CN101771619B - Network system for realizing integrated security services - Google Patents
Network system for realizing integrated security services Download PDFInfo
- Publication number
- CN101771619B CN101771619B CN201010125028XA CN201010125028A CN101771619B CN 101771619 B CN101771619 B CN 101771619B CN 201010125028X A CN201010125028X A CN 201010125028XA CN 201010125028 A CN201010125028 A CN 201010125028A CN 101771619 B CN101771619 B CN 101771619B
- Authority
- CN
- China
- Prior art keywords
- network
- service
- security
- control
- business
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
技术领域 technical field
本发明涉及一种实现一体化安全服务的网络系统。 The invention relates to a network system for realizing integrated security service.
背景技术 Background technique
随着信息化社会的不断发展演进,人们的通信需求已从单一的话音或数据通信向交互式多媒体信息通信发展,网络系统从分别服务的独立系统向话音、视频和数据统一服务的一体化网络发展。近年来,IP技术得到了迅猛发展,以IP技术为核心构建一体化网络已得到业界的共识。然而,通用IP网络的安全性和QoS等问题制约了一体化网络的快速发展。 With the continuous development and evolution of the information society, people's communication needs have developed from a single voice or data communication to interactive multimedia information communication, and the network system has changed from an independent system with separate services to an integrated network with unified services for voice, video and data. develop. In recent years, IP technology has developed rapidly, and the construction of an integrated network with IP technology as the core has gained the consensus of the industry. However, issues such as security and QoS of common IP networks restrict the rapid development of integrated networks.
IP网络存在如下安全问题: IP network has the following security problems:
IP协议设计的初衷是遵循开放和平等的原则,在网络安全方面并没有做过多的考虑,使得现行的IP协议体系结构中存在许多安全隐患。这些安全问题主要来自对IP技术的设计、管理、规划和应用。就IP技术本身而言,存在下列问题影响网络安全: The original intention of the IP protocol design is to follow the principles of openness and equality, and has not given too much consideration to network security, resulting in many security risks in the current IP protocol architecture. These security issues mainly come from the design, management, planning and application of IP technology. As far as IP technology itself is concerned, there are the following problems that affect network security:
1) 网络对承载的管理信息、控制信令和业务数据同等对待,没有清晰的用户和网络接口界面,导致相互影响。网络的正常运行极容易受到用户行为的影响和干扰,甚至被用户控制。 1) The network treats the carried management information, control signaling, and service data equally, and there is no clear user and network interface, resulting in mutual influence. The normal operation of the network is easily affected and disturbed by user behavior, and even controlled by users.
2) 用户IP地址和网络IP地址没有区分。任何用户终端都可以将IP分组直接发送到网络中的任意设备。使用户终端对网络设备进行攻击成为可能。 2) There is no distinction between user IP address and network IP address. Any user terminal can directly send IP packets to any device in the network. It makes it possible for user terminals to attack network devices.
3) 用户自由接入网络,且缺乏有效的源地址检验。用户终端可以伪造源地址对网络发起流量冲击或欺骗攻击,而无法追查。 3) Users are free to access the network, and there is no effective source address verification. User terminals can forge source addresses to launch traffic impact or spoofing attacks on the network, but cannot be traced.
4) 用户业务缺少控制,无法监管,导致非法应用失控、泛滥。 4) The user business lacks control and cannot be supervised, resulting in the out-of-control and proliferation of illegal applications.
5) IP分组明文传输,信息极易被窃听、篡改、仿冒,IP头有完整的源、目的地址信息极易被非法利用、分析。 5) IP packets are transmitted in plain text, and the information is easily eavesdropped, tampered with, counterfeited, and the complete source and destination address information in the IP header is easily used and analyzed illegally.
在传统IP网络中,一般采用叠加各类安全保密设备提高网络和业务的安全性。比如网络隔离、防火墙、认证服务、入侵检测、漏洞扫描等安全设备,以及链路层、网络层和应用层等保密设备。这种通过叠加方式构建的安全防护体系在一定程度上提高了网络和业务的安全保密性能,但也存在一些问题: In traditional IP networks, various security and confidentiality devices are generally used to improve the security of the network and services. For example, security equipment such as network isolation, firewall, authentication service, intrusion detection, and vulnerability scanning, as well as security equipment such as link layer, network layer, and application layer. This kind of security protection system built by superimposition improves the security and confidentiality performance of the network and business to a certain extent, but there are also some problems:
网络性能受限:叠加的安全保密设备在网络中产生额外传输和管理开销,占用了部分带宽资源,增加了业务数据的转发时延,对通信性能影响较大;并且相对于网络交换设备,安全保密设备的分组转发率一般较低,缺乏相应的队列调度机制,使网络交换转发性能无法充分发挥,易产生通信瓶颈,业务的QoS难以得到保证。 Limited network performance: Superimposed security and confidentiality devices generate additional transmission and management overhead in the network, occupying part of bandwidth resources, increasing the forwarding delay of business data, and greatly affecting communication performance; and compared with network switching devices, security The packet forwarding rate of security devices is generally low, and the corresponding queue scheduling mechanism is lacking, so that the network switching and forwarding performance cannot be fully utilized, and communication bottlenecks are likely to occur, making it difficult to guarantee service QoS.
设备间难以协调工作:各安全保密设备在网络中独立工作,分别在不同层面提供相应的安全保密功能。由于缺乏一体化的安全体系结构,各设备间形成了安全缝隙。例如物理层与链路层的安全措施(如信道加密设备)无法解决网络层地址欺骗问题,网络层的安全措施(如防火墙)无法识别和过滤应用层的恶意数据,而应用层的安全措施则对针对底层基础设施的攻击无能为力。同时网络交换设备和安全保密设备间也缺乏必要联系,相互影响,不能协调工作。而通过外部线缆的互连接口也存在安全缝隙,给网络安全带来隐患。 It is difficult to coordinate work between devices: each security device works independently in the network, and provides corresponding security functions at different levels. Due to the lack of an integrated security architecture, security gaps are formed between devices. For example, security measures at the physical layer and link layer (such as channel encryption devices) cannot solve the problem of address spoofing at the network layer, and security measures at the network layer (such as firewalls) cannot identify and filter malicious data at the application layer, while security measures at the application layer cannot Powerless against attacks against the underlying infrastructure. At the same time, there is a lack of necessary connection between the network switching equipment and the security and confidentiality equipment, which affect each other and cannot coordinate their work. There are also security gaps in the interconnection interfaces through external cables, which brings hidden dangers to network security.
安全防护不全:各设备的安全防护措施或策略随功能定位不同,其完备性和复杂性各不相同,一方面造成部分安全功能重叠,降低了通信效能,另一方面各设备的安全策略不易保持协调一致,互斥或遗漏的策略易造成网络通信异常或产生安全漏洞。在传统IP协议体制下,安全防护措施难以有效融入到网络的各个层面,无法对业务通信的全过程进行安全监控。另外,设备间通信采用通用的网络协议,固有的安全问题依然存在,自身的安全防护能力较弱。 Incomplete security protection: The security protection measures or strategies of each device vary in completeness and complexity depending on the functional positioning. On the one hand, some security functions overlap and communication efficiency is reduced. On the other hand, the security policies of each device are not easy to maintain Coordinated, mutually exclusive or omitted policies can easily cause network communication anomalies or security vulnerabilities. Under the traditional IP protocol system, it is difficult to effectively integrate security protection measures into all levels of the network, and it is impossible to conduct security monitoring on the entire process of business communication. In addition, the communication between devices adopts a common network protocol, and inherent security problems still exist, and its own security protection capabilities are weak.
设备种类繁多、部署和管理方式各异、网络开通和使用维护困难:品种繁多、功能各异的安全保密设备不仅降低了网络运行的可靠性,而且消耗了大量的经费开支。安全保密设备需根据不同的应用环境进行相应的部署规划,而且各类设备的配置、状态管理,以及密钥管理和分发自成体系,策略配置和使用维护操作十分复杂,要求网络规划和管理维护人员具备较高的专业技能。面对应用业务的不断扩展和层出不穷的安全威胁,需要不断修订策略或设备升级,网络的持续发展和功能扩展受到限制。 Various types of equipment, different deployment and management methods, difficulties in network opening, use and maintenance: various types of security equipment with different functions not only reduce the reliability of network operation, but also consume a lot of funds. Security and confidentiality devices need to be deployed and planned according to different application environments, and the configuration, status management, and key management and distribution of various devices form a self-contained system. The policy configuration, use and maintenance operations are very complicated, requiring network planning, management and maintenance. Personnel with high professional skills. Faced with the continuous expansion of application services and endless security threats, it is necessary to constantly revise policies or upgrade equipment, and the continuous development and function expansion of the network are limited.
NGN/IMS架构可提供多业务应用及灵活便捷的应用扩展,已成为固定和移动网络融合演进的基础。NGN/IMS架构采用业务、控制、承载完全分离的水平架构,具有集中的用户属性和接入无关等特性,支持用户移动性,提供灵活的IP多媒体业务和标准开放的业务接口。但是,目前该架构体系中仍存在一些待解决的问题: The NGN/IMS architecture can provide multi-service applications and flexible and convenient application expansion, and has become the basis for the convergence and evolution of fixed and mobile networks. The NGN/IMS architecture adopts a horizontal architecture that completely separates service, control, and bearer. It has the characteristics of centralized user attributes and access-independence, supports user mobility, and provides flexible IP multimedia services and standard open service interfaces. However, there are still some unresolved problems in the current architecture system:
1) 承载层的QoS问题:对IP QoS技术本身而言,InterServ和DiffServ服务模型在不同层面为QoS提供了技术支撑。随着MPLS技术的发展和应用,为彻底解决IP QoS问题提供了有效途径。然而,目前IP网络仍以数据业务为主,由于规模庞大,体制各异,标准不一,各项QoS技术在IP网络中难以有效实施,发挥不出其设计性能,因此话音、视频等实时业务始终得不到令人满意的QoS性能。另外,NGN控制层对承载层缺乏必要的、统一的控制,使不同承载网为业务提供的QoS不一致。 1) QoS issues at the bearer layer: For IP QoS technology itself, InterServ and DiffServ service models provide technical support for QoS at different levels. With the development and application of MPLS technology, it provides an effective way to completely solve the problem of IP QoS. However, the current IP network is still dominated by data services. Due to the large scale, different systems, and different standards, it is difficult to effectively implement various QoS technologies in the IP network, and cannot exert its designed performance. Therefore, real-time services such as voice and video Satisfactory QoS performance cannot be obtained all the time. In addition, the NGN control layer lacks necessary and unified control over the bearer layer, which makes the QoS provided by different bearer networks inconsistent.
2) 安全性问题:NGN主要以IP网络作为承载网,存在IP网络固有的安全性问题,特别是控制层的安全对通信业务的影响较大。在目前NGN架构中涉及的安全措施是远远不够的,需要从体制上解决控制层安全性问题。 2) Security issues: NGN mainly uses the IP network as the bearer network, and there are inherent security issues in the IP network, especially the security of the control layer has a greater impact on communication services. The security measures involved in the current NGN architecture are far from enough, and it is necessary to solve the security problem of the control layer from the system.
3) 端到端的连接问题:多种业务的融合使不同终端接入到网络中。由于终端标识在网络中的标识存在差异,比如电话终端使用电话号码、计算机终端使用IP地址,甚至部分终端使用用户编号作为标识,不同终端间如何建立会话,实现互联互通成为首先需要解决的问题。而用户网与公网边缘的NAT以及用户移动使端到端的连接变得更为复杂。因此需要统一的会话连接控制机制实现端到端的连接,并通过统一的转换机制实现终端标识与网络地址的映射,从而完成路由寻址。 3) End-to-end connection problem: The integration of multiple services enables different terminals to access the network. Due to differences in terminal identification in the network, for example, telephone terminals use phone numbers, computer terminals use IP addresses, and even some terminals use user numbers as identifications. How to establish sessions and realize interconnection between different terminals has become the first problem that needs to be solved. The NAT at the edge of the user network and the public network and user mobility make the end-to-end connection more complicated. Therefore, a unified session connection control mechanism is required to realize end-to-end connection, and a unified conversion mechanism is used to realize the mapping between the terminal identifier and the network address, so as to complete the routing addressing.
