Background technology
Continuous development along with the IP technology, the IP broadband services becomes bright spot, IP network is gradually from carrying single internet service to the carrying data, voice, video, big customer's special line, 3G, next generation network (NextGeneration Network, hereinafter to be referred as: NGN), IP Multimedia System (IP MultimediaSubsystem, hereinafter to be referred as: IMS), internet protocol TV (Internet Protocol Television, hereinafter to be referred as: IPTV) wait the multiple services direction of operation level to make the transition, in transformation process, IP network is in fail safe, reliability, the change of essence also will take place on the QoS.
Continuous development along with network technology, various new application emerge in an endless stream, as peer-to-peer network (Peer toPeer, hereinafter to be referred as: P2P), online game, emerging services such as Web TV, taken the most of bandwidth in the Internet, from present domestic statistics, the cross-domain flow of P2P has taken 80% bandwidth at main line, under the monthly payment tariff mode in unlimited time of China broadband, most bandwidth of network are shared by small number of users, and these users do not pay corresponding cost expense, have but influenced other most of users' network quality, cause network in various degree congested to occur, greatly reduce the user experience of other application.Meanwhile, computer network is subjected to more and more severe attack and invasion, causes very tremendous loss, the corresponding reduction of profitability for user and operator.Attack though fire compartment wall has been alleviated partly, the propagation and the attack of virus seems unable to do what one wishes to common fire compartment wall in IP bag payload for hiding oneself.In recent years, the development trend of network attack turns to higher layer applications gradually, according to one's analysis, at present network attack concentrate on application layer more than 70%, and should numeral in rising trend.Just because of this, content safety begins to become the problem of most critical in the present information security.
The main cause that causes above phenomenon is that operator lacks effectively a control and differentiation means to the user, user's What for had not on the net both been known by operator, also have no idea the to provide assurance of a different service quality, the grade of service to different user, can't realize that message detects and traffic identification, cause having increased operating cost of operator, reduced client's satisfaction.Therefore, how to realize that message detects and traffic identification, sensing network is used, and Network control and management means are provided, and the harmonious network that structure can operation and management is very important.
A kind of new technological means---deep packet inspection technology (Deep Packet Inspection, hereinafter to be referred as: DPI) and the degree of depth/dynamic flow detection technique (Deep/Dynamic Flow Inspection, hereinafter to be referred as: DFI), can use by sensing network, the means of network control and management are provided to operator.So-called " degree of depth " is relative with the detection layers second phase of common message, common message detects and only detects the content of IP bag below 4 layers, comprise source address, destination address, source port, destination interface and type of service, and DPI/DFI is except the level to the front detects, also increased the application layer detection, can discern various application and content thereof, and control and manage.
Following two kinds of DPI/DFI message detection schemes have been proposed in the prior art:
As shown in Figure 1, for the available technology adopting series system carries out the system schematic that DPI detects, in this network, the DPI/DFI checkout equipment is between convergence-level and Access Layer, also can be deployed in convergence-level and IP/ multi protocol label exchange (Multiprotocol Label Switch, hereinafter to be referred as: MPLS) between the backbone network, all enter access network or all need to detect through the DPI/DFI checkout equipment from the message that access network sends, and have only the message of coincidence detection strategy just to allow to enter network or send from network.
As shown in Figure 2, for the available technology adopting parallel way is carried out the system schematic that DPI detects, in this network, DPI/DFI checkout equipment side hangs over network access server (Network AccessServer, hereinafter to be referred as: NAS) other, also can hang over by other network equipment according to network actual conditions side, all enter access network or all need through NAS from the message that access network sends, NAS copies to the DPI/DFI checkout equipment with message and detects, in the process that the DPI/DFI checkout equipment detects, message continues to enter access network or sends from access network, unaffected, after the DPI/DFI checkout equipment identifies illegal business, abandon the message of the illegal business that enters access network or leave access network by NAS.
In the process that realizes the embodiment of the invention, the inventor finds above two kinds of schemes, and there are the following problems at least: adopt series system to carry out the scheme that DPI detects, because all messages all pass through the DPI/DFI checkout equipment, cause the DPI/DFI checkout equipment to become the bottleneck that message is transmitted, cause transmission delay, especially real time business is had a significant impact; It is dumb to detect strategy simultaneously, can't dispose the detection strategy according to network condition and dynamic requirements.Adopt parallel way to carry out the scheme that DPI detects because DPI/DFI checkout equipment side hangs in the network, professional real-time control ability a little less than, reduced the control effect; It is dumb to detect strategy simultaneously, can't dispose the detection strategy according to network condition and dynamic requirements.
Summary of the invention
The embodiment of the invention provides a kind of message detecting method and system, by different level message is detected with realization, can satisfy the demand of real time business, avoids the DPI/DFI checkout equipment to become the bottleneck that message is transmitted.
The embodiment of the invention provides a kind of message detecting method, comprising:
Detect the data message that receives according to detecting strategy;
When described data message satisfies described detection strategy, transmit described data message;
Determine whether to duplicate described data message according to collocation strategy, if then duplicate described data message, and detect strategy according to profound level and detect the data message that duplicates.
The embodiment of the invention also provides a kind of message detecting method, comprising:
Detect the data message that receives according to detecting strategy;
When described data message satisfies described detection strategy, duplicate described data message, detect strategy according to profound level and detect the data message that duplicates;
Determine whether to transmit described data message according to collocation strategy, if then transmit described data message.
The embodiment of the invention provides a kind of message detection system, comprising:
Detection module is used for detecting the data message that receives according to detecting strategy;
Forwarding module is used for transmitting described data message when described data message satisfies described detection strategy;
Determination module is used for determining whether to duplicate described data message according to collocation strategy;
Replication module is used for duplicating described data message when determining to duplicate described data message;
Profound detection module is used for detecting strategy according to profound level and detects the data message that duplicates.
The embodiment of the invention also provides a kind of message detection system, comprising:
Detection module is used for detecting the data message that receives according to detecting strategy;
Replication module is used for duplicating described data message when described data message satisfies described detection strategy;
Profound detection module is used for detecting strategy according to profound level and detects the data message that duplicates;
Determination module is used for determining whether to transmit described data message according to collocation strategy;
Forwarding module is used for transmitting described data message when determining to transmit described data message.
The message detecting method of the embodiment of the invention and system, at first detect data message according to detecting strategy, further detect data message according to profound strategy, realized by different level the data message being detected, solved the equilibrium problem between data message detection and the rapid data message forwarding performance, satisfied the demand of real time business, avoided the DPI/DFI checkout equipment to become the bottleneck that message is transmitted, realized perception and the controlled function of Virtual network operator business.
Embodiment
Below by drawings and Examples, the technical scheme of the embodiment of the invention is described in further detail.
As shown in Figure 3, network architecture schematic diagram for the embodiment of the invention, comprise user terminal, access network, NAS, content detection and control module and IP/MPLS backbone network in this network, wherein comprise the stream detection module among the NAS, be used for detecting data message according to detecting strategy; Content detection and control module are used for detecting strategy according to profound level and detect data message.。
As shown in Figure 4, be the flow chart of the embodiment of the invention one message detecting method.Before the step of carrying out present embodiment, pre-configured detection strategy of content detection and control module and the profound strategy that detects, specifically, content detection and control module according to operation needs portion configuration within it profoundly detect strategy, and be NAS configuration detection strategy.With the speech business is example, detects strategy and can be five-tuple (source address, address, place, source port, place port and protocol type) and traffic characteristic model (as wrapping length, connect speed, transmitting amount of bytes, inter-packet gap etc.); With the IPTV Business Stream is example, detects strategy and can be five-tuple and service protocol essential characteristic word strategy.
Present embodiment specifically comprises the steps:
Step 101, NAS receiving data packets;
Step 102, stream detection module detect data message according to detecting strategy, do not detect strategy if data message does not satisfy, and then execution in step 106; Otherwise, execution in step 103;
Step 103, transmit data message, determine whether to duplicate this data message according to collocation strategy, if then execution in step 104 according to normal flow;
Wherein collocation strategy can be operator according to the network operation situation and configured strategy, when data message satisfies when detecting strategy, whether need further to carry out profound level detection by pre-configured decision.
Step 104, copy data message, and content detection and the control module data message that detection is duplicated according to profound level detection strategy, tactful if the satisfied profound level of data message detects, execution in step 105; Otherwise, execution in step 106;
Step 105, handle next data message, finish;
Step 106, transmission alarm notification abandon data message.
When data message did not satisfy the detection strategy, for example, the stream detection module detected the data message that is not that normal five-tuple is transmitted; Perhaps, when the user used speech business, the stream detection module detected the bag length of data message more than 400 bytes (usually about Bao Changwei 150 bytes of speech business data message), and the duration is very long, illustrates that this data message is not the speech business message; Perhaps, when the user watched the IPTV Business Stream, the stream detection module detected and is not the required RTP of IPTV (Realtime Transport Protocol is hereinafter to be referred as RTP) service protocol essential characteristic word, but other professional tagged word; Then flowing detection module can write this data message in the blacklist, and further, the stream detection module can send alarm notification to NAS, and NAS directly abandons this data message; Perhaps, the stream detection module reduces the priority of this data message, and in the processing procedure of data message, the data message that priority is high will obtain priority treatment.
When data message did not satisfy profound level detection strategy, content detection and control module sent alarm notification to NAS; NAS abandons this data message according to alarm notification; For example, when the user watched the IPTV Business Stream, the IPTV Business Stream that content detection and control module detect under this message did not have copyright, or illegal Business Stream message, then notifies NAS to abandon the data message that sends from five-tuple.
Further, content detection and control module can also detect the result that strategy detects according to profound level, data message is classified, and the data message is carried out traffic management, this traffic management can comprise the management and the scheduling of data message formation, and the supervision of data message flow and shaping.
Message is detected present embodiment and corresponding strategies is distributed in the different functional entitys, by different level message is detected, solved the equilibrium problem between data message detection and the rapid data message forwarding performance, both satisfied the demand of real time business, avoided the DPI/DFI checkout equipment to become the bottleneck that message is transmitted, can control and manage Business Stream again, realize perception and the controlled function of Virtual network operator business.
As shown in Figure 5, flow chart for the embodiment of the invention two message detecting methods, before the step of carrying out present embodiment, need configuration detection strategy and the profound strategy that detects, specifically, content detection and control module detect strategy according to needs portion's configuration within it of operation is profound, and are NAS configuration detection strategy.With the speech business is example, detects strategy and can be five-tuple (source address, address, place, source port, place port and protocol type) and traffic characteristic model (as wrapping length, connect speed, transmitting amount of bytes, inter-packet gap etc.); With the IPTV Business Stream is example, detects strategy and can be five-tuple and service protocol essential characteristic word strategy.
Present embodiment specifically comprises the steps:
Step 201, NAS receiving data packets;
Step 202, stream detection module detect data message according to detecting strategy, do not detect strategy if data message does not satisfy, and then execution in step 206; Otherwise, execution in step 203;
Step 203, copy data message, content detection and control module detect strategy according to profound level and detect the data message that duplicates, if data message satisfies profound strategy, the execution in step 204 of detecting; Otherwise, execution in step 206;
Step 204, determine whether to transmit this data message according to collocation strategy, if then execution in step 205;
Wherein collocation strategy can be operator according to the network operation situation and configured strategy, can whether need to transmit by pre-configured decision when data message satisfies when detecting strategy; Also can be to detect tactful result by profound level to determine collocation strategy, for example collocation strategy can be set to: when data message satisfies profound level detection strategy, and the forwarding data message.
Step 205, forwarding data message finish;
Step 206, transmission alarm notification abandon data message, finish.
When data message did not satisfy the detection strategy, for example, the stream detection module detected the data message that is not that normal five-tuple is transmitted; Perhaps, when the user used speech business, the stream detection module detected the bag length of data message more than 400 bytes (usually about Bao Changwei 150 bytes of speech business data message), and the duration is very long, illustrates that this data message is not the speech business message; Perhaps, when the user watched the IPTV Business Stream, the stream detection module detected and is not the required RTP of IPTV (Realtime Transport Protocol is hereinafter to be referred as RTP) service protocol essential characteristic word, but other professional tagged word; Then flowing detection module can write this data message in the blacklist, and further, the stream detection module can send alarm notification to NAS, and NAS directly abandons this data message; Perhaps, the stream detection module reduces the priority of this data message, and in the processing procedure of data message, the data message that priority is high will obtain priority treatment.
When data message did not satisfy profound level detection strategy, content detection and control module sent alarm notification to NAS; NAS abandons this data message according to alarm notification; For example, when the user watched the IPTV Business Stream, the IPTV Business Stream that content detection and control module detect under this message did not have copyright, or illegal Business Stream message, then notifies NAS to abandon the data message that sends from five-tuple.
Further, content detection and control module can also detect the result that strategy detects according to profound level, data message is classified, and the data message is carried out traffic management, this traffic management can comprise the management and the scheduling of data message formation, and the supervision of data message flow and shaping.
Message is detected present embodiment and corresponding strategies is distributed in the different functional entitys, by different level message is detected, solved the equilibrium problem between data message detection and the rapid data message forwarding performance, both satisfied the demand of real time business, avoided the DPI/DFI checkout equipment to become the bottleneck that message is transmitted, can control and manage Business Stream again, realize perception and the controlled function of Virtual network operator business.
As shown in Figure 6, the schematic diagram for the embodiment of the invention one message detection system specifically comprises: detection module 11 is used for detecting the data message that receives according to detecting strategy; Forwarding module 12 is used for transmitting described data message when described data message satisfies described detection strategy; Determination module 13 is used for determining whether to duplicate described data message according to collocation strategy; Replication module 14 is used for duplicating described data message when determining to duplicate described data message; Profound detection module 15 is used for detecting strategy according to profound level and detects the data message that duplicates.
Present embodiment can also comprise: configuration module 16 is used to dispose described detection strategy and the described profound strategy that detects; Alarm module 17 is used for when described data message does not satisfy described detection strategy, does not perhaps satisfy profoundly when detecting strategy when the described data message that duplicates, and sends alarm notification; Processing module 18 is used for when described data message does not satisfy described detection strategy described data message being write in the blacklist;
Wherein processing module can comprise discard module, is used for abandoning the data message in the described blacklist according to described alarm notification; Also can comprise priority block, be used for reducing the priority of the data message of described blacklist.
As shown in Figure 7, be the NGN network architecture schematic diagram of the embodiment of the invention based on the data message detection, wherein detection module is positioned at transport network layer, in the equipment of access network and IP/MPLS backbone network, be subjected to the control of profound detection module, mainly the data message is discerned substantially, reported various flow informations to profound detection module.Profound detection module is positioned at the network control layer of transport network layer, further, it can be the part of network attachment control system and/or resource acceptance control system, also can be separately at network control layer as a content detection and control system, be independent of current network attachment control system and resource acceptance control system.Profound detection module is mainly used in the data message is carried out profound level detection and content recognition; To the detection module configuration detection strategy among the NAS; Controlled function to detection module can be provided; Traffic management control can also be provided, optimize message forwarding path, thereby guarantee the service quality of data message according to the network needs.
Present embodiment has solved the equilibrium problem between message detection and the rapid data forwarding performance, both satisfied the demand of real time business, avoided the DPI/DFI checkout equipment to become the bottleneck that message is transmitted, can control and manage Business Stream again, realize perception and the controlled function of Virtual network operator business.
As shown in Figure 8, the schematic diagram for the embodiment of the invention two message detection systems specifically comprises: detection module 21 is used for detecting the data message that receives according to detecting strategy; Replication module 22 is used for duplicating described data message when described data message satisfies described detection strategy; Profound detection module 23 is used for detecting strategy according to profound level and detects the data message that duplicates; Determination module 24 is used for determining whether to transmit described data message according to collocation strategy; Forwarding module 25 is used for transmitting described data message when determining to transmit described data message.
Present embodiment can also comprise: configuration module 26 is used to dispose described detection strategy and the described profound strategy that detects; Alarm module 27 is used for when described data message does not satisfy described detection strategy, does not perhaps satisfy profoundly when detecting strategy when the described data message that duplicates, and sends alarm notification; Processing module 28 is used for when described data message does not satisfy described detection strategy described data message being write in the blacklist.
Wherein processing module can comprise discard module, is used for abandoning the data message in the described blacklist according to described alarm notification; Also can comprise priority block, be used for reducing the priority of the data message of described blacklist.
Present embodiment detection module 21 can be positioned at transport network layer, and profound detection module 23 is positioned at network control layer, and this is described identical with the embodiment of the invention one message detection system.
Present embodiment has solved the equilibrium problem between message detection and the rapid data forwarding performance, both satisfied the demand of real time business, avoided the DPI/DFI checkout equipment to become the bottleneck that message is transmitted, can control and manage Business Stream again, realize perception and the controlled function of Virtual network operator business.
It should be noted that at last: above embodiment only in order to the technical scheme of the explanation embodiment of the invention, is not intended to limit; Although the embodiment of the invention is had been described in detail with reference to previous embodiment, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of each embodiment technical scheme of the embodiment of the invention.