WO2010111930A1 - 一种过滤方法、系统及网络设备 - Google Patents
一种过滤方法、系统及网络设备 Download PDFInfo
- Publication number
- WO2010111930A1 WO2010111930A1 PCT/CN2010/071361 CN2010071361W WO2010111930A1 WO 2010111930 A1 WO2010111930 A1 WO 2010111930A1 CN 2010071361 W CN2010071361 W CN 2010071361W WO 2010111930 A1 WO2010111930 A1 WO 2010111930A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security level
- url
- url information
- security
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Definitions
- the present invention relates to network security technologies in the field of communications, and in particular, to a filtering method, system, and network device.
- IP Internet Protocol
- PGW General Packet Radio Service
- the corresponding user terminal also provides an open operating interface for viruses, Trojans and other malware, and makes the user terminal more and more vulnerable to attacks by various viruses and other malicious software, and the virus can also be widely spread through the user terminal.
- the performance of the communication system is affected.
- the main purpose is to install anti-virus software on the user terminal, and when the user browses the webpage, downloads the file, and runs the file, the virus is detected and killed.
- the anti-virus software can detect the corresponding virus program, thereby preventing the virus from spreading or attacking.
- An object of the embodiments of the present invention is to provide a filtering method, system, and network device, which effectively prevent the spread of viruses, worms, trojans, and the like, thereby reducing the threat of viruses and other malicious software to users, and improving the network. safety.
- a filtering method is applied to a network side device, where the method includes: intercepting a request message sent by a user terminal to the Internet; extracting a uniform resource locator URL information from the request message; determining, according to the URL information, Determining a security level corresponding to the URL information; processing the request message according to the security level.
- a filtering system is applied to a network side device, and the system includes:
- An intercepting unit configured to intercept a request message sent by the user terminal to the Internet
- An extracting unit configured to extract a uniform resource locator URL information from the request packet, and send the URL information to a determining unit for processing;
- a determining unit configured to determine, according to the URL information, a security level corresponding to the URL information
- a processing unit configured to process the request message according to the security level determined by the determining unit.
- a network device includes: a receiving unit, configured to receive the URL information including the uniform resource locator;
- a determining unit configured to determine, according to the URL information, a security level corresponding to the URL information
- the processing unit is configured to process the request message according to the security level.
- the request message sent by the user terminal to the Internet is intercepted, and the uniform resource locator URL information is extracted from the request message.
- the URL information Determining a security level corresponding to the URL information; processing the request message according to the security level, solving the problem that installing anti-virus software on the user terminal occupies memory space and CPU resources, and being easily circumvented by malware The problem of risk, thus effectively preventing the spread or attack of malware and other malware, P is competing for the threat caused by the virus to the user terminal, and improving the network security and the user experience.
- FIG. 1 is a flowchart of a filtering method according to an embodiment of the present invention
- FIG. 2 is a flowchart of a specific implementation manner of a filtering method according to an embodiment of the present invention
- FIG. 3 is a schematic structural diagram of a filtering system according to an embodiment of the present invention
- FIG. 4 is a schematic structural diagram of a specific implementation of a filtering system according to an embodiment of the present invention
- FIG. 5 is a schematic structural diagram of a network device according to an embodiment of the present invention. detailed description
- FIG. 1 it is a flowchart of a filtering method provided in the embodiment of the present invention. The method is applied to a network side device, and includes:
- Step S100 Intercept the request message sent by the user terminal to the Internet server.
- Step S101 Extract a uniform resource locator URL from the request message (Uniform
- the network device on the network side can detect DPI (Deep Packet) through deep packet inspection.
- DPI Deep Packet
- the network device may be a service router SR (Service Router, SR), a broadband remote access server (BRAS),
- SR Service Router
- BRAS broadband remote access server
- GGSN Gateway GPRS Support Node
- Step S102 Determine, according to the URL information, a security level corresponding to the URL information.
- the local service function entity or the storage device or the cloud security server connected to the network device stores a URL library, and each URL information in the URL library has a security level identifier corresponding to the URL information.
- the determining the security level corresponding to the URL information specifically includes:
- the security level of security described above is: a URL library cached from the network device itself, or a URL library cached by a local service function entity connected to the network device, or from a cloud security service. Obtain a security level on any device in the server; it can also be applied to the following situations: When searching from a URL library cached locally by the network device, the security level corresponding to the URL information cannot be determined, or the local service function entity is If the security level of the URL information cannot be determined, the URL information is sent to the cloud security server for processing, that is, the URL is searched in the URL database of the cloud security server.
- Step S104 Process the request packet according to the security level.
- the security level information includes: any combination of one or more of security, danger, suspicious and unknown.
- processing the request packet specifically includes any combination of one or more of the following:
- the request message is discarded, and the message carrying the alarm information is returned to the user terminal, so as to prohibit the user terminal from sending the request message;
- the URL information is sent to other network devices for security level determination, and processed by the returned security level.
- the URL library is periodically refreshed by the cloud security server, and the cloud security server is also referred to as a “cloud security server cluster” or a “cloud security terminal”, and is mainly used for network information resources (for example, a webpage).
- the request message sent by the user terminal to the Internet server is intercepted, and the uniform resource locator URL information is extracted from the request message; Finding a URL library, determining a security level corresponding to the URL information; processing the request packet according to the security level, and solving
- the problem of installing anti-virus software on the user terminal to occupy memory space and CPU resources, and the risk of being easily bypassed by malware, effectively preventing the spread and attack of viruses and other malware, and P is striving for malware. Threats caused by user terminals improve network security and user experience.
- FIG. 2 is a flowchart of a specific implementation manner of a filtering method according to an embodiment of the present invention.
- the filtering method can be applied to various network devices.
- the gateway device is taken as an example to describe the implementation process of the filtering method.
- Step S200 The user terminal sends a request message to the Internet server to request access to the information resource on the Internet server.
- the request packet may be an http get message with a destination port of 80, but is not limited to the request.
- Step S202 The gateway device intercepts the request packet.
- Step S203 The gateway device extracts a uniform resource locator URL message from the request packet, where the gateway device may be a network side routing device, but is not limited to the routing device.
- the routing device may be any combination of any one or more of the network devices such as the service router SR, the broadband remote access server BRAS, and the GPRS gateway GGSN. The following describes the method by using a router as an example.
- the router may extract the uniform resource locator URL information from the request message by using the deep packet detection DPI mode or other manners; where the URL information is obtained by the LPU (Line Processing Unit, LPU) in the router To be done.
- LPU Line Processing Unit
- Step S204 The gateway device searches, according to the URL information, from the locally cached URL library, and determines whether there is a security level corresponding to the URL information. If yes, step S206 is performed; otherwise, step S208 is performed, or after step S208 and step S212 are performed, step S206 is performed.
- the local service function entity or the cloud security server connected to the gateway device is stored.
- There is a URL library and each URL information in the URL library has a security level identifier corresponding to the URL information.
- the URL library stored by the gateway device itself or the URL library stored by the local service function entity is periodically refreshed by the cloud security server. Because the security level information in the URL library is changing, a refresh mechanism is required.
- the URL library stored by the gateway device itself or the URL library stored by the local service function entity needs to be refreshed at regular intervals, and the time interval may be 30s. Refreshing once, you can also adjust accordingly according to the actual situation;
- the cloud security server can be a cloud security server group composed of one or more cloud security servers.
- the URL library stores the URL information and the security level corresponding to the URL information.
- the correspondence relationship is also referred to as a URL list, that is, the URL library stores the URL list, and the URL information in the URL list can be used to find the corresponding URL.
- the security level, and the URL list is periodically updated by an aging mechanism.
- the URL library stored by the gateway device itself or the URL library stored by the local service function entity continuously caches the information in the URL list, which causes the information in the locally cached URL list to gradually increase, and some may be rarely used. This requires an aging mechanism.
- the information in the list of URLs that have not been matched in a certain interval can be aged out (the aging time can be 30 minutes, or adjusted according to the actual situation), so that the router resources can be saved. It also improves the efficiency of matching.
- the above-mentioned step S204 can be completed by the router's multi-service processing board MSU (MSU).
- MSU multi-service processing board
- the interface board LPU of the router redirects the request packet containing the URL information to the multi-service processing board MSU by using an ACL (Access Control List, ACL) manner; wherein, the MSU can be processed according to the MSU;
- ACL Access Control List, ACL
- the URL information needs to be sent to the local service function entity or the cloud security server for processing through a dedicated interface.
- Step S206 Determine, according to the search result, a security level corresponding to the URL information, and send the security level to the gateway device.
- Step S208 Perform a search from the URL library cached by the local service function entity; if found, perform step S206; otherwise, perform step S212. If the security level corresponding to the URL information is not found in the URL list in the URL library cached by the gateway device (ie, the cached URL library), step S208 is performed; It is also possible that the gateway device directly sends the URL information to the local service function entity, so that the local function service entity determines and returns the security level to the router according to the URL information.
- Step S212 The cloud security server searches for a list of URLs in its locally cached URL library; if it finds, executes step S206; otherwise, the process ends.
- step S212 is performed; or the gateway device directly Sending the URL information to the cloud security server, so that the cloud security server determines and returns the security level to the gateway device according to the URL information; where the cloud security server may be one or multiple cloud security servers. Cloud security server farm.
- the step of searching for the URL library according to the URL information may be performed by first searching in the URL library cached by the gateway device, and failing to find the security level corresponding to the URL information, and then searching.
- the cached URL in the local service function entity or it can be directly searched in the URL library cached by the local service function entity; or, it is directly searched in the URL library stored in the cloud security server library and then returns security level information to the gateway. device.
- connection between the gateway device and the cloud security server can be optimized for transmission with a higher bandwidth and a lower latency link.
- Step S214 Process the request packet according to the security level.
- the security level information includes: any combination of one or more of security, danger, suspicious and unknown.
- the security level includes: a security assessment level, and/or a content evaluation level; wherein the security assessment level may be classified according to a risk control level defined by the customer, for example, configuring a high, medium, and low security assessment according to the customer's requirements. Level, can be rooted after configuration Filter according to the configured conditions.
- the content evaluation level may be classified according to content contained in the webpage, for example, classified into: adult content, sex education, alcohol/tobacco content, gambling, violence/racial discrimination, gun trafficking, entertainment, religion, drugs, illegal drugs, Games, education, social classes, parenting, advertising, etc.
- the security assessment level and the content evaluation level may be combined in any one of the forms, or in any combination, and finally obtained and summarized into security level information, such as classified into safe, dangerous, suspicious and unknown.
- security level information such as classified into safe, dangerous, suspicious and unknown.
- a kind of security level information of course, only one or several types of security level information.
- the request message of the user terminal is sent to the Internet server of the Internet; the user terminal receives the response message of the Internet server.
- the security level information is dangerous, discarding the request message, and returning the message of the alarm information to the user terminal, to prohibit the user terminal from sending the request message; for example, the “danger” may be requested If the webpage pointed to by the URL contains malware or contains a virus, the request message is directly discarded, and a page or information of "this network contains a malicious code such as a virus, prohibiting access" is sent to the user terminal, so that the user terminal gives up according to the reminder. request.
- the router When the security level information is suspicious, returning the reminding information to the user terminal to prompt the user terminal that the requested information is suspicious, suggesting that the user terminal does not perform access; if the user terminal insists on accessing according to the prompt information, the router will The request packet is forwarded to the Internet, but there is a certain security risk. If the user terminal confirms that the access is not continued according to the prompt information, the router directly discards the request packet, and may also directly discard the request according to the configuration of the user. 4 ⁇ .
- the user terminal selects: one is to send the URL information to the cloud security server group and wait for it to perform security level determination, and process by the returned security level; The second is to first send the request message of the user terminal to the Internet, and then perform detection and processing.
- the gateway device such as the network side router can provide a virtualized service, that is, the user filtering policy can be customized by different user terminals, or the router can periodically provide filtering reports to the client.
- Table information for user reference, the router filters according to user-defined policies to meet the differentiated needs of customers.
- the URL information may be exchanged between the gateway device, such as a router and the cloud security server group.
- the local cache function may also be used, or the local service function entity may be used.
- Interactive transmission to enhance the user experience and improve resource utilization efficiency; through the above various implementations can effectively prevent the spread of viruses and other malicious software or attacks while greatly reducing the time spent filtering, enhancing the user experience, while reducing the cloud
- the interaction process saves network and interface resources.
- FIG. 3 is a schematic structural diagram of a filtering system according to an embodiment of the present invention.
- a filtering system is applied to the network side device, and the system includes an intercepting unit 300, an extracting unit 301, a determining unit 302, a processing unit 304, a sending unit 306, a local service function entity 308, and a cloud security server 310, where:
- the intercepting unit 300 is configured to intercept the request message sent by the user terminal to the Internet server, and send the message to the extracting unit 301 for processing.
- the extracting unit 301 is configured to extract the uniform resource locator URL information from the request message, and send the URL information to the determining unit for processing.
- the determining unit 302 is configured to determine, according to the URL information sent by the extracting unit 301, a security level corresponding to the URL information, and send the security level to the processing unit 304 for processing.
- the processing unit 304 is configured to process the request according to the security level determined by the determining unit 302.
- the security level information includes: any combination of one or more of security, danger, suspicious and unknown.
- the processing unit 304 processes the request packet according to different combinations or components of the security level information, and specifically includes any combination of the following ones or several situations:
- the security level information when the security level information is dangerous, discarding the request message, and returning the message of the alarm information to the user terminal, to prohibit the user terminal from transmitting the request message; for example, the "danger” may If the webpage pointed to by the requested URL already contains malicious Trojan software and/or contains a virus, the request message is directly discarded, and a page or information of "this network contains a malicious code such as a virus, prohibiting access" or information is given to the user terminal. , causing the user terminal to abandon the request according to the reminder.
- the router forwards the request packet to the Internet, but there is a certain security risk. If the user terminal confirms that the access is not continued according to the prompt information, the router directly discards the request packet, and may also directly select the request according to the configuration of the user. Discard the request.
- the URL information is sent to other network devices for security level determination, and processed by the returned security level;
- the second is to first send the request message of the user terminal to the Internet, and then perform detection and processing.
- the system further includes:
- the sending unit 306 is configured to send the URL information to the local service function entity or the cloud security server, and send the security level corresponding to the URL information returned by the local service function entity or the cloud security server to the determining unit. 302 is processed.
- the local service function entity 308 is connected to the sending unit 306, and is configured to search the locally cached URL library according to the URL information, and determine the URL information returned by the security level of the URL information to the determining unit 302.
- the local service function entity 308 locally stores a URL library, and each of the URL libraries
- the URL information has a security level identifier corresponding to the URL information.
- the system further includes: a cloud security server 310, configured to receive the URL information sent to the cloud security server, where the cloud security server 310 searches from a list of URLs in the locally cached URL library, and Determining a security level corresponding to the URL information, and transmitting the security level to the processing unit 304.
- a cloud security server 310 configured to receive the URL information sent to the cloud security server, where the cloud security server 310 searches from a list of URLs in the locally cached URL library, and Determining a security level corresponding to the URL information, and transmitting the security level to the processing unit 304.
- the URL library is periodically refreshed by the cloud security server 310.
- the URL library stores URL information and a security level corresponding to the URL information, and the corresponding relationship is also referred to as a URL list, that is, the URL library stores the URL.
- the list can be found by using the URL information in the URL list, and the URL list is periodically updated by the aging mechanism.
- the intercepting unit 300 intercepts the request message sent by the user terminal to the Internet server, and the extracting unit 301 extracts the uniform resource locator URL information from the request message.
- the determining unit 302 determines the security level corresponding to the URL information according to the URL information; and the processing unit 304 processes the request message according to the security level, and solves the problem that the anti-virus software is installed on the user terminal.
- FIG. 4 is a schematic structural diagram of a specific implementation of a filtering system according to an embodiment of the present invention.
- FIG. 4 is a specific implementation of the system shown in FIG. 3, where the filtering system is applied to a network side device, and the routing device in the gateway device is taken as an example, but is not limited to the routing device.
- the routing device 40 includes: an interface circuit board LPU 402 and a multi-service processing board MSU 404;
- the LPU 402 and the MSU 404 may be integrated on one device, and the LPU 402 and the MSU 404 may be one or more.
- the routing device may be any combination of any one of a service router SR, a broadband remote access server BRAS, a GPRS gateway GGSN, and the like.
- the interface circuit board LPU402 is configured to intercept the request sent by the user terminal to the Internet server, and send the URL information to the MSU 404 for processing.
- the multi-service processing board MSU 404 is configured to extract a uniform resource locator URL information from the request message, and determine a security level corresponding to the URL information according to the URL information, and according to the returned security level. , processing the request message.
- a local service function entity 406 Connected to the routing device 40 are: a local service function entity 406, and/or a cloud security server 408.
- the LPU 402 intercepts the request message sent by the user terminal to the Internet (for example, the http get message, the destination port is 80), and redirects the request message to the MSU 404 by using the ACL mode; the MSU 404 passes the depth.
- the packet detection DPI mode or other manner extracts the uniform resource locator URL information from the request message.
- the MSU 404 can search from the URL list in the locally cached URL library, and determine whether there is a security level corresponding to the URL information.
- the security corresponding to the URL information can also be obtained directly from the local service function entity 406 or the cloud security server 408. grade.
- the MSU 404 When the MSU 404 searches from the URL cache locally cached by the MSU 404, and the security level corresponding to the URL information is not found, the MSU 404 sends the URL information to the local service function entity 406; the local service function entity 406 is Searching in the cached URL library; if the security level corresponding to the URL information is found, the security level is sent to the MSU 404; otherwise, the URL information is sent to the cloud security server 408 through the dedicated interface; The server 408 looks up from its locally cached URL library, determines and returns the security level corresponding to the URL information to the MSU 404.
- the connection between the routing device 40 and the cloud security server 408 can be optimized for transmission with a higher bandwidth and a lower latency link.
- the security level information includes: any combination of one or more of security, danger, suspicious and unknown.
- the security level includes: a security assessment level, and/or a content evaluation level; wherein the security assessment level may be classified according to a risk control level defined by the customer, for example, configuring a high, medium, and low security assessment according to the customer's requirements. Level, after configuration, can be filtered according to the configuration.
- the content evaluation level may be classified according to content contained in the web page, for example, divided into: adult content, content that a child can access, and the like.
- the security assessment level and the content evaluation level may be combined in any one of the forms, or in any combination, and finally obtained and summarized into four types of information: security, danger, suspicious and unknown in the security level information. .
- the MSU 404 processes the request packet according to different combinations or components of the security level, and specifically includes any combination of one or more of the following conditions:
- the request message of the user terminal is sent to the Internet Internet server; the user terminal is subject to the response of the Internet server.
- the security level information when the security level information is dangerous, discarding the request message, and returning the message of the alarm information to the user terminal, to prohibit the user terminal from transmitting the request message; for example, the "danger” may If the webpage pointed to by the requested URL already contains malicious Trojan software and/or contains a virus, the request message is directly discarded, and a page or information of "this network contains a malicious code such as a virus, prohibiting access" or information is given to the user terminal. , causing the user terminal to abandon the request according to the reminder.
- the router forwards the request packet to the Internet, but there is a certain security risk. If the user terminal confirms that the access is not continued according to the prompt information, the router directly discards the request packet, and may also directly select the request according to the configuration of the user. Discard the request.
- the URL information is sent to other network devices for security level determination, and processed by the returned security level;
- the second is to send the request message of the user terminal to the Internet server, and then perform detection and processing.
- the URL library in the local cache of the routing device and the URL library in the local cache of the local service function entity are periodically refreshed by other network devices.
- the security level information in the URL library in the local cache of the routing device and the URL cache in the local cache of the local service function entity is changing, so a refresh mechanism is required, and the URL library and the local cache in the local cache of the routing device are required.
- the URL library in the local cache of the service function entity needs to be refreshed at a certain time. The time interval can be refreshed once in 30s or adjusted according to the actual situation.
- the other network devices can be cloud security devices or local service function entities. .
- the URL library stores a URL list, where the URL list is a correspondence between the URL information and a security level, that is, a security level corresponding to the URL information is determined by using a URL list in the URL library.
- the URL list is periodically updated by the aging mechanism.
- the URL library keeps caching the information in the URL list, which will cause the information in the locally cached URL list to gradually increase, and some may be rarely used. This requires an aging mechanism, and there is no matching URL list at a certain interval.
- the information in the information can be aged out (the aging time can be 30 minutes, and can be adjusted according to the actual situation), which can save the resources of the router and improve the matching efficiency.
- FIG. 5 is a schematic structural diagram of a network device according to an embodiment of the present invention.
- a network device includes:
- the receiving unit 502 is configured to receive a request message that includes the uniform resource locator URL information.
- the extracting unit 504 is configured to extract uniform resource locator URL information from the request message.
- the determining unit 506 is configured to determine, according to the URL information, a security level corresponding to the URL information.
- the processing unit 508 is configured to process the request packet according to the security level.
- the network device further includes:
- the storage unit 512 is configured to store the URL information and a security level corresponding to the URL information.
- the searching unit 514 is configured to search for a security level corresponding to the URL information in the URL library stored by the storage unit 512 according to the URL information, and send the security level to the determining unit 506.
- the network device may be a multi-service processing board MSU.
- the method further includes: a sending unit 510, configured to send the URL information to a local service function entity or a cloud security server for processing, and the local service function entity or the cloud security
- the security level returned by the server corresponding to the URL information is sent to the determining unit 506 for processing.
- the network device When the network device is a multi-service processing board (MSU), it can also be integrated on the interface circuit board LPU for processing.
- MSU multi-service processing board
- the network device provided by the embodiment of the present invention solves the problem that the anti-virus software occupies the memory space and the CPU resource on the user terminal, and the risk of being easily bypassed by the malware, thereby effectively preventing the virus from spreading. Or attack, P fights down the threat that the virus poses to the network, and improves the network security and user experience.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Description
Claims
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2012502434A JP5325335B2 (ja) | 2009-03-30 | 2010-03-26 | フィルタリング方法、システムおよびネットワーク機器 |
| EP10758032.6A EP2408166B1 (en) | 2009-03-30 | 2010-03-26 | Filtering method, system and network device therefor |
| CA2757339A CA2757339C (en) | 2009-03-30 | 2010-03-26 | Filtering method, system, and network equipment |
| US13/250,649 US20120023588A1 (en) | 2009-03-30 | 2011-09-30 | Filtering method, system, and network equipment |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN200910106362.8 | 2009-03-30 | ||
| CN200910106362A CN101854335A (zh) | 2009-03-30 | 2009-03-30 | 一种过滤的方法、系统及网络设备 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/250,649 Continuation US20120023588A1 (en) | 2009-03-30 | 2011-09-30 | Filtering method, system, and network equipment |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2010111930A1 true WO2010111930A1 (zh) | 2010-10-07 |
Family
ID=42805608
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2010/071361 Ceased WO2010111930A1 (zh) | 2009-03-30 | 2010-03-26 | 一种过滤方法、系统及网络设备 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US20120023588A1 (zh) |
| EP (1) | EP2408166B1 (zh) |
| JP (1) | JP5325335B2 (zh) |
| CN (1) | CN101854335A (zh) |
| CA (1) | CA2757339C (zh) |
| WO (1) | WO2010111930A1 (zh) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2013134711A (ja) * | 2011-12-27 | 2013-07-08 | Nis Plus Co Ltd | 医療クラウドシステム |
| CN103731818A (zh) * | 2012-10-10 | 2014-04-16 | 中国移动通信集团江苏有限公司 | 一种移动终端病毒监测、拦截方法及其装置 |
Families Citing this family (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102467633A (zh) * | 2010-11-19 | 2012-05-23 | 奇智软件(北京)有限公司 | 一种安全浏览网页的方法及其系统 |
| CN102694903B (zh) * | 2011-03-22 | 2017-03-01 | 联想(北京)有限公司 | 数据通信方法及装置 |
| EP2705435B8 (en) | 2011-05-06 | 2017-08-23 | Magic Leap, Inc. | Massive simultaneous remote digital presence world |
| CN103051596A (zh) * | 2011-10-14 | 2013-04-17 | 腾讯科技(深圳)有限公司 | 网络安全识别方法、安全检测服务器、客户端及系统 |
| CN102510563A (zh) * | 2011-10-21 | 2012-06-20 | 北京西塔网络科技股份有限公司 | 一种移动互联网恶意软件检测的方法及系统 |
| CN103092832A (zh) * | 2011-10-27 | 2013-05-08 | 腾讯科技(深圳)有限公司 | 网址风险检测的处理方法及装置 |
| JP5764511B2 (ja) * | 2012-03-13 | 2015-08-19 | 西日本電信電話株式会社 | Urlフィルタリング装置 |
| KR101462311B1 (ko) * | 2012-05-18 | 2014-11-14 | (주)이스트소프트 | 악성 코드 차단 방법 |
| CN103631805A (zh) * | 2012-08-24 | 2014-03-12 | 腾讯科技(深圳)有限公司 | 一种搜索结果的显示方法和装置 |
| CN102938739B (zh) * | 2012-11-26 | 2016-08-24 | 华为技术有限公司 | 深度报文检查方法与装置 |
| CN102946449A (zh) * | 2012-11-28 | 2013-02-27 | 网神信息技术(北京)股份有限公司 | Url 的匹配方法、装置及网关 |
| CN103077349B (zh) * | 2013-01-05 | 2016-04-13 | 北京奇虎科技有限公司 | 一种浏览器侧提示访问安全信息的方法及装置 |
| US9398066B1 (en) * | 2013-03-06 | 2016-07-19 | Amazon Technologies, Inc. | Server defenses against use of tainted cache |
| US9471533B1 (en) * | 2013-03-06 | 2016-10-18 | Amazon Technologies, Inc. | Defenses against use of tainted cache |
| US10728287B2 (en) * | 2013-07-23 | 2020-07-28 | Zscaler, Inc. | Cloud based security using DNS |
| CN103366019B (zh) * | 2013-08-06 | 2016-09-28 | 飞天诚信科技股份有限公司 | 一种基于iOS设备的网页拦截方法和设备 |
| CN103634317A (zh) * | 2013-11-28 | 2014-03-12 | 北京奇虎科技有限公司 | 基于云安全对恶意网址信息进行安全鉴定的方法及系统 |
| CN103905436A (zh) * | 2014-03-14 | 2014-07-02 | 汉柏科技有限公司 | 一种防护app个人隐私收集的方法及装置 |
| CN103997487A (zh) * | 2014-05-04 | 2014-08-20 | 绿网天下(福建)网络科技有限公司 | 一种基于浏览器的安全上网隔离方法 |
| CN103986719A (zh) * | 2014-05-26 | 2014-08-13 | 厦门美图之家科技有限公司 | 一种防止应用程序后台流量流失的方法 |
| CN104144170A (zh) * | 2014-08-25 | 2014-11-12 | 网神信息技术(北京)股份有限公司 | 网页地址的过滤方法、装置和系统 |
| CN105591997B (zh) * | 2014-10-20 | 2019-04-09 | 杭州迪普科技股份有限公司 | 一种url分类过滤方法及装置 |
| CN104378762A (zh) * | 2014-11-19 | 2015-02-25 | 北京极科极客科技有限公司 | 一种用户上网流量的监控方法 |
| JP2016148967A (ja) * | 2015-02-12 | 2016-08-18 | 富士通株式会社 | 情報処理装置、情報処理方法及びプログラム |
| CN104780121B (zh) * | 2015-04-30 | 2018-05-08 | 新华三技术有限公司 | 一种报文发送方法及装置 |
| EP4231684A1 (en) * | 2015-08-27 | 2023-08-23 | DRNC Holdings, Inc. | Trustworthy cloud-based smart space rating with distributed data collection |
| CN105938473A (zh) * | 2015-12-02 | 2016-09-14 | 杭州迪普科技有限公司 | 保存网页快照的方法及装置 |
| CN105813085A (zh) * | 2016-03-08 | 2016-07-27 | 联想(北京)有限公司 | 一种信息处理方法及电子设备 |
| CN107181719B (zh) * | 2016-03-10 | 2021-03-02 | 阿里巴巴集团控股有限公司 | 一种木马程序的检测方法和装置 |
| US10330773B2 (en) | 2016-06-16 | 2019-06-25 | Texas Instruments Incorporated | Radar hardware accelerator |
| CN107528845A (zh) * | 2017-09-01 | 2017-12-29 | 华中科技大学 | 一种基于爬虫技术的智能url过滤系统及其方法 |
| CN107766224B (zh) * | 2017-11-07 | 2020-12-08 | 百度在线网络技术(北京)有限公司 | 测试方法和测试装置 |
| CN108966234B (zh) * | 2018-05-31 | 2021-11-30 | 北京五八信息技术有限公司 | 恶意信息的处理方法和装置 |
| CN109660499B (zh) * | 2018-09-13 | 2021-07-27 | 创新先进技术有限公司 | 攻击拦截方法和装置、计算设备及存储介质 |
| CN110177096B (zh) * | 2019-05-24 | 2021-09-07 | 网易(杭州)网络有限公司 | 客户端认证方法、装置、介质和计算设备 |
| CN112202814B (zh) * | 2020-11-04 | 2022-02-08 | 中国电子科技集团公司第三十研究所 | 一种路由交换设备内生安全动态防护功能的处理方法 |
| CN112668007A (zh) * | 2021-01-05 | 2021-04-16 | 浪潮软件股份有限公司 | 一种软件系统安全加固方法 |
| CN118101225A (zh) * | 2022-11-17 | 2024-05-28 | 锐捷网络股份有限公司 | 一种入侵检测方法、装置、电子设备及存储介质 |
| CN120045804A (zh) * | 2023-11-27 | 2025-05-27 | 中兴通讯股份有限公司 | 网站链接的安全性检测方法 |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1573752A (zh) * | 2003-06-20 | 2005-02-02 | 日本电气株式会社 | Url检索系统、服务器及url检索方法 |
| US20060021031A1 (en) * | 2004-06-30 | 2006-01-26 | Scott Leahy | Method and system for preventing fraudulent activities |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040010710A1 (en) * | 2002-07-10 | 2004-01-15 | Wen-Hao Hsu | Method and system for filtering requests to a web site |
| US7752662B2 (en) * | 2004-02-20 | 2010-07-06 | Imperva, Inc. | Method and apparatus for high-speed detection and blocking of zero day worm attacks |
| US20060064469A1 (en) * | 2004-09-23 | 2006-03-23 | Cisco Technology, Inc. | System and method for URL filtering in a firewall |
| US20060168066A1 (en) * | 2004-11-10 | 2006-07-27 | David Helsper | Email anti-phishing inspector |
| US7698442B1 (en) * | 2005-03-03 | 2010-04-13 | Voltage Security, Inc. | Server-based universal resource locator verification service |
| US8079087B1 (en) * | 2005-05-03 | 2011-12-13 | Voltage Security, Inc. | Universal resource locator verification service with cross-branding detection |
| US7562304B2 (en) * | 2005-05-03 | 2009-07-14 | Mcafee, Inc. | Indicating website reputations during website manipulation of user information |
| JP2007006054A (ja) * | 2005-06-23 | 2007-01-11 | Hitachi Ltd | パケット中継装置及びパケット中継システム |
| JP4996968B2 (ja) * | 2007-05-09 | 2012-08-08 | 株式会社エヌ・ティ・ティ・ドコモ | 通信端末、送信制御システム、送信制御プログラム、及び送信制御方法 |
| US20090178131A1 (en) * | 2008-01-08 | 2009-07-09 | Microsoft Corporation | Globally distributed infrastructure for secure content management |
-
2009
- 2009-03-30 CN CN200910106362A patent/CN101854335A/zh active Pending
-
2010
- 2010-03-26 WO PCT/CN2010/071361 patent/WO2010111930A1/zh not_active Ceased
- 2010-03-26 CA CA2757339A patent/CA2757339C/en active Active
- 2010-03-26 JP JP2012502434A patent/JP5325335B2/ja active Active
- 2010-03-26 EP EP10758032.6A patent/EP2408166B1/en active Active
-
2011
- 2011-09-30 US US13/250,649 patent/US20120023588A1/en not_active Abandoned
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1573752A (zh) * | 2003-06-20 | 2005-02-02 | 日本电气株式会社 | Url检索系统、服务器及url检索方法 |
| US20060021031A1 (en) * | 2004-06-30 | 2006-01-26 | Scott Leahy | Method and system for preventing fraudulent activities |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP2408166A4 * |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2013134711A (ja) * | 2011-12-27 | 2013-07-08 | Nis Plus Co Ltd | 医療クラウドシステム |
| CN103731818A (zh) * | 2012-10-10 | 2014-04-16 | 中国移动通信集团江苏有限公司 | 一种移动终端病毒监测、拦截方法及其装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2012522295A (ja) | 2012-09-20 |
| EP2408166B1 (en) | 2016-08-31 |
| JP5325335B2 (ja) | 2013-10-23 |
| EP2408166A4 (en) | 2012-07-11 |
| CN101854335A (zh) | 2010-10-06 |
| CA2757339A1 (en) | 2010-10-07 |
| EP2408166A1 (en) | 2012-01-18 |
| US20120023588A1 (en) | 2012-01-26 |
| CA2757339C (en) | 2017-09-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2010111930A1 (zh) | 一种过滤方法、系统及网络设备 | |
| US11671402B2 (en) | Service resource scheduling method and apparatus | |
| JP6006788B2 (ja) | ドメイン名をフィルタリングするためのdns通信の使用 | |
| US8661522B2 (en) | Method and apparatus for probabilistic matching to authenticate hosts during distributed denial of service attack | |
| EP2779574B1 (en) | Attack detection and prevention using global device fingerprinting | |
| US8726338B2 (en) | Dynamic threat protection in mobile networks | |
| US9609460B2 (en) | Cloud based mobile device security and policy enforcement | |
| US9531758B2 (en) | Dynamic user identification and policy enforcement in cloud-based secure web gateways | |
| US9065800B2 (en) | Dynamic user identification and policy enforcement in cloud-based secure web gateways | |
| CN104219200B (zh) | 一种防范dns缓存攻击的装置和方法 | |
| CN102594623B (zh) | 防火墙的数据检测方法及装置 | |
| US20130212680A1 (en) | Methods and systems for protecting network devices from intrusion | |
| CN103916389B (zh) | 防御HttpFlood攻击的方法及防火墙 | |
| CN105940655B (zh) | 用于防范DDos攻击的系统 | |
| US11165817B2 (en) | Mitigation of network denial of service attacks using IP location services | |
| CN102404741B (zh) | 移动终端上网异常检测方法和装置 | |
| US9124617B2 (en) | Social network protection system | |
| WO2014055354A1 (en) | Protecting users from undesirable content | |
| WO2008131667A1 (en) | Method, device for identifying service flows and method, system for protecting against a denial of service attack | |
| CN101252443A (zh) | 检测报文安全性的方法和装置 | |
| US20190058729A1 (en) | Local DDOS mitigation announcements in a telecommunications network | |
| CN102045320A (zh) | 安全策略的老化方法及装置 | |
| CN112437083A (zh) | 防护云资源被网络攻击的方法、系统和电子设备 | |
| JP7600463B1 (ja) | 仮想ホストを利用してネットワークに対するサイバー脅威を検出するサイバーセキュリティサービスを提供する方法およびこれを利用したサイバーセキュリティサービス提供サーバ | |
| CN112583692B (zh) | 流量清洗的方法、装置、设备及计算机存储介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10758032 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2757339 Country of ref document: CA Ref document number: 2012502434 Country of ref document: JP |
|
| REEP | Request for entry into the european phase |
Ref document number: 2010758032 Country of ref document: EP |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2010758032 Country of ref document: EP |