4) 网络互联互通问题:由于NGN技术本身在不断发展,协议本身也需要根据业务需求不断完善和补充。目前相同或类似功能的协议还未能统一,协议间的兼容性使网络的互联互通还存在缺陷。 4) Network interconnection and interoperability issues: As NGN technology itself is constantly developing, the protocol itself also needs to be continuously improved and supplemented according to business needs. At present, the protocols with the same or similar functions have not yet been unified, and the compatibility between the protocols makes the interconnection and intercommunication of the network still have defects.
5) 网络和业务的管理问题:随着业务和用户量的增多,网络管理变得越来越复杂,除性能、配置、故障和计费管理外,还应具备统一的网络安全和QoS等管理机制。而对用户的业务带宽、业务QoS、业务功能、业务安全等级等管理也需要加强。 5) Network and business management issues: With the increase of business and user volume, network management becomes more and more complex. In addition to performance, configuration, fault and billing management, it should also have unified network security and QoS management mechanism. The management of user's service bandwidth, service QoS, service function, and service security level also needs to be strengthened.
发明内容 Contents of the invention
为了克服现有技术的上述缺点,本发明提供了一种实现一体化安全服务的网络系统,通过网络安全和网络服务一体化设计,构建安全和QoS有保证的、可承载多业务的网络平台。 In order to overcome the above-mentioned shortcomings of the prior art, the present invention provides a network system that realizes integrated security services. Through the integrated design of network security and network services, a network platform that can carry multiple services with guaranteed security and QoS is constructed.
本发明的技术方案是:一种实现一体化安全服务的网络系统,包括信息分类隔离体系、综合业务服务体系、服务质量保证体系、综合安全防护体系和综合网络管理体系; The technical solution of the present invention is: a network system for realizing integrated security services, including an information classification and isolation system, an integrated business service system, a service quality assurance system, an integrated security protection system, and an integrated network management system;
所述信息分类隔离体系:为网络中的各类信息提供独立的路由交换;在用户接入、路由交换、中继传输、QoS保证、安全保密的各个环节对业务数据、信令消息和网管信息进行分类处理,实现业务、控制和管理信息在网络中的分类隔离;分类隔离的信息数据在网络中具有独立的带宽资源,以及独立的路由交换和QoS保证措施;在终端与交换节点间以及交换节点间具有相对独立的传输通道; The information classification and isolation system: provide independent routing and switching for various types of information in the network; in each link of user access, routing and switching, relay transmission, QoS guarantee, and security Carry out classification processing to realize the classification and isolation of business, control and management information in the network; the classified and isolated information data has independent bandwidth resources in the network, as well as independent routing and switching and QoS guarantee measures; between terminals and switching nodes and switching There are relatively independent transmission channels between nodes;
所述综合业务服务体系:采用安全会话连接协议,实现业务准入控制功能、实现业务传输通路建立控制功能、名址关系映射功能、密钥分发承载功能、QoS接纳控制功能和安全防护功能; The integrated business service system: adopts the secure session connection protocol to realize the business access control function, the business transmission path establishment control function, the name address relationship mapping function, the key distribution bearer function, the QoS admission control function and the security protection function;
所述服务质量保证体系:提供端到端有连接的服务;对业务、控制和管理层面的数据进行区分服务;对网络中的数据流进行流量监管;通过QoS路由动态地发现满足服务质量需求的最优路径,实现流量工程;通过QoS接纳控制对业务的会话连接进行接纳控制; The service quality guarantee system: provide end-to-end connected services; provide differentiated services for data at the business, control and management levels; monitor the flow of data in the network; dynamically discover services that meet quality of service requirements through QoS routing The optimal path realizes traffic engineering; through QoS admission control, admission control is performed on the session connection of the business;
所述综合安全防护体系:包括信息分类隔离、网络边界防护、应用业务准入控制和数据加密保护措施的采用,所述信息分类隔离是指对网络的用户端口、网络中继端口、管理端口的属性进行区分,使用户终端从用户端口接入,其信令消息和管理信息只能转发给接入节点的连接控制器和网管代理,业务数据只能在业务层面进行交换转发;网络交换设备对业务、控制和管理数据进行独立的路由交换,中继线路为业务、控制和管理数据分别建立独立的传输通道,各通道间互不干扰;所述网络边界防护是指通过用户安全接入协议,对用户终端的接入进行合法性鉴别,用户业务数据的传输链路在控制层的连接控制下实时建立,业务结束后拆除;所述应用业务准入控制是指在会话连接过程中,控制层的连接控制对信令进行真实性验证,在会话连接控制下为业务数据建立端到端的传输通路; The comprehensive security protection system: including the adoption of information classification and isolation, network border protection, application service access control and data encryption protection measures, the information classification and isolation refers to the protection of network user ports, network relay ports, and management ports. attributes, so that user terminals access from user ports, their signaling messages and management information can only be forwarded to the connection controller and network management agent of the access node, and service data can only be exchanged and forwarded at the service level; The business, control and management data are routed and exchanged independently, and the trunk line establishes independent transmission channels for the business, control and management data, and the channels do not interfere with each other; the network boundary protection refers to the user security access protocol. The access of the user terminal is authenticated legally, the transmission link of the user service data is established in real time under the connection control of the control layer, and is removed after the service ends; the application service access control refers to that during the session connection process, the The connection control verifies the authenticity of the signaling, and establishes an end-to-end transmission path for business data under the session connection control;
所述综合网络管理体系:采用分级管理、逐级汇总、集中控制的管理方式,实现分区分权管理。 The integrated network management system: adopts management methods of hierarchical management, level-by-level summary, and centralized control to realize divisional and decentralized management.
与现有技术相比,本发明的积极效果是:本发明通过网络安全和网络服务一体化设计,构建安全可信及多元化服务的网络平台。 Compared with the prior art, the positive effect of the present invention is that the present invention builds a safe, credible and diversified service network platform through the integrated design of network security and network services.
一体化网络安全是将安全防护措施融入到网络通信的各个层面,相互配合,相互支撑,确保安全性能和通信效能。一体化网络安全主要体现在:信息的分类隔离将业务、控制和管理等信息相互隔离,各类信息在网络中具有独立的路由交换、传输带宽、QoS保障和安全防护措施,可有效保证网络系统自身的安全;用户的安全接入对终端设备进行接入认证,实现名址转换,对业务数据进行完整性和抗重放等安全防护,可有效提高网络边界的安全防护能力;节点的安全互连对互连节点的合法性进行认证,对节点间的数据进行完整性和抗重放等安全防护,可有效阻止非法节点接入网络;业务的准入控制对用户身份和权限进行认证,并在网络入口对业务的会话连接、类型、流量等进行控制,可有效阻止非法数据进入网络。 Integrated network security is to integrate security protection measures into all levels of network communication, cooperate with each other, and support each other to ensure security performance and communication efficiency. Integrated network security is mainly reflected in: the classification and isolation of information isolates information such as business, control and management from each other, and all kinds of information have independent routing and exchange, transmission bandwidth, QoS guarantee and security protection measures in the network, which can effectively ensure the security of the network system. Its own security; the user's secure access performs access authentication on terminal equipment, realizes name-address conversion, and implements security protection such as integrity and anti-replay of business data, which can effectively improve the security protection capability of the network border; the secure interaction of nodes The network authenticates the legitimacy of interconnected nodes, and implements security protection such as integrity and anti-replay for data between nodes, which can effectively prevent illegal nodes from accessing the network; business access control authenticates user identities and permissions, and Control the session connection, type, flow, etc. of the business at the network entrance, which can effectively prevent illegal data from entering the network.
一体化网络服务支持话音、视频和数据等综合业务,保证各类业务的QoS。在统一的业务会话控制下,网络提供三种承载服务:有连接、有QoS保证的服务,适用于实时业务;有连接的服务,适用于即时通信及P2P等业务;尽力而为的服务,适用于一般数据业务;通过信息分类隔离,网络可为各类业务提供相对独立的网络环境,业务间相互隔离,并针对各类数据的特点提供相应的QoS保障;业务会话控制分配名址映射关系,与网络路由交换相配合实现名址分离,一方面提高了网络和业务的安全性能,另一方面可支持移动和组播等应用。 The integrated network service supports comprehensive services such as voice, video and data, and guarantees the QoS of various services. Under unified business session control, the network provides three bearer services: services with connections and QoS guarantees, applicable to real-time services; services with connections, applicable to instant messaging and P2P services; best-effort services, applicable For general data services; through information classification and isolation, the network can provide a relatively independent network environment for various services, the services are isolated from each other, and provide corresponding QoS guarantees according to the characteristics of various data; business session control assigns name and address mapping relationships, Cooperating with network routing and switching to realize name and address separation, on the one hand, it improves the security performance of the network and services, and on the other hand, it can support applications such as mobile and multicast.
具体实施方式 Detailed ways
本说明书中公开的所有特征,或公开的所有方法或过程中的步骤,除了互相排斥的特征和/或步骤以外,均可以以任何方式组合。 All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and/or steps.
本说明书(包括任何附加权利要求、摘要和附图)中公开的任一特征,除非特别叙述,均可被其他等效或具有类似目的的替代特征加以替换。即,除非特别叙述,每个特征只是一系列等效或类似特征中的一个例子而已。 Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.
一种一体化网络的安全服务系统,应满足用户对应用业务和安全保密的需求,保证通信业务的服务质量,确保网络系统的安全保密性能。包括:分类隔离网络、综合业务服务、服务质量保证、综合安全防护和综合网络管理五个基本技术体系。分类隔离网络技术体系为业务、控制和管理等信息提供相对独立的路由交换和传输服务;综合业务服务技术体系实现业务的会话连接控制,提供多种应用服务,同时具备应用业务的扩展能力;服务质量保证体系通过综合运用多种措施为话音、视频等实时业务提供良好的通信质量保障,提高系统整体的服务性能;综合安全防护技术体系融入到业务、网络和管理的各个层面,各项安全防护措施相互关联、协调一致,确保业务和网络的安全;综合网络管理技术体系负责对网络、设备和业务实施全面、统一、有效的管理。 An integrated network security service system should meet the user's requirements for application services and security, ensure the service quality of communication services, and ensure the security and security performance of the network system. Including: five basic technical systems of classified and isolated networks, comprehensive business services, service quality assurance, comprehensive security protection and comprehensive network management. The classified and isolated network technology system provides relatively independent routing switching and transmission services for information such as business, control and management; the comprehensive business service technology system realizes business session connection control, provides multiple application services, and has the ability to expand application business; The quality assurance system provides good communication quality assurance for real-time services such as voice and video through the comprehensive use of various measures, and improves the overall service performance of the system; the comprehensive security protection technology system is integrated into all levels of business, network and management, and various security protection The measures are interrelated and coordinated to ensure the security of business and network; the comprehensive network management technology system is responsible for implementing comprehensive, unified and effective management of network, equipment and business.
1)分类隔离网络技术体系 1) Classification and isolation network technology system
结合IP和MPLS的技术优势,实现大容量、高带宽的分组路由交换,以支撑话音、视频和数据等综合业务;同时,为保证网络安全和服务质量,系统在用户接入、路由交换、中继传输、QoS保证、安全保密等各个环节对业务数据、信令消息和网管信息进行分类处理,实现业务、控制和管理信息在网络中的分类隔离;分类隔离的信息数据在网络中具有独立的带宽资源,以及独立的路由交换和QoS保证措施;在终端与交换节点间以及交换节点间具有独立的传输通道,各类数据各行其道,互不干扰;为不同的业务系统构建相对独立的网络环境,在统一的网络基础平台上,业务层面可进一步划分为多个业务子层,构成多个不同规模和拓扑结构的独立子网。子网间的应用业务可以是独立的,互不影响,也可以在受控条件下互通。比如,实时业务子网承载话音、视频等实时业务;数据业务子网A承载点到点计算机通信业务;数据业务子网B承载Web浏览业务等。系统为各子网建立独立的传输通道,分配独立的地址和带宽资源,进行独立的路由交换和QoS保证。 Combining the technical advantages of IP and MPLS, it realizes large-capacity, high-bandwidth packet routing and switching to support integrated services such as voice, video and data; at the same time, in order to ensure network security and service quality, the system After transmission, QoS guarantee, security and confidentiality, etc., the business data, signaling messages and network management information are classified and processed to realize the classification and isolation of business, control and management information in the network; the classified and isolated information data has an independent Bandwidth resources, and independent routing switching and QoS guarantee measures; there are independent transmission channels between terminals and switching nodes and between switching nodes, all kinds of data go their own way without interfering with each other; build relatively independent networks for different business systems environment, on a unified network infrastructure platform, the business level can be further divided into multiple business sub-layers to form multiple independent sub-networks of different scales and topological structures. Application services between subnets can be independent without affecting each other, or can communicate with each other under controlled conditions. For example, the real-time service subnet carries real-time services such as voice and video; the data service subnet A carries point-to-point computer communication services; the data service subnet B carries Web browsing services, etc. The system establishes independent transmission channels for each subnet, allocates independent addresses and bandwidth resources, and performs independent routing switching and QoS guarantees.
2)综合业务服务技术体系 2) Comprehensive business service technology system
参考NGN架构模型,遵循业务、控制与承载相互分离的设计思想,提供话音、视频和数据等业务的综合服务能力,支持移动接入和组播业务: Refer to the NGN architecture model, follow the design concept of separation of services, control and bearer, provide comprehensive service capabilities for voice, video and data services, and support mobile access and multicast services:
控制层主要完成会话连接控制,实现基本的电话呼叫和会话连接功能;业务层主要提供业务、认证、策略、数据库等服务;传送层的接入子层主要实现多媒体终端、计算机局域网、宽带拨号、宽带无线等宽带用户的接入,以及电话网、移动网的接入;传送层的承载子层为信令和业务提供独立的承载服务;综合业务服务技术体系使业务独立于网络,为未来快速、灵活、有效地提供新业务创造有利环境。 The control layer mainly completes session connection control and realizes basic telephone call and session connection functions; the business layer mainly provides services such as business, authentication, policy, and database; the access sublayer of the transport layer mainly realizes multimedia terminals, computer local area networks, broadband dial-up, Access to broadband wireless and other broadband users, as well as access to telephone networks and mobile networks; the bearer sublayer of the transport layer provides independent bearer services for signaling and services; , Flexible and effective provision of new services to create a favorable environment.
连接控制是综合业务服务体系的核心功能,主要完成以下功能: Connection control is the core function of the comprehensive business service system, which mainly completes the following functions:
会话连接控制功能:完成基本的和增强的会话连接流程。 Session connection control function: complete the basic and enhanced session connection process.
号码或地址解析功能:完成对用户呼叫的电话号码或其它地址信息的解析,根据号码进行路由分析,查找被叫节点或重定向。 Number or address analysis function: complete the analysis of the phone number or other address information called by the user, perform routing analysis based on the number, find the called node or redirect.
互通功能:通过信令网关完成对现有网络的信令或协议的转换和流程控制。 Interworking function: through the signaling gateway to complete the conversion and process control of the existing network signaling or protocol.
媒体网关控制:负责完成对媒体网关的链路状态、时隙资源和复分接功能等控制,对终端接入媒体网关的用户信令和业务的收发控制。 Media gateway control: responsible for controlling the link status, time slot resources, and multiplexing functions of the media gateway, and controlling the sending and receiving of user signaling and services for terminals accessing the media gateway.
协议(信令)适配功能:负责对现有网络协议进行适配和传送。 Protocol (signaling) adaptation function: responsible for adapting and transmitting existing network protocols.
业务管理:完成对业务状态的记录,包括用户号码或地址、通信时间、失败原因等,向网管系统提供业务管理的相关数据。 Business management: Complete the record of business status, including user number or address, communication time, failure reason, etc., and provide relevant data of business management to the network management system.
一体化网络安全服务架构对各类业务进行统一的会话连接控制。在分组网络中,呼叫控制一般采用SIP协议实现。SIP协议简单灵活,扩展性强,具备终端检测能力、在线检测、支持移动性、组播等能力,被指定为第三代网络的控制协议,应用已十分广泛。为实现网络安全和网络服务一体化,系统借鉴SIP协议的基本设计思想和流程,并结合控制层功能扩展的要求,对SIP协议进行优化和补充,融入安全性设计,形成专用的安全会话连接协议(简称:SCLP协议),具体内容包括: The integrated network security service architecture implements unified session connection control for various services. In a packet network, call control is generally implemented using the SIP protocol. The SIP protocol is simple and flexible, has strong scalability, and has the capabilities of terminal detection, online detection, support for mobility, and multicast. It has been designated as the control protocol of the third-generation network and has been widely used. In order to realize the integration of network security and network services, the system learns from the basic design idea and process of the SIP protocol, and combines the requirements of the function expansion of the control layer to optimize and supplement the SIP protocol, integrate it into the security design, and form a dedicated secure session connection protocol (abbreviation: SCLP agreement), the specific contents include:
(1)业务准入控制功能:会话控制对通信双方进行合法性认证,控制网络入口为该业务开启或关闭传输通道和路由交换服务。 (1) Service access control function: Session control conducts legal authentication for both communication parties, and controls the network entrance to open or close the transmission channel and routing switching service for the service.
(2)业务传输通路建立控制功能:会话控制向网络申请建立承载业务数据的传输通路。根据业务的QoS需求,主要包括三种基本类型的路径:有连接和QoS保证的路径,适用于实时业务;有连接、无QoS保证的路径,适用于即时通信及P2P等业务;无连接、尽力而为的路径,适用于一般数据业务。另外,根据业务对QoS需求还可为业务申请建立最小时延、最大带宽或最小开销等QoS特性的传输通路。 (2) Service transmission path establishment control function: session control applies to the network for establishment of a transmission path carrying service data. According to the QoS requirements of services, there are three basic types of paths: paths with connections and QoS guarantees, suitable for real-time services; paths with connections and no QoS guarantees, suitable for instant messaging and P2P services; connectionless, best-effort The path for is applicable to general data services. In addition, according to the QoS requirements of the business, a transmission path with QoS characteristics such as minimum delay, maximum bandwidth, or minimum overhead can be established for service applications.
(3)名址关系映射功能:会话连接过程中,确定终端标识、用户标识和业务标识与网络地址的映射关系,并提供给用户端口进行名址转换,实现名址分离。在每次会话连接时可为用户端口自动分配网络地址用于路由寻址,在业务结束后失效。 (3) Name-address relationship mapping function: during the session connection process, determine the mapping relationship between terminal ID, user ID, service ID and network address, and provide it to the user port for name-address conversion to realize name-address separation. The network address can be automatically assigned to the user port for routing addressing when each session is connected, and it will be invalid after the end of the service.
(4)密钥分发承载功能:会话控制信令中可携带相关密钥分发协议数据,在会话建立过程中完成密钥分发,以降低保密业务的会话建立时间,提高密钥分发效率和安全性。 (4) Key distribution bearer function: relevant key distribution protocol data can be carried in the session control signaling, and the key distribution is completed during the session establishment process, so as to reduce the session establishment time of confidential services and improve the key distribution efficiency and security .
(5) QoS接纳控制功能:根据当前的网络资源情况和业务的QoS需求实现业务的接纳。执行相关QoS策略,比如高优先级用户的资源抢占等。 (5) QoS admission control function: According to the current network resource situation and the QoS requirements of the service, the service admission is realized. Execute relevant QoS policies, such as resource preemption for high-priority users.
(6)安全防护功能:完成呼叫连接协议报文的合法性鉴别,确保控制层的安全。 (6) Security protection function: Complete the legality identification of the call connection protocol message to ensure the security of the control layer.
3)服务质量保证技术体系 3) Service quality assurance technical system
在一体化网络安全服务架构下,通过信息分类隔离,网络将不同业务承载在相互独立的交换传输通道上。根据业务QoS需求,各通道上可综合运用多种QoS技术提供有效的服务质量保障;并通过统一部署的QoS策略,使各项服务质量保障措施相互配合、有效运行。 Under the integrated network security service architecture, through information classification and isolation, the network carries different services on mutually independent exchange transmission channels. According to the business QoS requirements, various QoS technologies can be comprehensively used on each channel to provide effective service quality assurance; and through the unified deployment of QoS policies, various service quality assurance measures can cooperate with each other and operate effectively.
端到端有连接的服务是保障实时业务QoS的基本条件。系统为通信双方建立端到端有连接的、有质量保证的传输通道。业务数据流在该路径上进行数据交换和传输,从而保证业务数据流以相对稳定的传输特性按序到达。 End-to-end connected services are the basic conditions for guaranteeing real-time business QoS. The system establishes an end-to-end connected and quality-guaranteed transmission channel for both parties in communication. The business data flow is exchanged and transmitted on this path, so as to ensure that the business data flow arrives in order with relatively stable transmission characteristics.
分类区分服务是对业务、控制和管理层面的数据分别进行相应的区分服务。每个层面可根据消息类别、数据类型和优先级等数据特性进行各自的区分服务。通过相应的队列调度算法,使各类数据流按先期约定占用系统资源。 Classified differentiated service is to provide corresponding differentiated services for data at the business, control and management levels. Each layer can provide its own differentiated services according to data characteristics such as message category, data type, and priority. Through the corresponding queue scheduling algorithm, various data flows occupy system resources according to the prior agreement.
为保证网络实际承载的数据流量符合事先约定的资源分配,避免异常流量强占网络资源,系统对网络中的数据流进行流量监视和限制。流量监管通过配置策略对过载流量进行丢弃,保证话音、视频等高优先级的业务数据流得到正常转发处理。 In order to ensure that the data traffic actually carried by the network conforms to the resource allocation agreed in advance, and to prevent abnormal traffic from occupying network resources, the system monitors and restricts the data traffic in the network. Traffic policing discards overloaded traffic by configuring policies to ensure that high-priority service data streams such as voice and video are forwarded and processed normally.
QoS路由是实现业务服务质量保证,提高网络整体服务性能的重要条件。QoS路由根据网络资源的使用情况,动态地发现满足服务质量需求的最优路径。QoS路由为流量工程提供路由基础,实现业务流量在网络中合理分布,从而降低网络拥塞概率,增强网络吞吐性能,提高网络资源的利用率。 QoS routing is an important condition for realizing business service quality assurance and improving overall network service performance. QoS routing dynamically discovers the optimal path that meets the quality of service requirements according to the usage of network resources. QoS routing provides the routing foundation for traffic engineering, and realizes the reasonable distribution of service traffic in the network, thereby reducing the probability of network congestion, enhancing network throughput performance, and improving the utilization rate of network resources.
资源统计分配是通过QoS测量与统计实现对系统资源合理有效的控制与利用。QoS测量与统计的对象包括流量、误码率、丢包率和异常报文等。根据测量与统计结果生成各类QoS参数,实现对系统资源的控制。 Resource statistics allocation is to realize reasonable and effective control and utilization of system resources through QoS measurement and statistics. Objects of QoS measurement and statistics include traffic, bit error rate, packet loss rate, and abnormal packets. Generate various QoS parameters according to the measurement and statistical results to realize the control of system resources.
QoS接纳控制是根据网络当前资源情况和业务的QoS需求,对业务的会话连接进行接纳控制,避免超过承载能力的业务流量进入网络。系统主要着力于综合运用各种技术,通过统一设计和统一管理,将QoS技术转变为一种端到端的业务传输平台,以满足对业务服务质量的要求。 QoS admission control is to control the admission of service session connections according to the current network resource situation and service QoS requirements, so as to prevent service traffic exceeding the carrying capacity from entering the network. The system mainly focuses on the comprehensive use of various technologies, and through unified design and unified management, transforms QoS technology into an end-to-end business transmission platform to meet the requirements for business service quality.
4)综合安全防护技术体系 4) Comprehensive security protection technology system
一体化网络安全服务架构立足于从系统体制上解决网络安全问题。安全保密的各项措施有效融入到网络中各个设备和各个层面中,相互之间紧密配合,以增强安全防护性能,提高网络资源利用率,保证业务服务质量,实现统一的控制和管理。综合安全防护体系主要包含信息分类隔离、网络边界防护、应用业务准入控制和数据加密保护等方面: The integrated network security service architecture is based on solving network security problems from a systemic perspective. Various security and confidentiality measures are effectively integrated into each device and each layer in the network, and cooperate closely with each other to enhance security protection performance, improve network resource utilization, ensure business service quality, and achieve unified control and management. The comprehensive security protection system mainly includes information classification and isolation, network boundary protection, application business access control and data encryption protection, etc.:
(1)信息分类隔离 (1) Information classification and isolation
网络的用户端口、网络中继端口、管理端口的属性严格区分。用户终端从用户端口接入,其信令消息和管理信息只能转发给接入节点的连接控制器和网管代理,而业务数据只能在业务层面进行交换转发。用户终端不能访问网络中的其它层面的设备或地址。网络交换设备对业务、控制和管理等数据进行独立的路由交换,互不影响。中继线路上为业务、控制和管理数据分别建立独立的传输通道,每个通道具有独立的带宽资源,通道间相互隔离。 The properties of network user ports, network relay ports, and management ports are strictly distinguished. When a user terminal accesses through a user port, its signaling messages and management information can only be forwarded to the connection controller and network management agent of the access node, while service data can only be exchanged and forwarded at the service level. User terminals cannot access devices or addresses at other levels in the network. Network switching equipment performs independent routing and switching of data such as business, control, and management without affecting each other. Separate transmission channels are established for service, control and management data on the trunk line, each channel has independent bandwidth resources, and the channels are isolated from each other.
(2)网络边界防护 (2) Network border protection
网络边界是系统安全防护体系设计的重点,将通过用户安全接入协议(简称:USAP协议)实现。USAP协议负责对用户终端的接入进行合法性鉴别,杜绝非法终端接入。鉴别过程周期性维护。 The network boundary is the focus of the system security protection system design, which will be realized through the User Security Access Protocol (abbreviation: USAP protocol). The USAP protocol is responsible for legality identification of user terminal access to prevent illegal terminal access. Periodic maintenance of the identification process.
USAP协议对用户线路上的业务、信令和管理数据传输链路进行隔离,并与网络中继线路上的传输通道对应。用户业务数据的传输链路在控制层的连接控制下实时建立,业务结束后拆除。用户线路上经USAP协议封装承载的数据具备完整性和抗重放的安全防护能力,可防止从用户线路上插入攻击报文。 The USAP protocol isolates the service, signaling, and management data transmission links on the user line, and corresponds to the transmission channel on the network trunk line. The transmission link of user service data is established in real time under the connection control of the control layer, and is removed after the service ends. The data encapsulated and carried by the USAP protocol on the user line has integrity and anti-replay security protection capabilities, which can prevent the insertion of attack packets from the user line.
通过USAP协议可实现终端标识与网络地址分离。用户终端在网络中的地址(即交换设备用户端口的路由地址)只呈现在网络内部,在每次通信时由网络自动分配。USAP建立并维护此次业务与终端标识、网络地址的绑定关系,交换设备负责根据该绑定关系完成终端标识与网络地址的转换。由于网络对用户透明,网络边界的安全得到了有效保证。 The separation of terminal identification and network address can be realized through the USAP protocol. The address of the user terminal in the network (that is, the routing address of the user port of the switching device) only appears inside the network and is automatically assigned by the network every time it communicates. The USAP establishes and maintains the binding relationship between the service and the terminal identifier and network address, and the switching device is responsible for completing the conversion between the terminal identifier and the network address according to the binding relationship. Since the network is transparent to users, the security of the network boundary is effectively guaranteed.
网络节点间的安全将通过节点安全互连协议(简称:NSIP协议)实现。节点间互连必须经过合法性鉴别,杜绝非法节点接入。同时,中继干线上经NSIP协议封装承载的数据具备完整性和抗重放的安全防护能力。 The security between network nodes will be realized through the Node Security Interconnection Protocol (abbreviation: NSIP protocol). The interconnection between nodes must be legally authenticated to prevent illegal node access. At the same time, the data encapsulated and carried by the NSIP protocol on the trunk line has integrity and anti-replay security protection capabilities.
(3)应用业务准入控制 (3) Application business access control
应用业务受会话连接的控制,对未完成呼叫连接的业务数据,网络拒绝承载。在会话连接过程中,控制层的连接控制对信令进行真实性验证,防止非法终端或节点的信令攻击。为保证业务安全,系统在会话连接控制下为业务数据建立端到端的传输通路,在网络中的路径可由源节点根据链路的QoS特性选择,也可通过网管配置指定路由或策略路由。用户的业务数据在该传输通路上进行传输和交换转发,拒绝传输通路外的数据进入。 Application services are controlled by session connections, and the network refuses to bear the service data of incomplete call connections. During the session connection process, the connection control of the control layer verifies the authenticity of the signaling to prevent signaling attacks from illegal terminals or nodes. In order to ensure business security, the system establishes an end-to-end transmission path for business data under the control of session connections. The path in the network can be selected by the source node according to the QoS characteristics of the link, or specified routing or policy routing can be configured through the network management. The user's business data is transmitted, exchanged and forwarded on the transmission path, and the data outside the transmission path is refused to enter.
(4)数据加密保护 (4) Data encryption protection
业务数据和系统信息加密保护是确保业务和网络安全的重要手段。对用户业务数据实施端到端的全程加密,在网络传输过程中密码不落地,确保通信业务的机密性。对中继干线上的所有数据加密保护,不仅对业务数据进行了二次加密保护,增强了业务的保密强度,而且对节点间信令和网络协议消息进行了加密保护,增强了网络系统的安全防护能力。 Encryption protection of business data and system information is an important means to ensure business and network security. End-to-end full encryption is implemented for user business data, and passwords are not dropped during network transmission to ensure the confidentiality of communication services. Encryption and protection of all data on the trunk line not only performs secondary encryption protection on business data to enhance the confidentiality of services, but also encrypts and protects inter-node signaling and network protocol messages to enhance the security of the network system protective ability.
5)综合网络管理技术体系 5) Comprehensive network management technology system
网络管理系统实现对网络、设备、业务和用户的统一管理,采用分级管理、逐级汇总、集中控制的管理方式,实现分区分权管理。网络管理系统包括网络资源管理、应用业务管理、用户属性管理等子系统,提供配置管理、故障管理、性能管理、拓扑管理、业务管理、安全管理和QoS管理等管理功能。 The network management system realizes the unified management of the network, equipment, business and users, and adopts the management method of hierarchical management, level-by-level summary, and centralized control to realize zoning and decentralization management. The network management system includes subsystems such as network resource management, application service management, and user attribute management, and provides management functions such as configuration management, fault management, performance management, topology management, service management, security management, and QoS management.
本发明并不局限于前述的具体实施方式。本发明扩展到任何在本说明书中披露的新特征或任何新的组合,以及披露的任一新的方法或过程的步骤或任何新的组合。 The present invention is not limited to the foregoing specific embodiments. The present invention extends to any new feature or any new combination disclosed in this specification, and any new method or process step or any new combination disclosed.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010125028XA CN101771619B (en) | 2010-03-16 | 2010-03-16 | Network system for realizing integrated security services |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010125028XA CN101771619B (en) | 2010-03-16 | 2010-03-16 | Network system for realizing integrated security services |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101771619A CN101771619A (en) | 2010-07-07 |
CN101771619B true CN101771619B (en) | 2012-07-04 |
Family
ID=42504229
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010125028XA Active CN101771619B (en) | 2010-03-16 | 2010-03-16 | Network system for realizing integrated security services |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101771619B (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102164092B (en) * | 2011-05-23 | 2013-12-18 | 北京交通大学 | Method and system for guaranteeing service quality of integrated identification network |
CN102724175B (en) * | 2011-08-26 | 2015-09-09 | 北京天地互连信息技术有限公司 | The telecommunication safety management framework of ubiquitous green community net control and method |
CN103428028B (en) * | 2013-07-31 | 2016-10-26 | 邦彦技术股份有限公司 | Service quality maintenance method and system for heterogeneous network |
CN103491641B (en) * | 2013-09-05 | 2016-09-14 | 北京创毅讯联科技股份有限公司 | Method and the Intranet of speech business is realized in Long Term Evolution enterprise network |
CN105471611A (en) * | 2014-09-05 | 2016-04-06 | 中兴通讯股份有限公司 | Processing method, device and system for providing user service |
CN106789533A (en) * | 2016-12-27 | 2017-05-31 | 福建三元达网络技术有限公司 | Method and its system that service channel with management passage separate |
CN108234677B (en) * | 2018-03-09 | 2021-04-27 | 高飞 | Block chain network node service device facing multi-block chain platform |
CN109639735B (en) * | 2019-01-24 | 2021-12-17 | 重庆邮电大学 | Method for testing safety level of IPv6 industrial wireless network |
US11240014B1 (en) | 2019-09-10 | 2022-02-01 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11477016B1 (en) | 2019-09-10 | 2022-10-18 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11626983B1 (en) | 2019-09-10 | 2023-04-11 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11322050B1 (en) | 2020-01-30 | 2022-05-03 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11838410B1 (en) | 2020-01-30 | 2023-12-05 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11449799B1 (en) * | 2020-01-30 | 2022-09-20 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11533175B1 (en) | 2020-01-30 | 2022-12-20 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography on a smartcard |
CN114967504B (en) * | 2022-07-07 | 2023-02-17 | 广东长天思源环保科技股份有限公司 | Environment monitoring operation and maintenance platform based on identification analysis |
US12200116B1 (en) | 2022-11-18 | 2025-01-14 | Wells Fargo Bank, N.A. | Systems and methods for measuring one or more metrics of a cryptographic algorithm in a post-quantum cryptography system |
CN116232979B (en) * | 2022-12-21 | 2024-05-28 | 北京竞业达数字系统科技有限公司 | Optimal path streaming method under multi-level multi-fork tree-shaped complex media networking structure |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101212464B (en) * | 2006-12-28 | 2011-09-07 | 北京交通大学 | Method for implementing general-purpose services in integrated network |
CN101640825A (en) * | 2009-08-19 | 2010-02-03 | 刘文祥 | Integration of three networks |
-
2010
- 2010-03-16 CN CN201010125028XA patent/CN101771619B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN101771619A (en) | 2010-07-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101771619B (en) | Network system for realizing integrated security services | |
CN101800753B (en) | Comprehensive safety protecting method based on integral network safety service framework | |
CN1790980B (en) | Secure authentication advertisement protocol | |
EP2277296B1 (en) | Method and system for providing trustworthiness of communication | |
EP1624644B1 (en) | Privileged network routing | |
CN101022340B (en) | Intelligent control method for realizing city Ethernet exchanger switch-in security | |
US20040223499A1 (en) | Communications networks with converged services | |
CN102132532B (en) | Method and apparatus for avoiding unwanted data packets | |
JP2008306725A (en) | Peer-to-peer network over virtual private network | |
CN101326763A (en) | System and method for authentication of SP Ethernet aggregation networks | |
JP2018514956A (en) | Apparatus and method for using certificate data to route data | |
CN1665238B (en) | Networking System of Next Generation Network | |
CN106027491B (en) | Independent link communication processing method and system based on isolated IP address | |
Hallingstad et al. | Protected core networking: an architectural approach to secure and flexible communications | |
CN111934867B (en) | Safety networking structure and method of quantum communication network | |
Bhattacharjee et al. | Postmodern internetwork architecture | |
Tongkaw et al. | Multi-VLAN design over IPSec VPN for campus network | |
US20160164853A1 (en) | Method for operating a network and a network | |
Gommans et al. | Token-based authorization of connection oriented network resources | |
WO2012013003A1 (en) | Method and system for processing data message | |
CN114338784A (en) | Service processing method, device and storage medium | |
CN1617508B (en) | A quality of service policy conversion device and method | |
Varadharajan et al. | Securing communication in multiple autonomous system domains with software defined networking | |
CN100414938C (en) | A network security system and method | |
Wang et al. | A data plane security model of segmented routing based on SDP trust enhancement architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |