特征信息,例如参数的值。假设攻击报文是LDP报文,则SUB_TLV的格式可以如表2所示:The SUB_TLV includes specific feature information of the attack packet, such as parameter values. Assuming that the attack packet is an LDP packet, the format of SUB_TLV can be shown in Table 2:

表2Table 2

Type(1字节)Type (1 byte) Length(1字节)Length (1 byte) ValueValue 以太类型(ETH_TYPE)Ether type (ETH_TYPE) 11 0x08000x0800 协议类型(PROTO)Protocol type (PROTO) 11 1717 源端口(S_PORT)Source port (S_PORT) 11 646646 目的端口(D_PORT)Destination Port (D_PORT) 11 646646 ...... ...... ......

其中,SUB_TLV包括的参数及其相应的取值是根据攻击报文的类型确定的。The parameters included in the SUB_TLV and their corresponding values are determined according to the type of the attack packet.

示例性的,假设第一网络设备的第一通信通道受到LDP报文攻击,SUB_TLV中的Type可以包括以太类型(ETH_TYPE)、协议类型(PROTO)、源端口(S_PORT)和目的端口(D_PORT)等等。其中,ETH_TYPE的值可以为0x0800(0x0800代表以太类型为互联网协议的第四版(internet protocol version 4,IPV4))。PROTO的值可以为17(17代表协议类型为UDP)。S_PORT和D_PORT的值可以为646(协议规定LDP的HELLO报文的S_PORT和D_PORT的值为646)。Exemplarily, assuming that the first communication channel of the first network device is attacked by an LDP packet, the Type in the SUB_TLV may include an ether type (ETH_TYPE), a protocol type (PROTO), a source port (S_PORT), a destination port (D_PORT), etc. Wait. The value of ETH_TYPE may be 0x0800 (0x0800 represents that the Ethernet type is the fourth version of the Internet protocol (internet protocol version 4, IPV4)). The value of PROTO can be 17 (17 means the protocol type is UDP). The value of S_PORT and D_PORT can be 646 (the protocol specifies that the value of S_PORT and D_PORT of the HELLO packet of LDP is 646).

再例如,假设第一网络设备受到BGP SYN报文攻击,SUB_TLV可以包括PROTO和DPORT。PROTO的值可以为6(6代表协议类型为TCP),D_PORT的值可以为179(协议规定BGPSYN报文对应的D_PORT为179)。For another example, assuming that the first network device is attacked by a BGP SYN packet, the SUB_TLV may include PROTO and DPORT. The value of PROTO can be 6 (6 represents that the protocol type is TCP), and the value of D_PORT can be 179 (the protocol specifies that the D_PORT corresponding to the BGPSYN message is 179).

再例如,假设第一网络设备受到PIM报文攻击,SUB_TLV可以包括PROTO。PROTO的值可以为103(103代表协议类型为PIM)。For another example, assuming that the first network device is attacked by a PIM packet, the SUB_TLV may include PROTO. The value of PROTO can be 103 (103 means the protocol type is PIM).

503、第二网络设备接收第一报文。503. The second network device receives the first packet.

在本申请实施例中,第二网络设备接收第一报文可以是第二网络设备接收第一网络设备发送的第一泛洪报文,或者可以是第二网络设备接收第一网络设备泛洪的第一报文。In this embodiment of the present application, the second network device receiving the first packet may be the second network device receiving the first flooding packet sent by the first network device, or the second network device receiving the first network device flooding 's first message.

第二网络设备可以根据第一报文确定第一网络设备的第一通信通道处于被攻击状态。第二网络设备可以根据第一报文中的Type字段获知第一报文是一个用于描述攻击报文的特征信息的报文,可以根据第一报文中的Value字段获知具体的攻击报文的特征信息。第二网络设备可以根据攻击报文的特征信息确定攻击报文所攻击的通信通道为第一通信通道,即确定第一网络设备的第一通信通道处于被攻击状态。The second network device may determine, according to the first message, that the first communication channel of the first network device is in an attacked state. The second network device can learn that the first packet is a packet used to describe the characteristic information of the attack packet according to the Type field in the first packet, and can learn the specific attack packet according to the Value field in the first packet characteristic information. The second network device may determine, according to the characteristic information of the attack packet, that the communication channel attacked by the attack packet is the first communication channel, that is, determine that the first communication channel of the first network device is in an attacked state.

504、第二网络设备发送第二报文。504. The second network device sends a second packet.

当第二网络设备需要向第一网络设备发送(合法的)第三报文(例如,路由协议报文)时,为了避免第三报文进入被攻击的第一通信通道,导致第一网络设备无法接收到第三报文,第二网络设备可以发送第二报文,以便第一网络设备可以根据第二报文中携带的第三报文的特征信息生成独立于第一通信通道(即被攻击报文攻击的通信通道)的第二通信通道。在本申请实施例中,第二网络设备发送第二报文也可以为第二网络设备泛洪第二报文。或者,第二报文可以为第二泛洪报文。When the second network device needs to send a (legitimate) third packet (for example, a routing protocol packet) to the first network device, in order to prevent the third packet from entering the attacked first communication channel, the first network device Unable to receive the third packet, the second network device can send the second packet, so that the first network device can generate a communication channel independent of the first communication channel (that is, be The second communication channel of the communication channel attacked by the attack packet). In this embodiment of the present application, sending the second packet by the second network device may also flood the second packet for the second network device. Alternatively, the second packet may be a second flooding packet.

其中,第二报文可以为LSP报文或LSA报文。第二报文包括第二TLV,第二TLV包括第二网络设备待发送的第三报文的特征信息。在一种可能的设计中,第二TLV包括第二通信通道的特征信息,第二通信通道的特征信息包括第二网络设备待发送的第三报文的特征信息。The second packet may be an LSP packet or an LSA packet. The second packet includes the second TLV, and the second TLV includes feature information of the third packet to be sent by the second network device. In a possible design, the second TLV includes characteristic information of the second communication channel, and the characteristic information of the second communication channel includes characteristic information of the third packet to be sent by the second network device.

可选的,第二通信通道的特征信息还可以包括第二通信通道的带宽要求或优先级要求中的至少一个。这样一来,若待发送的第三报文的速率要求较高,可以将第二通信通道的带宽要求设置得较大,以便终端设备根据第二通信通道的带宽要求建立一个较大带宽的第二通信通道,从而满足第三报文的速率要求。若待发送的第三报文的优先级要求较高,可以将第二通信通道的优先级设置得较高,以便终端设备建立第二通信通道后,优先处理该第二通信通道中的第三报文。Optionally, the characteristic information of the second communication channel may further include at least one of a bandwidth requirement or a priority requirement of the second communication channel. In this way, if the rate requirement of the third packet to be sent is relatively high, the bandwidth requirement of the second communication channel can be set to be larger, so that the terminal device can establish a larger bandwidth third packet according to the bandwidth requirement of the second communication channel. Two communication channels, so as to meet the rate requirement of the third packet. If the priority of the third packet to be sent is higher, the priority of the second communication channel can be set higher, so that after the terminal device establishes the second communication channel, it preferentially processes the third packet in the second communication channel. message.

其中,第三报文的特征信息包括该第三报文的以下至少一种参数:以太类型、协议类型、源端口、目的端口、目的IP地址、源IP地址、目的MAC地址、源MAC地址、TTL、报文长度或优先级要求。可选的,每个参数可以用具体的字段来表示(例如,攻击报文的报文长度(参数)可以用IP头的total length字段表示);或者,每个参数可以用位置特征(例如,采用偏移,长度和值)来表示(例如,攻击报文的报文长度(参数)可以用偏移为4,长度为1,值为84的位置特征表示)。The feature information of the third packet includes at least one of the following parameters of the third packet: Ethernet type, protocol type, source port, destination port, destination IP address, source IP address, destination MAC address, source MAC address, TTL, packet length or priority requirements. Optionally, each parameter can be represented by a specific field (for example, the packet length (parameter) of the attack packet can be represented by the total length field of the IP header); or, each parameter can be represented by a location feature (for example, Use offset, length and value) to represent (for example, the packet length (parameter) of an attack packet can be represented by a position feature with an offset of 4, a length of 1, and a value of 84).

示例性的,第二TLV的格式如表3所示:Exemplarily, the format of the second TLV is shown in Table 3:

表3table 3

Type(1字节)Type (1 byte) Length(1字节)Length (1 byte) ValueValue 第三报文的特征信息Feature information of the third packet SUB_TLV的长度Length of SUB_TLV SUB_TLVSUB_TLV

也就是说,第二TLV中的Type表示第二报文用于描述第三报文的特征信息,Value为SUB_TLV,Length根据VALUE的长度填充(即Length为SUB_TLV的长度)。That is, Type in the second TLV indicates that the second packet is used to describe feature information of the third packet, Value is SUB_TLV, and Length is filled according to the length of VALUE (that is, Length is the length of SUB_TLV).

其中,SUB_TLV包括具体的第三报文的特征信息,假设第二网络设备待发送的第三报文是LDP报文,则SUB_TLV的格式可以如表4所示:The SUB_TLV includes specific feature information of the third packet. Assuming that the third packet to be sent by the second network device is an LDP packet, the format of the SUB_TLV may be as shown in Table 4:

表4Table 4

Type(1字节)Type (1 byte) Length(1字节)Length (1 byte) ValueValue 以太类型(ETH_TYPE)Ether type (ETH_TYPE) 11 0x08000x0800 目的IP地址(D_IP)Destination IP address (D_IP) 11 192.168.0.1192.168.0.1 源IP地址(S_IP)Source IP address (S_IP) 11 192.168.0.2192.168.0.2 协议类型(PROTO)Protocol type (PROTO) 11 1717 目的端口(D_PORT)Destination Port (D_PORT) 11 646646 源端口(S_PORT)Source port (S_PORT) 11 646646 带宽要求(PPS)Bandwidth Requirements (PPS) 11 1010 优先级要求(PRIORITY)PRIORITY 11 66 ...... ...... ......

其中,SUB_TLV包括的参数及其相应的取值是根据攻击报文的类型确定的。The parameters included in the SUB_TLV and their corresponding values are determined according to the type of the attack packet.

示例性的,假设第二网络设备待发送的第三报文是LDP报文,SUB_TLV可以包括S_IP、D_IP、PROTO、S_PORT、D_PORT、PPS和PRIORITY。其中,S_IP表示第三报文的源IP地址,即第二网络设备的IP地址。D_IP表示第三报文的目的IP地址,即第一网络设备的IP地址。PPS表示根据经验值设定的LDP会话交互报文速率。PRIORITY表示第三报文在对端的(即第一网络设备)上送通道所占的优先级。其他参数可以参考步骤502的相关描述,在此不做赘述。Exemplarily, assuming that the third packet to be sent by the second network device is an LDP packet, the SUB_TLV may include S_IP, D_IP, PROTO, S_PORT, D_PORT, PPS, and PRIORITY. Wherein, S_IP represents the source IP address of the third packet, that is, the IP address of the second network device. D_IP represents the destination IP address of the third packet, that is, the IP address of the first network device. PPS indicates the exchange rate of LDP sessions based on empirical values. PRIORITY indicates the priority occupied by the third packet on the transmission channel of the opposite end (ie, the first network device). For other parameters, reference may be made to the relevant description of step 502, which will not be repeated here.

再例如,假设第二网络设备待发送的第三报文是BGP SYN协议报文,SUB_TLV可以包括S_IP、D_IP、PROTO、D_PORT、PPS和PRIORITY等。其中,PROTO的值可以为6(6代表协议类型为TCP),D_PORT的值可以为179(协议规定BGP SYN报文对应的D_PORT为179)。S_IP、D_IP、PPS、PRIORITY等参数可以参考上文的相关描述。For another example, assuming that the third packet to be sent by the second network device is a BGP SYN protocol packet, the SUB_TLV may include S_IP, D_IP, PROTO, D_PORT, PPS, and PRIORITY. The value of PROTO may be 6 (6 represents that the protocol type is TCP), and the value of D_PORT may be 179 (the D_PORT corresponding to the BGP SYN message is 179 according to the protocol). For parameters such as S_IP, D_IP, PPS, and PRIORITY, please refer to the relevant description above.

在一种可能的实现方式中,待发送的第三报文的特征信息包括的参数的类型多于攻击报文的特征信息包括的参数的类型。其中,待发送的第三报文的特征信息和攻击报文的特征信息可以包括一个或多个相同的参数类型。例如,攻击报文的特征信息可以包括:协议号=PIM(103);第三报文的特征信息可以包括:协议号=PIM(103),目的IP地址=第一网络设备的IP地址,源IP地址=第二网络设备的IP地址,报文长度=100。待发送的第三报文的特征信息包括的参数类型还可以比攻击报文的特征信息包括参数类型多。In a possible implementation manner, the characteristic information of the third packet to be sent includes more types of parameters than the characteristic information of the attack packet includes. The characteristic information of the third packet to be sent and the characteristic information of the attack packet may include one or more of the same parameter type. For example, the characteristic information of the attack packet may include: protocol number=PIM (103); the characteristic information of the third packet may include: protocol number=PIM (103), destination IP address=IP address of the first network device, source IP address=IP address of the second network device, and packet length=100. The characteristic information of the third packet to be sent may also include more parameter types than the characteristic information of the attack packet.

这样一来,待发送的第三报文的特征信息包括更多的参数类型,能够对该第三报文的特征信息进行更细粒度的限制,以便第一网络设备能优先处理第三报文。In this way, the characteristic information of the third packet to be sent includes more parameter types, and the characteristic information of the third packet can be restricted more finely, so that the first network device can preferentially process the third packet .

在一种可能的实现方式中,待发送的第三报文的特征信息与攻击报文的特征信息包括至少一个不同取值的参数。举例来说,待发送的第三报文的特征信息和攻击报文的特征信息可以包括N个相同的参数类型,其中,N个参数类型中的M个参数类型的取值不同。N为大于或等于1的整数,M为小于或等于N的整数。例如,假设N=2,M=1,攻击报文的特征信息可以包括:协议号=PIM(103),源IP地址=1.0.0.0/8;第三报文的特征信息可以包括:协议号=PIM(103),源IP地址=第二网络设备的源IP地址(2.0.0.1/32)。In a possible implementation manner, the feature information of the third packet to be sent and the feature information of the attack packet include at least one parameter with different values. For example, the feature information of the third packet to be sent and the feature information of the attack packet may include N identical parameter types, wherein M parameter types of the N parameter types have different values. N is an integer greater than or equal to 1, and M is an integer less than or equal to N. For example, assuming N=2, M=1, the characteristic information of the attack packet may include: protocol number=PIM(103), source IP address=1.0.0.0/8; the characteristic information of the third packet may include: protocol number =PIM (103), source IP address = source IP address of the second network device (2.0.0.1/32).

这样一来,当第三报文的特征信息包括的参数类型和攻击报文的特征信息包括的参数类型相同时,可以通过不同的参数的取值区分第三报文和攻击报文,从而第一网络设备能优先处理第三报文。In this way, when the parameter type included in the characteristic information of the third packet is the same as the parameter type included in the characteristic information of the attack packet, the third packet and the attack packet can be distinguished by different parameter values, so that the third packet and the attack packet can be distinguished. A network device can preferentially process the third packet.

505、第一网络设备接收第二报文。505. The first network device receives the second packet.

在本申请实施例中,第一网络设备接收第二报文可以是第一网络设备接收第二网络设备发送的第二泛洪报文,或者可以是第一网络设备接收第二网络设备泛洪的第二报文。In this embodiment of the present application, the first network device receiving the second packet may be the first network device receiving the second flooding packet sent by the second network device, or the first network device receiving the second network device flooding the second message.

506、第一网络设备根据第三报文的特征信息生成第二通信通道,第二通信通道与第一通信通道不同。506. The first network device generates a second communication channel according to the feature information of the third packet, where the second communication channel is different from the first communication channel.

第一网络设备可以根据第三报文的特征信息生成独立于第一通信通道(即被攻击报文攻击的通信通道)的第二通信通道,第二通信通道不会受到攻击报文的影响。The first network device may generate a second communication channel independent of the first communication channel (ie, the communication channel attacked by the attack packet) according to the feature information of the third packet, and the second communication channel will not be affected by the attack packet.

可以理解的是,第二通道可以是一种白名单通道。第一网络设备和第二网络设备通过第二报文完成了协商过程,从而生成了该白名单通道。It can be understood that the second channel may be a whitelist channel. The first network device and the second network device complete the negotiation process through the second packet, thereby generating the whitelist channel.

507、第二网络设备基于第三报文的特征信息向第一网络设备发送第三报文。507. The second network device sends a third packet to the first network device based on the feature information of the third packet.

第三报文可以是适用于自治系统各种协议报文。例如,第三报文可以是LDP报文、PIM报文或BGP报文。The third packet may be various protocol packets applicable to the autonomous system. For example, the third packet may be an LDP packet, a PIM packet or a BGP packet.

508、第一网络设备通过第二通信通道接收第三报文。508. The first network device receives the third packet through the second communication channel.

由于第二通信通道独立于第一通信通道,不受攻击报文的影响,因此第一网络设备可以正常接收第二网络设备发送的第三报文,并对第三报文进行相应的处理。Since the second communication channel is independent of the first communication channel and is not affected by the attack packet, the first network device can normally receive the third packet sent by the second network device, and perform corresponding processing on the third packet.

需要说明的是,步骤501-步骤508之间没有必然的执行先后顺序,本实施例对各步骤之间的执行先后顺序不作具体限定。It should be noted that, there is no necessary execution sequence between steps 501 to 508, and this embodiment does not specifically limit the execution sequence of each step.

本申请实施例中,当第一网络设备确定第一网络设备的第一通信通道处于被攻击状态,第一网络设备可以通过发送第一报文将第一网络设备的受攻击状态通告给IGP域内的其他网络设备。若第二网络设备需要向第一网络设备发送(合法的)第三报文,第二网络设备可以通过发送第二报文将第二网络设备待发送的第三报文的特征信息通告给第一网络设备。以便第一网络设备根据第三报文的特征信息生成独立于第一通信通道的第二通信通道。由于第二通信通道独立于第一通信通道,不受攻击报文的影响,因此第一网络设备可以通过第二通信通道接收第三报文。从而解决了网络设备(例如,第一网络设备)被攻击时,无法接收其他网络设备(例如,第二网络设备)发送的合法报文(第三报文)的问题。In this embodiment of the present application, when the first network device determines that the first communication channel of the first network device is in an attacked state, the first network device may notify the IGP domain of the attacked state of the first network device by sending a first packet other network devices. If the second network device needs to send a (legal) third packet to the first network device, the second network device may notify the first network device of the feature information of the third packet to be sent by the second network device by sending the second packet a network device. So that the first network device generates a second communication channel independent of the first communication channel according to the feature information of the third packet. Since the second communication channel is independent of the first communication channel and is not affected by the attack packet, the first network device can receive the third packet through the second communication channel. This solves the problem that when a network device (eg, the first network device) is attacked, it cannot receive legal packets (third packets) sent by other network devices (eg, the second network device).

上述主要从第一网络设备和第二网络设备的角度对本申请实施例提供的方案进行了介绍。可以理解的是,第一网络设备和第二网络设备为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。The foregoing mainly introduces the solutions provided by the embodiments of the present application from the perspectives of the first network device and the second network device. It can be understood that, in order to implement the above-mentioned functions, the first network device and the second network device include corresponding hardware structures and/or software modules for performing each function. Those skilled in the art should easily realize that the algorithm steps described in conjunction with the embodiments disclosed herein can be implemented in hardware or in the form of a combination of hardware and computer software. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application.

本申请实施例可以根据上述方法示例对第一网络设备和第二网络设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。In this embodiment of the present application, the first network device and the second network device may be divided into functional modules according to the foregoing method examples. For example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one in the processing module. The above-mentioned integrated modules can be implemented in the form of hardware, and can also be implemented in the form of software function modules. It should be noted that, the division of modules in the embodiments of the present application is schematic, and is only a logical function division, and there may be other division manners in actual implementation.

在采用对应各个功能划分各个功能模块的情况下,图6示出了上述实施例中所涉及的第一网络设备6的一种可能的结构示意图,第一网络设备包括:确定单元601、发送单元602、接收单元603和处理单元604。在本申请实施例中,确定单元601可以用于确定第一网络设备的第一通信通道(是否)处于被攻击状态。发送单元602用于发送第一报文;其中,第一报文包括第一TLV,第一TLV包括攻击报文的特征信息。接收单元603可以用于从第二网络设备接收第二报文;其中,第二报文包括第二TLV,第二TLV包括第二网络设备待发送的第三报文的特征信息。处理单元604可以用于根据第三报文的特征信息生成第二通信通道,第二通信通道与第一通信通道不同,第一网络设备通过第二通信通道接收第三报文。In the case where each functional module is divided according to each function, FIG. 6 shows a possible schematic structural diagram of the first network device 6 involved in the above-mentioned embodiment. The first network device includes: a determining unit 601 and a sending unit 602 , a receiving unit 603 and a processing unit 604 . In this embodiment of the present application, the determining unit 601 may be configured to determine (whether) the first communication channel of the first network device is in an attacked state. The sending unit 602 is configured to send a first packet, wherein the first packet includes a first TLV, and the first TLV includes feature information of the attack packet. The receiving unit 603 may be configured to receive a second packet from the second network device, wherein the second packet includes a second TLV, and the second TLV includes feature information of a third packet to be sent by the second network device. The processing unit 604 may be configured to generate a second communication channel according to feature information of the third packet, where the second communication channel is different from the first communication channel, and the first network device receives the third packet through the second communication channel.

图6中的第一网络设备可以是图4和图5中的第一网络设备,并且可以实现图5中第一网络设备的功能。其中,确定单元601可以用于支持第一网络设备执行图5中的过程501。发送单元602用于支持第一网络设备执行图5中过程502。接收单元603可以用于支持第一网络设备执行图5中的过程505和508。处理单元604可以用于支持第一网络设备执行图5中的过程506。The first network device in FIG. 6 may be the first network device in FIG. 4 and FIG. 5 , and may implement the functions of the first network device in FIG. 5 . The determining unit 601 may be configured to support the first network device to perform the process 501 in FIG. 5 . The sending unit 602 is configured to support the first network device to perform the process 502 in FIG. 5 . The receiving unit 603 may be configured to support the first network device to perform the processes 505 and 508 in FIG. 5 . The processing unit 604 may be configured to support the first network device to perform the process 506 in FIG. 5 .

参阅图7所示,本申请实施例提供了一种第一网络设备700。Referring to FIG. 7 , an embodiment of the present application provides a first network device 700 .

该第一网络设备700包括:处理器702、收发器703、存储器701以及总线704。其中,处理器702、收发器703以及存储器701通过总线704相互连接。The first network device 700 includes: a processor 702 , a transceiver 703 , a memory 701 and a bus 704 . The processor 702 , the transceiver 703 and the memory 701 are connected to each other through a bus 704 .

其中,处理器702可以是一个中央处理单元(central processing unit,CPU),微处理单元,通用处理单元,数字信号处理单元(digital signal processor,DSP),专用集成电路(application-specific integrated circuit,ASIC),现场可编程门阵列(fieldprogrammable gate array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。Wherein, the processor 702 may be a central processing unit (central processing unit, CPU), micro processing unit, general processing unit, digital signal processing unit (digital signal processor, DSP), application-specific integrated circuit (application-specific integrated circuit, ASIC) ), field programmable gate array (FPGA), or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof.

存储器701可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(electricallyerasable programmable read-only memory,EEPROM)、只读光盘(compact disc read-only memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。Memory 701 may be read-only memory (ROM) or other types of static storage devices that can store static information and instructions, random access memory (RAM), or other types of information and instructions It can also be an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM), or other optical disk storage, optical disk storage ( including compact discs, laser discs, compact discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of being stored by a computer any other medium taken, but not limited to this.

收发器703可以是收发电路或通信接口等。The transceiver 703 may be a transceiver circuit or a communication interface or the like.

总线704可以是外设部件互连标准(peripheral component interconnect,PCI)总线或扩展工业标准结构(extended industry standard architecture,EISA)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图7中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The bus 704 may be a peripheral component interconnect (PCI) bus, an extended industry standard architecture (EISA) bus, or the like. The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in FIG. 7, but it does not mean that there is only one bus or one type of bus.

该第一网络设备700可以实现图5所示的实施例中的第一网络设备的功能。处理器702和收发器703可以执行上述方法示例中第一网络设备的相应功能。收发器703用于支持第一网络设备700执行图5中的过程502、505和508。处理器702用于支持第一网络设备700执行图5中的过程501和506,和/或本文所描述的技术中第一网络设备执行的其它过程。存储器701,用于存储第一网络设备700的程序代码和数据。具体执行过程请参考上述图5所示实施例中相应步骤的详细描述,这里不再一一赘述。The first network device 700 may implement the functions of the first network device in the embodiment shown in FIG. 5 . The processor 702 and the transceiver 703 may perform corresponding functions of the first network device in the above method examples. The transceiver 703 is used to support the first network device 700 to perform the processes 502, 505 and 508 in FIG. 5 . Processor 702 is configured to support first network device 700 to perform processes 501 and 506 in FIG. 5, and/or other processes performed by the first network device in the techniques described herein. The memory 701 is used for storing program codes and data of the first network device 700 . For the specific execution process, please refer to the detailed description of the corresponding steps in the above-mentioned embodiment shown in FIG. 5 , which will not be repeated here.

在采用对应各个功能划分各个功能模块的情况下,图8示出了上述实施例中所涉及的第二网络设备8的一种可能的结构示意图,第二网络设备包括:接收单元801和发送单元802。在本申请实施例中,接收单元801,用于接收第一报文;其中,第一报文包括第一TLV,第一TLV包括攻击报文的特征信息。发送单元802,用于发送第二报文;其中,第二报文包括第二TLV,第二TLV包括第二网络设备待发送的第三报文的特征信息。发送单元802,还用于基于第三报文的特征信息向第一网络设备发送第三报文。In the case where each functional module is divided according to each function, FIG. 8 shows a possible schematic structural diagram of the second network device 8 involved in the above embodiment. The second network device includes: a receiving unit 801 and a sending unit 802. In this embodiment of the present application, the receiving unit 801 is configured to receive a first packet, where the first packet includes a first TLV, and the first TLV includes feature information of the attack packet. A sending unit 802, configured to send a second packet, wherein the second packet includes a second TLV, and the second TLV includes feature information of a third packet to be sent by the second network device. The sending unit 802 is further configured to send a third packet to the first network device based on the feature information of the third packet.

图8中的第二网络设备可以是图4和图5中的第二网络设备,并且可以实现图5中第二网络设备的功能。其中,接收单元801可以用于支持第二网络设备执行图5中的过程503。发送单元802可以用于支持第二网络设备执行图5中过程504和507。The second network device in FIG. 8 may be the second network device in FIG. 4 and FIG. 5 , and may implement the functions of the second network device in FIG. 5 . The receiving unit 801 may be configured to support the second network device to perform the process 503 in FIG. 5 . The sending unit 802 may be configured to support the second network device to perform the processes 504 and 507 in FIG. 5 .

在一种可能的设计中,第二网络设备可以通过图9中的结构(装置或系统)来实现。In a possible design, the second network device may be implemented by the structure (apparatus or system) in FIG. 9 .

参阅图9所示,本申请实施例提供了一种第二网络设备900。该第二网络设备900包括:处理器902、收发器903、存储器901以及总线904。其中,处理器902、收发器903以及存储器901通过总线904相互连接。Referring to FIG. 9 , an embodiment of the present application provides a second network device 900 . The second network device 900 includes: a processor 902 , a transceiver 903 , a memory 901 and a bus 904 . The processor 902 , the transceiver 903 and the memory 901 are connected to each other through a bus 904 .

其中,处理器902可以是一个CPU,微处理单元,通用处理单元,DSP,ASIC,FPGA或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。The processor 902 may be a CPU, a micro-processing unit, a general-purpose processing unit, a DSP, an ASIC, an FPGA or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof.

存储器901可以是ROM)或可存储静态信息和指令的其他类型的静态存储设备,RAM或者可存储信息和指令的其他类型的动态存储设备,也可以是EEPROM、CD-ROM或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。The memory 901 can be ROM) or other types of static storage devices that can store static information and instructions, RAM or other types of dynamic storage devices that can store information and instructions, or EEPROM, CD-ROM or other optical disk storage, optical disks. storage (including compact discs, laser discs, compact discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or capable of carrying or storing desired program code in the form of instructions or data structures and capable of being accessed by Any other medium accessed by the computer, but not limited to this.

收发器903可以是收发电路或通信接口等。The transceiver 903 may be a transceiver circuit or a communication interface or the like.

总线904可以是PCI总线或EISA总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图9中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The bus 904 may be a PCI bus, an EISA bus, or the like. The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in FIG. 9, but it does not mean that there is only one bus or one type of bus.

该第二网络设备900可以实现图5所示的实施例中的第二网络设备的功能。处理器902和收发器903可以执行上述方法示例中第二网络设备的相应功能。收发器903用于支持第二网络设备900执行图5中的过程503、504和507。处理器902用于支持第二网络设备900执行本文所描述的技术中第二网络设备执行的其它过程。存储器901,用于存储第二网络设备900的程序代码和数据。具体执行过程请参考上述图5所示实施例中相应步骤的详细描述,这里不再一一赘述。The second network device 900 may implement the functions of the second network device in the embodiment shown in FIG. 5 . The processor 902 and the transceiver 903 may perform corresponding functions of the second network device in the above method examples. The transceiver 903 is used to support the second network device 900 to perform the processes 503, 504 and 507 in FIG. 5 . The processor 902 is used to support the second network device 900 to perform other processes performed by the second network device in the techniques described herein. The memory 901 is used for storing program codes and data of the second network device 900 . For the specific execution process, please refer to the detailed description of the corresponding steps in the above-mentioned embodiment shown in FIG. 5 , which will not be repeated here.

本申请实施例还提供了一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行上述网络管理方法。Embodiments of the present application further provide a computer-readable storage medium, including instructions, which, when executed on a computer, cause the computer to execute the foregoing network management method.

本申请实施例还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述网络管理方法。Embodiments of the present application also provide a computer program product containing instructions, which, when running on a computer, cause the computer to execute the above-mentioned network management method.

本申请实施例还提供了一种装置,该装置以芯片的产品形态存在,该装置包括处理器、存储器和收发组件,收发组件包括输入输出电路,存储器用于存储计算机执行指令,处理器通过执行存储器中存储的计算机执行指令实现上述网络管理方法。该情况下,执行本申请实施例提供的方法的执行主体可以为芯片。The embodiment of the present application also provides a device, the device exists in the form of a chip product, the device includes a processor, a memory and a transceiver component, the transceiver component includes an input and output circuit, the memory is used for storing computer execution instructions, and the processor executes The computer-executed instructions stored in the memory implement the network management method described above. In this case, the execution body for executing the method provided by the embodiment of the present application may be a chip.

参阅图10所示,本申请实施例提供了一种适用于网络管理方法的网络管理系统1000,该系统1000用于实现前述方法实施例中的网络管理方法。该系统1000包括第一网络设备1001和第二网络设备1002。Referring to FIG. 10 , an embodiment of the present application provides a network management system 1000 suitable for a network management method, and the system 1000 is used to implement the network management method in the foregoing method embodiments. The system 1000 includes a first network device 1001 and a second network device 1002 .

其中,第一网络设备1001和第二网络设备1002可以分别实现图5所示的实施例中的第一网络设备和第二网络设备的功能。例如,第一网络设备1001用于执行图5中的过程501、502、505、506和508,和/或用于本文所描述的技术中第一网络设备执行的其它过程。第二网络设备1002,用于执行图5中的过程503、504和507,和/或用于本文所描述的技术中第二网络设备执行的其它过程。The first network device 1001 and the second network device 1002 may respectively implement the functions of the first network device and the second network device in the embodiment shown in FIG. 5 . For example, first network device 1001 is used to perform processes 501, 502, 505, 506, and 508 in FIG. 5, and/or other processes performed by the first network device in the techniques described herein. A second network device 1002 for performing processes 503, 504, and 507 in FIG. 5, and/or for other processes performed by the second network device in the techniques described herein.

本领域技术人员应该可以意识到,在上述一个或多个示例中,本申请所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是通用或专用计算机能够存取的任何可用介质。Those skilled in the art should appreciate that, in one or more of the above examples, the functions described in this application may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage medium can be any available medium that can be accessed by a general purpose or special purpose computer.

以上所述的具体实施方式,对本申请的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本申请的具体实施方式而已,并不用于限定本申请的保护范围,凡在本申请的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本申请的保护范围之内。The specific embodiments described above further describe the purpose, technical solutions and beneficial effects of the present application in detail. It should be understood that the above descriptions are only specific embodiments of the present application, and are not intended to limit the The protection scope, any modifications, equivalent replacements, improvements, etc. made on the basis of the technical solutions of the present application shall be included within the protection scope of the present application.

本领域内的技术人员应明白,本申请实施例可提供为方法、系统、或计算机程序产品。因此,本申请实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art should understand that the embodiments of the present application may be provided as a method, a system, or a computer program product. Accordingly, the embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.

本申请实施例是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理单元以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理单元执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The embodiments of the present application are described with reference to flowcharts and/or block diagrams of methods, apparatuses (systems), and computer program products according to the embodiments of the present application. It will be understood that each flow and/or block in the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processing unit of the computer or other programmable data processing device produce Means for implementing the functions specified in a flow or flow of a flowchart and/or a block or blocks of a block diagram.

这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.

这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that The instructions provide steps for implementing the functions specified in the flow or blocks of the flowcharts and/or the block or blocks of the block diagrams.

显然,本领域的技术人员可以对本申请实施例进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请实施例的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the embodiments of the present application without departing from the spirit and scope of the present application. Thus, if these modifications and variations of the embodiments of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include these modifications and variations.

Claims (17)

1.一种网络管理方法,其特征在于,包括:1. a network management method, is characterized in that, comprises: 第一网络设备确定所述第一网络设备的第一通信通道处于被攻击状态;The first network device determines that the first communication channel of the first network device is in an attacked state; 所述第一网络设备发送第一报文,所述第一报文包括第一类型长度值TLV,所述第一TLV包括攻击报文的特征信息;The first network device sends a first packet, where the first packet includes a first type length value TLV, and the first TLV includes feature information of the attack packet; 所述第一网络设备从第二网络设备接收第二报文,所述第二报文包括第二TLV,所述第二TLV包括所述第二网络设备待发送的第三报文的特征信息,所述待发送的第三报文的特征信息与所述攻击报文的特征信息不同;The first network device receives a second packet from the second network device, the second packet includes a second TLV, and the second TLV includes feature information of a third packet to be sent by the second network device , the characteristic information of the third packet to be sent is different from the characteristic information of the attack packet; 所述第一网络设备根据所述第三报文的特征信息生成第二通信通道,所述第二通信通道与所述第一通信通道不同,所述第一网络设备通过所述第二通信通道接收所述第三报文。The first network device generates a second communication channel according to the feature information of the third packet, the second communication channel is different from the first communication channel, and the first network device passes the second communication channel receiving the third message. 2.根据权利要求1所述的网络管理方法,其特征在于,2. The network management method according to claim 1, wherein, 所述攻击报文的特征信息或所述待发送的第三报文的特征信息包括以下至少一种参数类型:The characteristic information of the attack packet or the characteristic information of the third packet to be sent includes at least one of the following parameter types: 以太类型、协议类型、源端口、目的端口、源网际协议IP地址、目的IP地址、源媒体接入控制MAC地址、目的MAC地址、生存时间TTL、报文长度或优先级要求;Ethernet type, protocol type, source port, destination port, source IP address, destination IP address, source media access control MAC address, destination MAC address, time-to-live TTL, packet length or priority requirements; 所述待发送的第三报文的特征信息与所述攻击报文的特征信息不同包括所述待发送的第三报文的特征信息包括的参数类型与所述攻击报文的特征信息包括的参数类型不同,或者所述待发送的第三报文的特征信息包括的参数取值与所述攻击报文的特征信息包括的参数取值不同。The characteristic information of the third packet to be sent is different from the characteristic information of the attack packet, including the parameter type included in the characteristic information of the third packet to be sent and the characteristic information of the attack packet. The parameter types are different, or the value of the parameter included in the feature information of the third packet to be sent is different from the value of the parameter included in the feature information of the attack packet. 3.根据权利要求2所述的网络管理方法,其特征在于,3. The network management method according to claim 2, wherein, 所述待发送的第三报文的特征信息包括的参数的类型多于所述攻击报文的特征信息包括的参数的类型;或者The characteristic information of the third packet to be sent includes more types of parameters than the characteristic information of the attack packet includes; or 所述待发送的第三报文的特征信息与所述攻击报文的特征信息包括至少一个不同取值的参数。The characteristic information of the third packet to be sent and the characteristic information of the attack packet include at least one parameter with different values. 4.根据权利要求1-3任一项所述的网络管理方法,其特征在于,所述第一网络设备确定所述第一网络设备的第一通信通道处于被攻击状态包括:4. The network management method according to any one of claims 1-3, wherein determining, by the first network device, that the first communication channel of the first network device is in an attacked state comprises: 当所述第一网络设备确定所述第一通信通道处于拥塞状态时,所述第一网络设备确定所述第一通信通道处于被攻击状态;或者When the first network device determines that the first communication channel is in a congested state, the first network device determines that the first communication channel is in an attacked state; or 当所述第一网络设备确定所述第一通信通道的错误报文的数量达到第一阈值或者所述错误报文的速率达到第二阈值时,所述第一网络设备确定所述第一通信通道处于被攻击状态;或者When the first network device determines that the number of error packets of the first communication channel reaches a first threshold or the rate of the error packets reaches a second threshold, the first network device determines that the first communication channel The channel is under attack; or 当所述第一网络设备确定所述第一通信通道的第一特征的报文的数量达到第三阈值或者所述第一特征的报文的速率达到第二阈值时,所述第一网络设备确定所述第一通信通道处于被攻击状态。When the first network device determines that the number of packets of the first characteristic of the first communication channel reaches a third threshold or that the rate of packets of the first characteristic reaches a second threshold, the first network device It is determined that the first communication channel is in an attacked state. 5.一种网络管理方法,其特征在于,包括:5. A network management method, characterized in that, comprising: 第二网络设备接收第一报文,所述第一报文包括第一类型长度值TLV,所述第一TLV包括攻击报文的特征信息;The second network device receives the first packet, the first packet includes a first type length value TLV, and the first TLV includes feature information of the attack packet; 所述第二网络设备发送第二报文,所述第二报文包括第二TLV,所述第二TLV包括所述第二网络设备待发送的第三报文的特征信息,所述第二TLV用于触发第一网络设备根据所述待发送的第三报文的特征信息生成第二通信通道,所述第二通信通道与处于被攻击状态的第一通信通道不同;所述待发送的第三报文的特征信息与所述攻击报文的特征信息不同;The second network device sends a second packet, the second packet includes a second TLV, the second TLV includes feature information of a third packet to be sent by the second network device, the second The TLV is used to trigger the first network device to generate a second communication channel according to the feature information of the third packet to be sent, where the second communication channel is different from the first communication channel in the attacked state; the to-be-sent The characteristic information of the third packet is different from the characteristic information of the attack packet; 所述第二网络设备基于所述第三报文的特征信息向第一网络设备发送所述第三报文。The second network device sends the third packet to the first network device based on the feature information of the third packet. 6.根据权利要求5所述的网络管理方法,其特征在于,6. The network management method according to claim 5, wherein, 所述攻击报文的特征信息或所述待发送的第三报文的特征信息包括以下至少一种参数类型:The characteristic information of the attack packet or the characteristic information of the third packet to be sent includes at least one of the following parameter types: 以太类型、协议类型、源端口、目的端口、源网际协议IP地址、目的IP地址、源媒体接入控制MAC地址、目的MAC地址、生存时间TTL、报文长度或优先级要求;所述待发送的第三报文的特征信息与所述攻击报文的特征信息不同包括所述待发送的第三报文的特征信息包括的参数类型与所述攻击报文的特征信息包括的参数类型不同,或者所述待发送的第三报文的特征信息包括的参数取值与所述攻击报文的特征信息包括的参数取值不同。Ethernet type, protocol type, source port, destination port, source IP address, destination IP address, source media access control MAC address, destination MAC address, time-to-live TTL, packet length or priority requirements; the to-be-sent The characteristic information of the third packet is different from the characteristic information of the attack packet, including that the parameter type included in the characteristic information of the third packet to be sent is different from the parameter type included in the characteristic information of the attack packet, Or the value of the parameter included in the feature information of the third packet to be sent is different from the value of the parameter included in the feature information of the attack packet. 7.根据权利要求6所述的网络管理方法,其特征在于,7. The network management method according to claim 6, wherein, 所述待发送的第三报文的特征信息包括的参数的类型多于所述攻击报文的特征信息包括的参数的类型;或者The characteristic information of the third packet to be sent includes more types of parameters than the characteristic information of the attack packet includes; or 所述待发送的第三报文的特征信息与所述攻击报文的特征信息包括至少一个不同取值的参数。The characteristic information of the third packet to be sent and the characteristic information of the attack packet include at least one parameter with different values. 8.一种第一网络设备,其特征在于,包括:8. A first network device, comprising: 确定单元,用于确定所述第一网络设备的第一通信通道处于被攻击状态;a determining unit, configured to determine that the first communication channel of the first network device is in an attacked state; 发送单元,用于发送第一报文,所述第一报文包括第一类型长度值TLV,所述第一TLV包括攻击报文的特征信息;a sending unit, configured to send a first packet, where the first packet includes a first type length value TLV, and the first TLV includes feature information of the attack packet; 接收单元,用于从第二网络设备接收第二报文,所述第二报文包括第二TLV,所述第二TLV包括所述第二网络设备待发送的第三报文的特征信息,所述待发送的第三报文的特征信息与所述攻击报文的特征信息不同;a receiving unit, configured to receive a second packet from a second network device, where the second packet includes a second TLV, and the second TLV includes feature information of a third packet to be sent by the second network device, The characteristic information of the third packet to be sent is different from the characteristic information of the attack packet; 处理单元,用于根据所述第三报文的特征信息生成第二通信通道,所述第二通信通道与所述第一通信通道不同,所述第一网络设备通过所述第二通信通道接收所述第三报文。a processing unit, configured to generate a second communication channel according to the characteristic information of the third packet, the second communication channel is different from the first communication channel, and the first network device receives the second communication channel through the second communication channel the third message. 9.根据权利要求8所述的第一网络设备,其特征在于,9. The first network device according to claim 8, wherein, 所述攻击报文的特征信息或所述待发送的第三报文的特征信息包括以下至少一种参数类型:The characteristic information of the attack packet or the characteristic information of the third packet to be sent includes at least one of the following parameter types: 以太类型、协议类型、源端口、目的端口、源网际协议IP地址、目的IP地址、源MAC地址、目的MAC地址、生存时间TTL、报文长度或优先级要求;所述待发送的第三报文的特征信息与所述攻击报文的特征信息不同包括所述待发送的第三报文的特征信息包括的参数类型与所述攻击报文的特征信息包括的参数类型不同,或者所述待发送的第三报文的特征信息包括的参数取值与所述攻击报文的特征信息包括的参数取值不同。Ether type, protocol type, source port, destination port, source Internet Protocol IP address, destination IP address, source MAC address, destination MAC address, time-to-live TTL, packet length or priority requirements; the third packet to be sent The characteristic information of the message is different from the characteristic information of the attack packet, including the parameter type included in the characteristic information of the third packet to be sent and the parameter type included in the characteristic information of the attack packet, or the parameter type included in the characteristic information of the third packet to be sent. The parameter values included in the characteristic information of the sent third packet are different from the parameter values included in the characteristic information of the attack packet. 10.根据权利要求9所述的第一网络设备,其特征在于,10. The first network device according to claim 9, wherein, 所述待发送的第三报文的特征信息包括的参数的类型多于所述攻击报文的特征信息包括的参数的类型;或者The characteristic information of the third packet to be sent includes more types of parameters than the characteristic information of the attack packet includes; or 所述待发送的第三报文的特征信息与所述攻击报文的特征信息包括至少一个不同取值的参数。The characteristic information of the third packet to be sent and the characteristic information of the attack packet include at least one parameter with different values. 11.根据权利要求8-10任一项所述的第一网络设备,其特征在于,所述确定单元用于:11. The first network device according to any one of claims 8-10, wherein the determining unit is configured to: 当确定所述第一通信通道处于拥塞状态时,确定所述第一通信通道处于被攻击状态;或者When it is determined that the first communication channel is in a congested state, determining that the first communication channel is in an attacked state; or 当确定所述第一通信通道的错误报文的数量达到第一阈值或者所述错误报文的速率达到第二阈值时,确定所述第一通信通道处于被攻击状态;或者When it is determined that the number of error packets of the first communication channel reaches a first threshold or the rate of the error packets reaches a second threshold, it is determined that the first communication channel is in an attacked state; or 当确定所述第一通信通道的第一特征的报文的数量达到第三阈值或者所述第一特征的报文的速率达到第二阈值时,确定所述第一通信通道处于被攻击状态。When it is determined that the number of packets of the first characteristic of the first communication channel reaches a third threshold or the rate of packets of the first characteristic reaches a second threshold, it is determined that the first communication channel is in an attacked state. 12.一种第二网络设备,其特征在于,包括:12. A second network device, comprising: 接收单元,用于接收第一报文,所述第一报文包括第一类型长度值TLV,所述第一TLV包括攻击报文的特征信息;a receiving unit, configured to receive a first packet, where the first packet includes a first type length value TLV, and the first TLV includes feature information of the attack packet; 发送单元,用于发送第二报文,所述第二报文包括第二TLV,所述第二TLV包括所述第二网络设备待发送的第三报文的特征信息,所述第二TLV用于触发第一网络设备根据所述待发送的第三报文的特征信息生成第二通信通道,所述第二通信通道与处于被攻击状态的第一通信通道不同;所述待发送的第三报文的特征信息与所述攻击报文的特征信息不同;a sending unit, configured to send a second packet, where the second packet includes a second TLV, the second TLV includes feature information of a third packet to be sent by the second network device, and the second TLV It is used to trigger the first network device to generate a second communication channel according to the feature information of the third packet to be sent, where the second communication channel is different from the first communication channel in the attacked state; the first communication channel to be sent is different. The characteristic information of the three packets is different from the characteristic information of the attack packet; 所述发送单元,还用于基于所述第三报文的特征信息向第一网络设备发送所述第三报文。The sending unit is further configured to send the third packet to the first network device based on the feature information of the third packet. 13.根据权利要求12所述的第二网络设备,其特征在于,13. The second network device according to claim 12, wherein, 所述攻击报文的特征信息或所述待发送的第三报文的特征信息包括以下至少一种参数类型:The characteristic information of the attack packet or the characteristic information of the third packet to be sent includes at least one of the following parameter types: 以太类型、协议类型、源端口、目的端口、源网际协议IP地址、目的IP地址、源MAC地址、目的MAC地址、生存时间TTL、报文长度或优先级要求;所述待发送的第三报文的特征信息与所述攻击报文的特征信息不同包括所述待发送的第三报文的特征信息包括的参数类型与所述攻击报文的特征信息包括的参数类型不同,或者所述待发送的第三报文的特征信息包括的参数取值与所述攻击报文的特征信息包括的参数取值不同。Ether type, protocol type, source port, destination port, source Internet Protocol IP address, destination IP address, source MAC address, destination MAC address, time-to-live TTL, packet length or priority requirements; the third packet to be sent The characteristic information of the message is different from the characteristic information of the attack packet, including the parameter type included in the characteristic information of the third packet to be sent and the parameter type included in the characteristic information of the attack packet, or the parameter type included in the characteristic information of the third packet to be sent. The parameter values included in the characteristic information of the sent third packet are different from the parameter values included in the characteristic information of the attack packet. 14.根据权利要求13所述的第二网络设备,其特征在于,14. The second network device according to claim 13, wherein, 所述待发送的第三报文的特征信息包括的参数的类型多于所述攻击报文的特征信息包括的参数的类型;或者The characteristic information of the third packet to be sent includes more types of parameters than the characteristic information of the attack packet includes; or 所述待发送的第三报文的特征信息与所述攻击报文的特征信息包括至少一个不同取值的参数。The characteristic information of the third packet to be sent and the characteristic information of the attack packet include at least one parameter with different values. 15.一种计算机可读存储介质,包括指令,其特征在于,当所述指令在计算机上运行时,使得计算机执行权利要求1至4任一项所述的网络管理方法。15. A computer-readable storage medium, comprising instructions, wherein, when the instructions are executed on a computer, the instructions cause the computer to execute the network management method according to any one of claims 1 to 4. 16.一种计算机可读存储介质,包括指令,其特征在于,当所述指令在计算机上运行时,使得计算机执行权利要求5至7任一项所述的网络管理方法。16. A computer-readable storage medium, comprising instructions, wherein, when the instructions are executed on a computer, the instructions cause the computer to execute the network management method according to any one of claims 5 to 7. 17.一种网络管理系统,其特征在于,该系统包括前述权利要求8至11任一项所述的第一网络设备和前述权利要求12至14任一项所述的第二网络设备。17. A network management system, characterized in that the system comprises the first network device according to any one of the preceding claims 8 to 11 and the second network device according to any one of the preceding claims 12 to 14.
CN201811585178.1A 2018-12-24 2018-12-24 Network management method and device Active CN109639699B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811585178.1A CN109639699B (en) 2018-12-24 2018-12-24 Network management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811585178.1A CN109639699B (en) 2018-12-24 2018-12-24 Network management method and device

Publications (2)

Publication Number Publication Date
CN109639699A CN109639699A (en) 2019-04-16
CN109639699B true CN109639699B (en) 2020-01-03

Family

ID=66077018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811585178.1A Active CN109639699B (en) 2018-12-24 2018-12-24 Network management method and device

Country Status (1)

Country Link
CN (1) CN109639699B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114124511A (en) * 2021-11-17 2022-03-01 北京天融信网络安全技术有限公司 Ipsec negotiation method, network device and readable storage medium
CN119232709A (en) * 2023-06-30 2024-12-31 中兴通讯股份有限公司 Dynamic link protection method and device, storage medium and electronic device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743843A (en) * 2014-12-08 2016-07-06 华为技术有限公司 Processing method and device of preventing packet attack
CN109039841A (en) * 2018-08-29 2018-12-18 紫光华山信息技术有限公司 The method, apparatus and girff of cascade network is added

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7567669B2 (en) * 1996-05-17 2009-07-28 Certicom Corp. Strengthened public key protocol
US7389537B1 (en) * 2001-10-09 2008-06-17 Juniper Networks, Inc. Rate limiting data traffic in a network
CN1905553B (en) * 2005-07-28 2011-04-20 易星 Method for ensuring selected user access on DOS attacking or apparatus overload
CN101340440A (en) * 2008-08-11 2009-01-07 中兴通讯股份有限公司 Method and apparatus for defending network attack
CN102014109A (en) * 2009-09-08 2011-04-13 华为技术有限公司 Flood attack prevention method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743843A (en) * 2014-12-08 2016-07-06 华为技术有限公司 Processing method and device of preventing packet attack
CN109039841A (en) * 2018-08-29 2018-12-18 紫光华山信息技术有限公司 The method, apparatus and girff of cascade network is added

Also Published As

Publication number Publication date
CN109639699A (en) 2019-04-16

Similar Documents

Publication Publication Date Title
CN111953604B (en) A method and device for providing business services for business flows
US10574763B2 (en) Session-identifer based TWAMP data session provisioning in computer networks
EP3138243B1 (en) Network service insertion
KR101593356B1 (en) System and method for using label distribution protocol (ldp) in ipv6 networks
US12231327B2 (en) Reverse forwarding information base enforcement
US10356037B2 (en) Address resolution rewriting
CN103685009B (en) Data packet processing method and system as well as controller
WO2015134105A1 (en) Method and system for path discovery
US10601610B2 (en) Tunnel-level fragmentation and reassembly based on tunnel context
US11695858B2 (en) Packet fragmentation control
CN107493238A (en) A kind of method for controlling network congestion, equipment and system
JP2018525941A (en) Network packet flow controller with extended session management
EP2601766B1 (en) System and method for virtual private local area network service to use the flow aware pseudowire
WO2017055965A1 (en) Route refresh mechanism for border gateway protocol link state
US9253237B2 (en) Rich media status and feedback for devices and infrastructure components using in path signaling
CN105337852A (en) Method and devices for updating processing mode of service flow packet
WO2018193285A1 (en) Method and apparatus for enabling a scalable multicast virtual private network service across a multicast label distribution protocol network using in-band signaling
JP6200576B2 (en) Network device with tunnel establishment control based on site-type attributes received from other network devices
CN109639699B (en) Network management method and device
US9755939B2 (en) Network wide source group tag binding propagation
WO2023012502A1 (en) Securing multi-path tcp (mptcp) with wireguard protocol
US10944582B2 (en) Method and apparatus for enhancing multicast group membership protocol(s)
WO2018158615A1 (en) Method and apparatus for enabling the creation of a point-to-multipoint label switched path multicast distribution tree for a given ip multicast stream
Zainuddin Comparative analysis of packet fragmentation on the MPLS unicast IP routing: article

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant