HK1240422B - Method, apparatus and system for constructing virtual private network - Google Patents
Method, apparatus and system for constructing virtual private network Download PDFInfo
- Publication number
- HK1240422B HK1240422B HK17113263.4A HK17113263A HK1240422B HK 1240422 B HK1240422 B HK 1240422B HK 17113263 A HK17113263 A HK 17113263A HK 1240422 B HK1240422 B HK 1240422B
- Authority
- HK
- Hong Kong
- Prior art keywords
- type
- protocol message
- message
- protocol
- sending
- Prior art date
Links
Description
技术领域Technical Field
本发明涉及通信技术应用领域,具体而言,涉及一种用于构建虚拟专用网络的方法、装置和系统。The present invention relates to the field of communication technology applications, and in particular to a method, device and system for building a virtual private network.
背景技术Background Art
随着互联网技术的广泛使用,除了方便人们上网获取信息外,如何保障在使用互联网的过程中保证安全,也成为了互联网安全一直关注的问题。With the widespread use of Internet technology, in addition to making it convenient for people to obtain information online, how to ensure safety during the use of the Internet has also become an issue that Internet security has always concerned about.
为保障企业级的企业与企业、团体与团体或个人与企业之间的互联网安全,虚拟专用网络(Virtual Private Network,简称VPN)是一种常用于连接企业级或团体间的私人网络的通信方法,VPN网络的讯息通过公用的网络架构来传送内联网的网络讯息,例如在互联网的构架中,根据利用已加密的通道协议(Tunneling Protocol)来达到保密、发送端认证、消息准确性等私人消息安全效果。VPN技术实现了可以通过使用不安全的网络(例如:互联网)来发送可靠、安全的消息。VPN有多种分类方式,主要是按协议进行分类。VPN可通过服务器、硬件、软件等多种方式实现。目前使用最普遍的还是软件VPN,常见的软件协议包括:点对点隧道协议(Point to Point Tunneling Protocol,简称PPTP),第二层隧道协议(Layer 2,简称L2TP),Internet安全协议(Internet Protocol Security,简称IPSEC),通用路由封装协议(Generic Routing Encapsulation,简称GRE)等。To ensure internet security between businesses, groups, or individuals, a virtual private network (VPN) is a commonly used communication method for connecting private networks within enterprises or groups. VPN messages are transmitted over a public network infrastructure, such as the Internet, utilizing encrypted tunneling protocols to ensure confidentiality, sender authentication, and message accuracy. VPN technology enables reliable and secure messaging over insecure networks, such as the Internet. VPNs can be categorized in various ways, primarily by protocol. VPNs can be implemented using servers, hardware, or software. Currently, software VPNs are the most widely used. Common software protocols include Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), Internet Protocol Security (IPSEC), and Generic Routing Encapsulation (GRE).
但是相关技术中VPN的实现过程很复杂,需要在客户端侧和服务端侧添加虚拟网卡等设备。在特定的应用场景下无法满足使用需求。比如在无盘工作站环境下,由于添加网卡等硬件设备需要重启,但是在无盘工作站情况下一但重启所有改动都会还原。因此在这样的场景下就无法做到即插即用,最重要的是,在建立VPN隧道的过程中,如果网络设备不支持特定隧道协议将会导致隧道无法建立。最典型的应用场景就是家庭路由器大多都无法支持通用路由封装(Generic Routing Encapsulation,简称GRE)隧道。由此可见,当VPN网络两侧设备不兼容特定的通信协议时,VPN隧道将无法建立。However, the implementation process of VPN in related technologies is very complicated, and it is necessary to add devices such as virtual network cards on the client side and the server side. It cannot meet the usage requirements in certain application scenarios. For example, in a diskless workstation environment, adding hardware devices such as network cards requires a restart, but in the case of a diskless workstation, all changes will be restored once the restart. Therefore, plug-and-play is not possible in such a scenario. Most importantly, during the process of establishing a VPN tunnel, if the network device does not support a specific tunnel protocol, the tunnel will not be established. The most typical application scenario is that most home routers cannot support Generic Routing Encapsulation (GRE) tunnels. It can be seen that when the devices on both sides of the VPN network are incompatible with a specific communication protocol, the VPN tunnel will not be established.
针对上述相关技术中由于VPN网络两侧设备存在对特定通信协议的不兼容的问题,导致VPN隧道无法建立的问题,目前尚未提出有效的解决方案。With respect to the problem in the above-mentioned related technologies that the VPN tunnel cannot be established due to the incompatibility of the devices on both sides of the VPN network with the specific communication protocol, no effective solution has been proposed so far.
发明内容Summary of the Invention
本发明实施例提供了一种用于构建虚拟专用网络的方法、装置和系统,以至少解决由于VPN网络两侧设备存在对特定通信协议的不兼容的问题,导致VPN隧道无法建立的技术问题。The embodiments of the present invention provide a method, apparatus and system for building a virtual private network, so as to at least solve the technical problem that a VPN tunnel cannot be established due to incompatibility of devices on both sides of the VPN network with a specific communication protocol.
根据本发明实施例的一个方面,提供了一种用于构建虚拟专用网络的方法,包括:检测预先接收到的协议报文的报文类型;当协议报文的报文类型为第一类协议报文时,将协议报文转换为在虚拟专用网络中用于通信的第二类协议报文;检测第二类协议报文中的报文参数,判断报文参数是否存在网络攻击的攻击特征;在判断结果为否的情况下,发送第二类协议报文。According to one aspect of an embodiment of the present invention, a method for building a virtual private network is provided, comprising: detecting the message type of a pre-received protocol message; when the message type of the protocol message is a first-class protocol message, converting the protocol message into a second-class protocol message used for communication in the virtual private network; detecting message parameters in the second-class protocol message, and determining whether the message parameters contain attack characteristics of a network attack; and if the determination result is negative, sending the second-class protocol message.
根据本发明实施例的一个方面,提供了另一种用于构建虚拟专用网络的方法,包括:接收客户端发送的第二类协议报文;判断第二类协议报文中的报文参数是否存在网络攻击的攻击特征;在判断结果为否的情况下,依据服务器的类型将第二类协议报文发送至对应的发送端口。According to one aspect of an embodiment of the present invention, another method for building a virtual private network is provided, including: receiving a second-type protocol message sent by a client; determining whether the message parameters in the second-type protocol message contain attack characteristics of a network attack; and if the determination result is no, sending the second-type protocol message to a corresponding sending port based on the type of server.
根据本发明实施例的另一方面,还提供了一种用于构建虚拟专用网络的装置,包括:检测模块,用于检测预先接收到的协议报文的报文类型;转换模块,用于当协议报文的报文类型为第一类协议报文时,将协议报文转换为在虚拟专用网络中用于通信的第二类协议报文;判断模块,用于检测第二类协议报文中的报文参数,判断报文参数是否存在网络攻击的攻击特征;发送模块,用于在判断结果为否的情况下,发送第二类协议报文。According to another aspect of an embodiment of the present invention, a device for constructing a virtual private network is also provided, including: a detection module for detecting the message type of a pre-received protocol message; a conversion module for converting the protocol message into a second-type protocol message used for communication in the virtual private network when the message type of the protocol message is a first-type protocol message; a judgment module for detecting message parameters in the second-type protocol message and judging whether the message parameters contain attack characteristics of a network attack; and a sending module for sending the second-type protocol message if the judgment result is no.
可选地,所述转换模块包括:获取单元,用于获取所述协议报文中的数据;封装单元,用于依据所述第二类协议报文的格式封装所述数据,得到报文类型为所述第二类协议报文的协议报文。Optionally, the conversion module includes: an acquisition unit, configured to acquire data in the protocol message; and an encapsulation unit, configured to encapsulate the data according to the format of the second type of protocol message to obtain a protocol message of the second type of protocol message.
可选地,所述装置还包括:加密模块,用于在检测所述第二类协议报文中的报文参数之前,依据所述协议报文的业务类型匹配得到对应的加密规则,并依据所述加密规则对所述第二类协议报文进行加密,其中,所述加密规则用于指示在加密过程中依据业务类型更改加密密级。Optionally, the device also includes: an encryption module, which is used to obtain corresponding encryption rules based on the business type of the protocol message before detecting the message parameters in the second type of protocol message, and encrypt the second type of protocol message according to the encryption rules, wherein the encryption rules are used to indicate that the encryption level is changed according to the business type during the encryption process.
可选地,所述加密模块包括:加密单元,用于根据所述加密规则对所述第二类协议报文执行特征加密,其中,所述特征加密为依据所述第二类协议报文中的报文参数进行加密。Optionally, the encryption module includes: an encryption unit, configured to perform feature encryption on the second-type protocol message according to the encryption rule, wherein the feature encryption is encryption based on message parameters in the second-type protocol message.
可选地,所述判断模块包括:检测单元,用于检测所述第二类协议报文中的所述报文参数中的报文长度、特征值、发送速率及数据大小;第一判断单元,用于判断所述报文参数中的报文长度、特征值、发送速率及数据大小中的至少一项是否与预设的所述攻击特征匹配;第二判断单元,用于依据所述报文参数与所述攻击特征的匹配结果判断所述协议报文是否存在所述网络攻击。Optionally, the judgment module includes: a detection unit, used to detect the message length, characteristic value, sending rate and data size in the message parameters in the second type of protocol message; a first judgment unit, used to judge whether at least one of the message length, characteristic value, sending rate and data size in the message parameters matches the preset attack feature; a second judgment unit, used to judge whether the protocol message contains the network attack based on the matching result of the message parameters and the attack feature.
可选地,所述装置还包括:执行模块,用于在判断结果为是的情况下,丢弃所述协议报文。Optionally, the device further includes: an execution module, configured to discard the protocol message if the judgment result is yes.
可选地,所述装置还包括:接收模块,用于接收服务器返回的第二类协议报文;匹配模块,用于依据所述第二类协议报文的目的地址匹配对应的转发端口;反馈模块,用于通过所述转发端口返回所述第二类协议报文。Optionally, the device also includes: a receiving module for receiving the second type of protocol message returned by the server; a matching module for matching the corresponding forwarding port according to the destination address of the second type of protocol message; and a feedback module for returning the second type of protocol message through the forwarding port.
可选地,所述反馈模块包括:类型检测单元,用于检测所述目的地址对应的转发端口支持的协议报文的类型;发送单元,用于依据所述转发端口支持的协议报文的类型发送所述第二类协议报文。Optionally, the feedback module includes: a type detection unit, configured to detect the type of protocol message supported by the forwarding port corresponding to the destination address; and a sending unit, configured to send the second type of protocol message according to the type of protocol message supported by the forwarding port.
可选地,所述发送单元包括:获取子单元,用于当检测到所述转发端口支持的所述协议报文的类型为第一类协议报文时,获取所述第二类协议报文中的数据;第一发送子单元,用于通过对应的所述转发端口返回所述数据。Optionally, the sending unit includes: an acquisition subunit, used to acquire data in the second type of protocol message when it is detected that the type of the protocol message supported by the forwarding port is a first type of protocol message; and a first sending subunit, used to return the data through the corresponding forwarding port.
可选地,所述发送单元包括:第二发送子单元,用于当检测到所述转发端口支持的所述协议报文的类型为第二类协议报文时,通过对应的所述转发端口返回所述第二类协议报文。Optionally, the sending unit includes: a second sending subunit, configured to return the second-type protocol message through the corresponding forwarding port when detecting that the type of the protocol message supported by the forwarding port is a second-type protocol message.
根据本发明实施例的另一方面,还提供了另一种用于构建虚拟专用网络的装置,包括:接收模块,用于接收客户端发送的第二类协议报文;判断模块,用于判断第二类协议报文中的报文参数是否存在网络攻击的攻击特征;发送模块,用于在判断结果为否的情况下,依据服务器的类型将第二类协议报文发送至对应的发送端口。According to another aspect of an embodiment of the present invention, another device for building a virtual private network is provided, including: a receiving module for receiving a second-type protocol message sent by a client; a judging module for judging whether the message parameters in the second-type protocol message contain attack characteristics of a network attack; and a sending module for sending the second-type protocol message to a corresponding sending port based on the type of server when the judgment result is no.
可选地,所述装置还包括:解密模块,用于在依据服务器的类型将所述第二类协议报文发送至对应的发送端口之前,对所述第二类协议报文依据预设解密规则解密。Optionally, the device further includes: a decryption module, configured to decrypt the second-type protocol message according to a preset decryption rule before sending the second-type protocol message to a corresponding sending port according to the type of the server.
可选地,所述解密模块包括:匹配单元,用于依据所述第二类协议报文的业务类型匹配对应的解密规则;解密单元,用于依据所述解密规则对所述第二类协议报文执行特征解密,所述特征解密,用于指示依据所述第二类协议报文中的报文参数执行解密,所述报文参数包括:报文长度、特征值、发送速率及数据大小中的至少一项。Optionally, the decryption module includes: a matching unit for matching corresponding decryption rules based on the business type of the second-type protocol message; a decryption unit for performing feature decryption on the second-type protocol message based on the decryption rules, and the feature decryption is used to indicate that decryption is performed based on message parameters in the second-type protocol message, and the message parameters include: at least one of message length, feature value, sending rate and data size.
可选地,所述发送模块包括:第一发送单元,用于当所述服务器的类型为支持第二类协议报文时,将所述第二类协议报文通过第一类发送端口发送至所述服务器,其中,所述第一类发送端口为支持所述第二类协议报文的服务器对应的端口;第二发送单元,用于当所述服务器的类型为支持第一类协议报文时,获取所述第二类协议报文中的数据,并将所述数据通过第二类发送端口发送至所述服务器,其中,所述第二类发送端口为支持所述第一类协议报文的服务器对应的端口。Optionally, the sending module includes: a first sending unit, used to send the second-type protocol message to the server through a first-type sending port when the type of the server is to support the second-type protocol message, wherein the first-type sending port is the port corresponding to the server that supports the second-type protocol message; a second sending unit, used to obtain data in the second-type protocol message when the type of the server is to support the first-type protocol message, and send the data to the server through a second-type sending port, wherein the second-type sending port is the port corresponding to the server that supports the first-type protocol message.
根据本发明实施例的又一方面,还提供了一种用于构建虚拟专用网络的系统,包括:客户端隧道装置和隧道网络设备,客户端隧道装置和隧道网络设备通信连接,其中,客户端隧道装置,用于通过检测接收到的协议报文的报文类型,将报文类型为第一类协议报文的协议报文转换为用于在虚拟专用网络中用于通信的第二类协议报文,通过检测第二类协议报文中的报文参数,判断协议报文是否存在网络攻击的攻击特征,在判断结果为否的情况下,发送协议报文;隧道网络设备,与客户端隧道装置通信连接,用于接收客户端隧道装置发送的第二类协议报文,通过检测第二类协议报文是否存在网络攻击,在判断结果为否的情况下,依据服务器的类型将解密后的第二类协议报文发送至对应的发送端口;其中,客户端隧道装置为上述一种用于构建虚拟专用网络的装置;隧道网络设备为上述另一种用于构建虚拟专用网络的装置。According to another aspect of an embodiment of the present invention, a system for constructing a virtual private network is also provided, including: a client tunnel device and a tunnel network device, the client tunnel device and the tunnel network device are communicatively connected, wherein the client tunnel device is used to convert a protocol message of a first type of protocol message into a second type of protocol message for communication in the virtual private network by detecting the message type of the received protocol message, and judge whether the protocol message contains attack characteristics of a network attack by detecting message parameters in the second type of protocol message, and send the protocol message if the judgment result is no; the tunnel network device is communicatively connected to the client tunnel device, and is used to receive the second type of protocol message sent by the client tunnel device, and detect whether the second type of protocol message contains a network attack, and send the decrypted second type of protocol message to the corresponding sending port according to the type of server if the judgment result is no; wherein the client tunnel device is the above-mentioned device for constructing a virtual private network; the tunnel network device is the above-mentioned other device for constructing a virtual private network.
在本发明实施例中,通过检测预先接收到的协议报文的报文类型;当协议报文的报文类型为第一类协议报文时,将协议报文转换为在虚拟专用网络中用于通信的第二类协议报文;检测第二类协议报文中的报文参数,判断报文参数是否存在网络攻击的攻击特征;在判断结果为否的情况下,发送第二类协议报文,达到了VPN网络中的两侧支持不同通信协议的设备兼容的目的,从而实现了建立VPN隧道的技术效果,进而解决了由于VPN网络两侧设备存在对特定通信协议的不兼容的问题,导致VPN隧道无法建立的技术问题。In an embodiment of the present invention, by detecting the message type of a pre-received protocol message; when the message type of the protocol message is a first-type protocol message, converting the protocol message into a second-type protocol message used for communication in a virtual private network; detecting message parameters in the second-type protocol message, and judging whether the message parameters contain attack characteristics of a network attack; and sending the second-type protocol message if the judgment result is no, the purpose of achieving compatibility between devices supporting different communication protocols on both sides of the VPN network is achieved, thereby realizing the technical effect of establishing a VPN tunnel, and further solving the technical problem that the VPN tunnel cannot be established due to the incompatibility of devices on both sides of the VPN network with respect to a specific communication protocol.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The drawings described herein are used to provide a further understanding of the present invention and constitute a part of this application. The exemplary embodiments of the present invention and their descriptions are used to explain the present invention and do not constitute an improper limitation of the present invention. In the drawings:
图1是本发明实施例的一种用于构建虚拟专用网络的方法的计算机终端的硬件结构框图;1 is a hardware structure block diagram of a computer terminal for a method of building a virtual private network according to an embodiment of the present invention;
图2是根据本发明实施例一的用于构建虚拟专用网络的方法的流程图;2 is a flow chart of a method for building a virtual private network according to a first embodiment of the present invention;
图3是根据本发明实施例一的用于构建虚拟专用网络的方法中客户端隧道装置的结构示意图;3 is a schematic structural diagram of a client tunnel device in a method for building a virtual private network according to a first embodiment of the present invention;
图4是根据本发明实施例一的用于构建虚拟专用网络的方法中客户端隧道装置中隧道业务装置的结构示意图;4 is a schematic structural diagram of a tunnel service device in a client tunnel device in a method for building a virtual private network according to a first embodiment of the present invention;
图5是根据本发明实施例二的用于构建虚拟专用网络的方法的流程图;5 is a flowchart of a method for building a virtual private network according to a second embodiment of the present invention;
图6(a)是根据本发明实施例二的用于构建虚拟专用网络的方法中隧道终结装置的结构示意图;FIG6( a ) is a schematic structural diagram of a tunnel termination device in a method for building a virtual private network according to a second embodiment of the present invention;
图6(b)是根据本发明实施例的用于构建虚拟专用网络的方法的流程图;FIG6( b ) is a flow chart of a method for constructing a virtual private network according to an embodiment of the present invention;
图7是根据本发明实施例三的用于构建虚拟专用网络的装置的结构示意图;7 is a schematic structural diagram of an apparatus for building a virtual private network according to a third embodiment of the present invention;
图8是根据本发明实施例三的一种用于构建虚拟专用网络的装置的结构示意图;8 is a schematic structural diagram of an apparatus for building a virtual private network according to a third embodiment of the present invention;
图9是根据本发明实施例三的另一种用于构建虚拟专用网络的装置的结构示意图;9 is a schematic structural diagram of another apparatus for building a virtual private network according to Embodiment 3 of the present invention;
图10是根据本发明实施例三的又一种用于构建虚拟专用网络的装置的结构示意图;10 is a schematic structural diagram of another apparatus for building a virtual private network according to Embodiment 3 of the present invention;
图11是根据本发明实施例三的再一种用于构建虚拟专用网络的装置的结构示意图;11 is a schematic structural diagram of another apparatus for building a virtual private network according to Embodiment 3 of the present invention;
图12是根据本发明实施例四的用于构建虚拟专用网络的装置的结构示意图;12 is a schematic structural diagram of an apparatus for building a virtual private network according to a fourth embodiment of the present invention;
图13是根据本发明实施例四的一种用于构建虚拟专用网络的装置的结构示意图;13 is a schematic structural diagram of an apparatus for building a virtual private network according to a fourth embodiment of the present invention;
图14是根据本发明实施例四的另一种用于构建虚拟专用网络的装置的结构示意图;14 is a schematic structural diagram of another apparatus for building a virtual private network according to Embodiment 4 of the present invention;
图15是根据本发明实施例四的又一种用于构建虚拟专用网络的装置的结构示意图;15 is a schematic structural diagram of another apparatus for building a virtual private network according to Embodiment 4 of the present invention;
图16是根据本申请实施例的用于构建虚拟专用网络的系统的结构示意图。FIG16 is a schematic structural diagram of a system for building a virtual private network according to an embodiment of the present application.
具体实施方式DETAILED DESCRIPTION
为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the embodiments described are only part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by ordinary technicians in this field without making creative efforts should fall within the scope of protection of the present invention.
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本发明的实施例能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。It should be noted that the terms "first", "second", etc. in the description and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects and are not necessarily used to describe a specific order or sequence. It should be understood that the numbers used in this way can be interchanged where appropriate, so that the embodiments of the present invention described herein can be implemented in an order other than those illustrated or described herein. In addition, the terms "including" and "having" and any variations thereof are intended to cover non-exclusive inclusions. For example, a process, method, system, product or device that includes a series of steps or units is not necessarily limited to those steps or units clearly listed, but may include other steps or units that are not clearly listed or inherent to these processes, methods, products or devices.
为便于理解本申请实施例,以下将本申请实施例中所涉及的技术名词解释如下:To facilitate understanding of the embodiments of the present application, the technical terms involved in the embodiments of the present application are explained as follows:
虚拟专用网络,Virtual Private Network,简称VPN,是指通过一个公用网络建立一个临时的安全的连接,是一条穿过混乱的公用网络的安全、稳定的隧道。它可以理解为虚拟出来的企业内部专线。它可以通过特殊的加密的通讯协议在连接在Internet上的位于不同地方的两个或多个企业内部网之间建立一条专有的通讯线路;A virtual private network (VPN) is a temporary, secure connection established over a public network. It's a safe, stable tunnel that traverses the chaotic public network. It can be thought of as a virtual, dedicated internal line within a company. Using a special encrypted communication protocol, it establishes a dedicated communication line between two or more corporate intranets located in different locations and connected to the Internet.
用户数据报协议,User Datagram Protocol,简称UDP,是开放式系统互联(OpenSystem Interconnection,简称OSI)参考模型中一种无连接的传输层协议,提供面向事务的简单不可靠信息传送服务;User Datagram Protocol, User Datagram Protocol, referred to as UDP, is a connectionless transport layer protocol in the Open System Interconnection (OSI) reference model, providing simple, unreliable information transmission services for transactions.
传输控制协议,Transmission Control Protocol,简称TCP,是一种面向连接的、可靠的、基于字节流的传输层通信协议;Transmission Control Protocol, TCP for short, is a connection-oriented, reliable, byte stream-based transport layer communication protocol;
循环冗余码校验,Cyclical Redundancy Check,简称CRC,是指利用除法及余数的原理来做错误侦测;Cyclic Redundancy Check, or CRC for short, is a method of detecting errors using the principle of division and remainder.
网络攻击:是指利用网络存在的漏洞和安全缺陷对网络系统的硬件、软件及其系统中的数据进行的攻击;Network attack: refers to an attack on the hardware, software and data of a network system by exploiting loopholes and security flaws in the network;
网络攻击的攻击特征:包括网络报文嗅探、地址欺骗、密码攻击、拒绝服务攻击等。Attack characteristics of network attacks: including network packet sniffing, address spoofing, password attacks, denial of service attacks, etc.
实施例1Example 1
根据本发明实施例,还提供了一种用于构建虚拟专用网络的方法的方法实施例,需要说明的是,在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行,并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。According to an embodiment of the present invention, a method embodiment for building a virtual private network is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer executable instructions, and although a logical order is shown in the flowchart, in some cases, the steps shown or described can be executed in an order different from that shown here.
本申请实施例一所提供的方法实施例可以在移动终端、计算机终端或者类似的运算装置中执行。以运行在计算机终端上为例,图1是本发明实施例的一种用于构建虚拟专用网络的方法的计算机终端的硬件结构框图。如图1所示,计算机终端10可以包括一个或多个(图中仅示出一个)处理器102(处理器102可以包括但不限于微处理器MCU或可编程逻辑器件FPGA等的处理装置)、用于存储数据的存储器104、以及用于通信功能的传输模块106。本领域普通技术人员可以理解,图1所示的结构仅为示意,其并不对上述电子装置的结构造成限定。例如,计算机终端10还可包括比图1中所示更多或者更少的组件,或者具有与图1所示不同的配置。The method embodiment provided in the first embodiment of the present application can be executed in a mobile terminal, a computer terminal or a similar computing device. Taking operation on a computer terminal as an example, FIG1 is a hardware structure block diagram of a computer terminal for a method for building a virtual private network according to an embodiment of the present invention. As shown in FIG1 , the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (the processor 102 may include but is not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA), a memory 104 for storing data, and a transmission module 106 for communication functions. It will be understood by those skilled in the art that the structure shown in FIG1 is only for illustration and does not limit the structure of the above-mentioned electronic device. For example, the computer terminal 10 may also include more or fewer components than those shown in FIG1 , or have a configuration different from that shown in FIG1 .
存储器104可用于存储应用软件的软件程序以及模块,如本发明实施例中的用于构建虚拟专用网络的方法对应的程序指令/模块,处理器102通过运行存储在存储器104内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现上述的应用程序的漏洞检测方法。存储器104可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器104可进一步包括相对于处理器102远程设置的存储器,这些远程存储器可以通过网络连接至计算机终端10。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。The memory 104 can be used to store software programs and modules of application software, such as the program instructions/modules corresponding to the method for building a virtual private network in the embodiment of the present invention. The processor 102 executes various functional applications and data processing by running the software programs and modules stored in the memory 104, thereby implementing the vulnerability detection method for the application described above. The memory 104 may include high-speed random access memory and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory remotely located relative to the processor 102, and these remote memories may be connected to the computer terminal 10 via a network. Examples of the above-mentioned network include, but are not limited to, the Internet, an intranet, a local area network, a mobile communication network, and combinations thereof.
传输装置106用于经由一个网络接收或者发送数据。上述的网络具体实例可包括计算机终端10的通信供应商提供的无线网络。在一个实例中,传输装置106包括一个网络适配器(Network Interface Controller,简称NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输装置106可以为射频(Radio Frequency,简称RF)模块,其用于通过无线方式与互联网进行通讯。The transmission device 106 is used to receive or send data via a network. A specific example of the aforementioned network may include a wireless network provided by the communications provider of the computer terminal 10. In one embodiment, the transmission device 106 includes a network interface controller (NIC), which can be connected to other network devices via a base station to enable communication with the Internet. In another embodiment, the transmission device 106 may be a radio frequency (RF) module, which is used to communicate with the Internet wirelessly.
在上述运行环境下,本申请提供了如图2所示的用于构建虚拟专用网络的方法。图2是根据本发明实施例一的用于构建虚拟专用网络的方法的流程图。In the above operating environment, the present application provides a method for constructing a virtual private network as shown in Figure 2. Figure 2 is a flow chart of a method for constructing a virtual private network according to a first embodiment of the present invention.
步骤S202,检测预先接收到的协议报文的报文类型;Step S202, detecting the message type of the pre-received protocol message;
本申请实施例提供的用于构建虚拟专用网络的方法可以适用于虚拟专用网络(Virtual Private Network,简称VPN)的建立,其中,以用户数据报协议(User DatagramProtocol,简称UDP)作为VPN隧道通信协议,解决VPN隧道两侧设备存在对特定通信协议的不兼容的问题。The method for constructing a virtual private network provided in an embodiment of the present application can be applied to the establishment of a virtual private network (VPN), wherein the User Datagram Protocol (UDP) is used as the VPN tunnel communication protocol to solve the problem of incompatibility between devices on both sides of the VPN tunnel for specific communication protocols.
本申请上述步骤S202中,在客户端侧,在客户端的应用层配置客户端隧道装置,通过应用层协议对接装置检测接收到的协议报文的报文类型,其中,在本申请实施例提供的客户端中,该客户端可以包括:笔记本电脑、台式电脑、平板电脑及私人电脑(PersonalComputer,简称PC)等能够接入支持UDP协议的客户端。在本申请实施例中终端以PC为例进行说明,具体如下:PC的应用层协议对接装置检测由PC的应用程序发送的协议报文的报文类型,检测当前协议报文的报文类型是UDP协议或TCP协议。In step S202 of the present application, on the client side, a client tunnel device is configured at the application layer of the client, and the application layer protocol docking device detects the message type of the received protocol message. In the client provided in the embodiment of the present application, the client may include: a laptop computer, a desktop computer, a tablet computer, and a personal computer (Personal Computer, referred to as PC), etc., which can access a client supporting the UDP protocol. In the embodiment of the present application, the terminal is described using a PC as an example, specifically as follows: The application layer protocol docking device of the PC detects the message type of the protocol message sent by the application of the PC, and detects whether the message type of the current protocol message is UDP protocol or TCP protocol.
这里本申请实施例提供的用于构建虚拟专用网络的方法,以对接装置处理隧道和现用7层协议(TCP和UDP)如何对接为例,解决VPN隧道两侧设备存在对特定通信协议的不兼容的问题。The method for building a virtual private network provided in the embodiment of the present application here takes the docking device processing tunnel and how to dock the existing 7-layer protocol (TCP and UDP) as an example to solve the problem of incompatibility of devices on both sides of the VPN tunnel with specific communication protocols.
其中,本申请实施例中协议报文的报文类型包括:用户数据报协议(UserDatagram Protocol,简称UDP)或传输控制协议(Transmission Control Protocol,简称TCP),在本申请实施例中将以TCP协议结构封装的报文作为第一类协议报文,将以UDP协议结构封装的报文作为第二类协议报文。Among them, the message types of the protocol messages in the embodiment of the present application include: User Datagram Protocol (UDP) or Transmission Control Protocol (TCP). In the embodiment of the present application, the message encapsulated in the TCP protocol structure is regarded as the first type of protocol message, and the message encapsulated in the UDP protocol structure is regarded as the second type of protocol message.
在本申请实施例中VPN隧道的通信协议为UDP协议进行,由于UDP协议为常用协议,所有的网络设备均支持该协议,以此解决兼容性的风险。In the embodiment of the present application, the communication protocol of the VPN tunnel is the UDP protocol. Since the UDP protocol is a commonly used protocol, all network devices support the protocol, thereby solving the compatibility risk.
步骤S204,当协议报文的报文类型为第一类协议报文时,将协议报文转换为在虚拟专用网络中用于通信的第二类协议报文;Step S204: when the message type of the protocol message is a first type protocol message, convert the protocol message into a second type protocol message used for communication in the virtual private network;
基于步骤S202,报文类型仍旧以UDP协议和TCP协议为例,本申请上述步骤S204中,当上述应用层协议对接装置检测到接收到的协议报文的报文类型为TCP协议报文时,为了避免VPN隧道的另一侧的服务器为支持UDP协议的设备,这里将TCP协议报文转换为以UDP协议结构封装的报文,由此得到,转换为UDP协议报文的报文。下述第二类协议报文则为UDP协议报文。Based on step S202, the message type is still UDP protocol and TCP protocol as an example. In the above step S204 of the present application, when the above application layer protocol docking device detects that the message type of the received protocol message is a TCP protocol message, in order to avoid the server on the other side of the VPN tunnel being a device that supports the UDP protocol, the TCP protocol message is converted into a message encapsulated in the UDP protocol structure, thereby obtaining a message converted into a UDP protocol message. The second type of protocol message described below is a UDP protocol message.
步骤S206,检测第二类协议报文中的报文参数,判断报文参数是否存在网络攻击的攻击特征;Step S206: Detect message parameters in the second type of protocol message to determine whether the message parameters contain attack characteristics of a network attack;
本申请实施例提供的用于构建虚拟专用网络的方法在解决建立VPN网络时遇到的兼容问题,还解决了对在建立VPN网络时,PC发送的UDP协议报文是否对VPN隧道的另一头的服务器存在网络攻击的问题。The method for building a virtual private network provided in the embodiment of the present application solves the compatibility issues encountered when establishing a VPN network, and also solves the problem of whether the UDP protocol message sent by the PC during the establishment of the VPN network poses a network attack on the server at the other end of the VPN tunnel.
基于步骤S204,在得到适用于VPN隧道进行通信的UDP协议报文后,本申请上述步骤S206中,在PC发送该UDP协议报文前,需通过PC中的隧道业务装置对该UDP协议报文进行数据检测,通过检测该UDP协议报文中的报文参数,判断该报文参数是否存在与网络攻击的攻击特征匹配的特征。Based on step S204, after obtaining the UDP protocol message suitable for communication in the VPN tunnel, in the above step S206 of the present application, before the PC sends the UDP protocol message, it is necessary to perform data detection on the UDP protocol message through the tunnel service device in the PC, and by detecting the message parameters in the UDP protocol message, it is determined whether the message parameters have features that match the attack features of the network attack.
这里UDP协议报文中的报文参数可以包括:UDP协议报文中数据的奇偶校验值、数据的循环冗余码校验值(Cyclical Redundancy Check,简称CRC)、报文长度、通信用到的目的IP和目的端口等数据信息。Here, the message parameters in the UDP protocol message may include: the parity check value of the data in the UDP protocol message, the cyclic redundancy check value (CRC) of the data, the message length, the destination IP and destination port used for communication, and other data information.
若判断上述报文参数中至少一项与网络攻击的攻击特征相同,则说明该UDP协议报文为用于实现网络攻击的协议报文。若在该判断结果为是的情况下,则丢弃该UDP协议报文,即,当判断该UDP协议报文中的上述报文参数中存在至少一项与网络攻击的攻击特征相匹配时,判断该UDP协议报文存在网络攻击威胁,因此将丢弃该UDP协议报文,从而保障VPN网络的安全,特别是保障服务器端不受客户端的攻击。If at least one of the aforementioned message parameters matches a network attack signature, the UDP protocol message is considered a protocol message used to carry out a network attack. If this determination is positive, the UDP protocol message is discarded. Specifically, if at least one of the aforementioned message parameters in the UDP protocol message matches a network attack signature, the UDP protocol message is determined to pose a network attack threat and is discarded, thereby protecting the VPN network, particularly protecting the server from attacks by the client.
这里若隧道业务装置判断UDP协议报文中的上述报文参数中不存在与网络攻击的攻击特征相匹配时,则执行步骤S208。Here, if the tunnel service device determines that none of the message parameters in the UDP protocol message matches the attack characteristics of the network attack, step S208 is executed.
步骤S208,在判断结果为否的情况下,发送第二类协议报文。Step S208: If the judgment result is no, send the second type protocol message.
基于步骤S206,在判断报文参数是否存在网络攻击的攻击特征的基础上,本申请上述步骤S208中,在隧道业务装置判断UDP协议报文中的上述报文参数中不存在与网络攻击的攻击特征相匹配时,将发送该UDP报文。Based on step S206, on the basis of determining whether the message parameters have attack characteristics of a network attack, in the above step S208 of the present application, when the tunnel service device determines that the above message parameters in the UDP protocol message do not match the attack characteristics of a network attack, the UDP message will be sent.
结合步骤S202至步骤S208,本申请实施例提供的用于构建虚拟专用网络的方法在客户端设置有隧道装置,即上述客户端隧道装置,图3是根据本发明实施例一的用于构建虚拟专用网络的方法中客户端隧道装置的结构示意图,如图3所示,其中,客户端隧道装置包括:应用程序协议对接装置和隧道业务装置,应用层协议对接装置,用于将接收到的协议报文进行检查,判断该协议报文的报文类型,在该报文类型为TCP协议报文时,将该协议报文转换为UDP协议报文,即,执行上述步骤S202和步骤S204;隧道业务装置,用于检测报文类型转换为UDP协议报文的报文是否存在网络攻击的威胁,如果UDP协议报文不存在网络攻击威胁,则发送该UDP协议报文,即,执行上述步骤S206和步骤S208。In combination with steps S202 to S208, the method for building a virtual private network provided by the embodiment of the present application is provided with a tunnel device on the client, that is, the above-mentioned client tunnel device. Figure 3 is a structural diagram of the client tunnel device in the method for building a virtual private network according to embodiment 1 of the present invention. As shown in Figure 3, the client tunnel device includes: an application protocol docking device and a tunnel service device. The application layer protocol docking device is used to check the received protocol message and determine the message type of the protocol message. When the message type is a TCP protocol message, the protocol message is converted into a UDP protocol message, that is, the above-mentioned steps S202 and S204 are executed; the tunnel service device is used to detect whether the message type is converted into a UDP protocol message and whether there is a threat of network attack. If the UDP protocol message does not pose a threat of network attack, the UDP protocol message is sent, that is, the above-mentioned steps S206 and S208 are executed.
由上可知,本申请上述实施例一所提供的方案,通过检测预先接收到的协议报文的报文类型;当协议报文的报文类型为第一类协议报文时,将协议报文转换为在虚拟专用网络中用于通信的第二类协议报文;检测第二类协议报文中的报文参数,判断报文参数是否存在网络攻击的攻击特征;在判断结果为否的情况下,发送第二类协议报文,达到了VPN网络中的两侧支持不同通信协议的设备兼容的目的,从而实现了建立VPN隧道的技术效果,进而解决了由于VPN网络两侧设备存在对特定通信协议的不兼容的问题,导致VPN隧道无法建立的技术问题。这里本申请实施例提供的网络攻击至少包括密级数据发送攻击或特定应用层数据协议攻击,以实现本申请实施例提供的用于构建虚拟专用网络的方法为准,具体不做限定。As can be seen from the above, the solution provided in the first embodiment of the present application detects the message type of the protocol message received in advance; when the message type of the protocol message is a first type of protocol message, the protocol message is converted into a second type of protocol message used for communication in the virtual private network; the message parameters in the second type of protocol message are detected to determine whether the message parameters contain attack characteristics of a network attack; if the judgment result is no, the second type of protocol message is sent, thereby achieving the purpose of compatibility of devices supporting different communication protocols on both sides of the VPN network, thereby achieving the technical effect of establishing a VPN tunnel, and further solving the technical problem that the VPN tunnel cannot be established due to the incompatibility of devices on both sides of the VPN network with specific communication protocols. The network attack provided in the embodiment of the present application here at least includes a classified data sending attack or a specific application layer data protocol attack, and is subject to the method for building a virtual private network provided in the embodiment of the present application, and is not specifically limited.
可选的,步骤S204中将协议报文转换为在虚拟专用网络中用于通信的第二类协议报文包括:Optionally, converting the protocol message into a second type of protocol message for communication in the virtual private network in step S204 includes:
Step1,获取协议报文中的数据;Step 1, obtain the data in the protocol message;
本申请上述步骤S204中的Step1中,如图3所示,当该协议报文的报文类型为TCP协议报文时,通过应用层协议对接装置中的TCP隧道转换装置获取该协议报文中的数据。其中,TCP隧道转换装置获取协议报文中的数据的过程如下:In Step 1 of the above-mentioned step S204 of the present application, as shown in FIG3 , when the message type of the protocol message is a TCP protocol message, the data in the protocol message is obtained by the TCP tunnel conversion device in the application layer protocol docking device. The process of the TCP tunnel conversion device obtaining the data in the protocol message is as follows:
首先,在本地建立TCP服务端;First, establish a TCP server locally;
第二,通过该TCP服务端获得TCP协议需要传输的数据。Second, obtain the data that the TCP protocol needs to transmit through the TCP server.
Step2,依据第二类协议报文的格式封装数据,得到报文类型为第二类协议报文的协议报文。Step 2: encapsulate the data according to the format of the second type of protocol message to obtain a protocol message of the second type of protocol message.
基于Step1,获取协议报文中的数据后,本申请上述步骤Step2中,若该数据要通过VPN隧道发送至服务器,则需要将该数据封装为与VPN隧道所使用的通信协议相同的协议格式的协议报文,由此,以UDP协议结构封装该数据,得到能够在VPN隧道传输的UDP协议报文。Based on Step 1, after obtaining the data in the protocol message, in the above-mentioned Step 2 of this application, if the data is to be sent to the server through the VPN tunnel, the data needs to be encapsulated into a protocol message with the same protocol format as the communication protocol used by the VPN tunnel. Thus, the data is encapsulated in the UDP protocol structure to obtain a UDP protocol message that can be transmitted in the VPN tunnel.
可选的,在步骤S206检测第二类协议报文中的报文参数之前,本申请实施例提供的用于构建虚拟专用网络的方法还包括:Optionally, before detecting the message parameters in the second type of protocol message in step S206, the method for establishing a virtual private network provided by the embodiment of the present application further includes:
步骤S205,依据协议报文的业务类型匹配得到对应的加密规则,并依据加密规则对第二类协议报文进行加密,其中,加密规则用于指示在加密过程中依据业务类型更改加密密级。Step S205: Obtain corresponding encryption rules based on the service type of the protocol message, and encrypt the second type of protocol message based on the encryption rules, wherein the encryption rules are used to indicate that the encryption level should be changed based on the service type during the encryption process.
本申请上述步骤S205中,在检测UDP协议报文中的报文参数之前,需要对UDP协议报文进行加密,以保障UDP协议报文在传输过程中的不被轻易截获破解,保障了信息安全,如图4所示,图4是根据本发明实施例一的用于构建虚拟专用网络的方法中客户端隧道装置中隧道业务装置的结构示意图,隧道业务装置通过应用层协议对接装置中的隧道管道装置获取该UDP协议报文,并通过隧道业务装置中的隧道核心配置模块依据该UDP协议报文的业务类型动态匹配对应的加密规则,并依据该加密规则通过数据加密模块对该UDP协议报文执行加密。In the above step S205 of the present application, before detecting the message parameters in the UDP protocol message, the UDP protocol message needs to be encrypted to ensure that the UDP protocol message is not easily intercepted and cracked during transmission, thereby ensuring information security. As shown in Figure 4, Figure 4 is a structural diagram of the tunnel service device in the client tunnel device in the method for building a virtual private network according to embodiment 1 of the present invention. The tunnel service device obtains the UDP protocol message through the tunnel pipeline device in the application layer protocol docking device, and dynamically matches the corresponding encryption rule according to the service type of the UDP protocol message through the tunnel core configuration module in the tunnel service device, and encrypts the UDP protocol message through the data encryption module according to the encryption rule.
具体的,隧道核心配置模块通过数据加密模块可以获知数据加密模块的工作状态,以此,可以根据安全等级和延时敏感信息告知数据加密模块,进而数据加密模块将依据上述要求弹性生成加密规则,并对该UDP协议报文执行加密。Specifically, the tunnel core configuration module can obtain the working status of the data encryption module through the data encryption module, and thus inform the data encryption module based on the security level and delay sensitive information. Then the data encryption module will flexibly generate encryption rules based on the above requirements and encrypt the UDP protocol message.
进一步地,可选的,步骤S205中依据加密规则对第二类协议报文进行加密包括:Further, optionally, encrypting the second type of protocol message according to the encryption rule in step S205 includes:
Step1,根据加密规则对第二类协议报文执行特征加密,其中,特征加密为依据第二类协议报文中的报文参数进行加密。Step 1: Perform feature encryption on the second type of protocol message according to the encryption rule, wherein the feature encryption is performed based on message parameters in the second type of protocol message.
本申请上述步骤S205中的Step1中,加密规则限定了UDP协议报文的加密方式以及加密的密级,需要说明的是,特征加密将会依据UDP协议报文中位于UDP协议结构中各个部分的特征进行动态加密,即,依据UDP协议报文的业务类型,调整加密过程的复杂程度,例如,仅为建立通信过程发送的请求报文可以设置为密级程度低,以使得服务器端能够快速检测和解密,并依据请求报文反馈响应报文,提升整体VPN网络的数据传输效率;或者,在传输客户端的业务报文时,为了保障UDP协议报文中的内容不被泄露,可以通过加密规则提升加密密级,通过UDP协议结构上的多个特征(报文参数)执行加密。In Step 1 of the above-mentioned step S205 of the present application, the encryption rules define the encryption method and encryption level of the UDP protocol message. It should be noted that feature encryption will be dynamically encrypted based on the features of each part of the UDP protocol structure in the UDP protocol message, that is, the complexity of the encryption process is adjusted according to the business type of the UDP protocol message. For example, the request message sent only for establishing the communication process can be set to a low level of confidentiality, so that the server can quickly detect and decrypt it, and feedback the response message based on the request message, thereby improving the data transmission efficiency of the overall VPN network; or, when transmitting the client's business message, in order to ensure that the content in the UDP protocol message is not leaked, the encryption level can be improved through encryption rules, and encryption can be performed through multiple features (message parameters) on the UDP protocol structure.
具体的,在本申请实施例提供的用于构建虚拟专用网络的方法中,数据加密模块,会根据数据中的特征进行抽象计算(比如数据的奇偶校验值、数据的循环冗余码校验值(Cyclical Redundancy Check,简称CRC)、报文长度、通信用到的目的IP和目的端口等数据信息)将这些信息计算后作为加密的结果和特征值携带在加密数据内部,主要提供给服务器侧的数据检测模块对数据进行快速筛查使用。另外会根据加密规则的配置情况,在UDP协议报文中会埋入多个这样的点用于检测。这样的好处是既减轻了服务端处理的压力,相比传统的整体加密又提升了处理性能。因此,在遭受大规模CC攻击的时候,基于这套机制进行数据的检测,可以最大程度上缓解服务器的压力,提升抗攻击的性能。Specifically, in the method for building a virtual private network provided in the embodiment of the present application, the data encryption module will perform abstract calculations based on the characteristics of the data (such as the parity value of the data, the cyclic redundancy check value (CRC) of the data, the length of the message, the destination IP and destination port used for communication, and other data information). After calculating this information, it will be carried inside the encrypted data as the encryption result and characteristic value, and mainly provided to the data detection module on the server side for rapid screening of the data. In addition, according to the configuration of the encryption rules, multiple such points will be embedded in the UDP protocol message for detection. The advantage of this is that it not only reduces the processing pressure on the server, but also improves the processing performance compared to traditional overall encryption. Therefore, when suffering a large-scale CC attack, data detection based on this mechanism can alleviate the pressure on the server to the greatest extent and improve the anti-attack performance.
可选的,步骤S206中检测第二类协议报文中的报文参数,判断报文参数是否存在网络攻击的攻击特征包括:Optionally, in step S206, detecting message parameters in the second type of protocol message and determining whether the message parameters contain attack features of a network attack include:
Step1,检测第二类协议报文中的报文参数中的报文长度、特征值、发送速率及数据大小;Step 1: Detect the message length, characteristic value, transmission rate and data size in the message parameters of the second type of protocol message;
本申请上述S206中的Step1中,如图3所示,数据检测模块将会对UDP协议报文中的报文参数进行检测,例如检测报文参数中的报文长度、特征值、发送速率及数据大小。In Step 1 of the above S206 of the present application, as shown in FIG3 , the data detection module will detect the message parameters in the UDP protocol message, such as the message length, characteristic value, sending rate and data size in the detection message parameters.
此外,数据检测模块还会对UDP协议报文中的报文内容进行检测,以使得保障在将UDP协议报文发送至服务器之前,若发现存在网络攻击威胁,及时阻止其发生,从而保障服务器侧安全,由此看出,当在客户端侧进行检测后,将会提升服务器侧不被网络攻击的安全等级,且,由于在检测之前依据加密规则对该UDP协议报文进行动态加密,使得服务器侧在对接收到的UDP协议报文解密前,通过检测该UDP协议报文,一旦发现该UDP存在网络攻击风险将对该UDP协议报文执行丢弃,避免了常规在接收协议报文后先解密后检测安全带来的数据处理效率低的问题。In addition, the data detection module will also detect the message content in the UDP protocol message to ensure that if a network attack threat is found before the UDP protocol message is sent to the server, it can be prevented from happening in time, thereby ensuring the security of the server side. It can be seen that when the detection is performed on the client side, the security level of the server side will be improved from network attacks. Moreover, since the UDP protocol message is dynamically encrypted according to the encryption rules before detection, the server side detects the UDP protocol message before decrypting the received UDP protocol message. Once it is found that the UDP has a network attack risk, the UDP protocol message will be discarded, avoiding the problem of low data processing efficiency caused by the conventional decryption and then security detection after receiving the protocol message.
Step2,判断报文参数中的报文长度、特征值、发送速率及数据大小中的至少一项是否与预设的攻击特征匹配;Step 2: Determine whether at least one of the message length, feature value, transmission rate, and data size in the message parameters matches a preset attack feature;
本申请上述Step2中,通过判断UDP协议报文中的上述报文参数中是否与预设的攻击特征匹配,进而依据匹配结果判断该UDP协议报文是否存在网络攻击,具体见Step3。In the above Step 2 of this application, it is determined whether the above message parameters in the UDP protocol message match the preset attack characteristics, and then based on the matching results, it is determined whether the UDP protocol message contains a network attack, see Step 3 for details.
Step3,依据报文参数与攻击特征的匹配结果判断协议报文是否存在网络攻击。Step 3: Determine whether the protocol message contains a network attack based on the matching results between the message parameters and the attack signature.
基于Step2中的匹配结果,本申请上述Step3中,当Step2中判断得到报文参数中的报文长度、特征值、发送速率及数据大小中的至少一项与预设的攻击特征匹配,则该协议报文将存在网络攻击。Based on the matching result in Step 2, in the above Step 3 of the present application, when at least one of the message length, characteristic value, sending rate and data size in the message parameters determined in Step 2 matches the preset attack feature, the protocol message will be subject to a network attack.
如图4所示,本申请实施例提供的用于构建虚拟专用网络的方法中,客户端隧道装置自身数据检测模块,能够防止恶意利用客户隧道装置发起攻击。As shown in FIG4 , in the method for building a virtual private network provided by an embodiment of the present application, the data detection module of the client tunnel device itself can prevent malicious attacks from being launched using the client tunnel device.
可选的,本申请实施例提供的用于构建虚拟专用网络的方法还包括:Optionally, the method for establishing a virtual private network provided in the embodiment of the present application further includes:
步骤S209,在判断结果为是的情况下,丢弃第二类协议报文。Step S209: If the judgment result is yes, discard the second type protocol message.
基于步骤S206,在判断报文参数是否存在网络攻击的攻击特征的基础上,本申请上述步骤S209中,在隧道业务装置判断UDP协议报文中的上述报文参数中存在与网络攻击的攻击特征相匹配时,丢弃该UDP报文。Based on step S206, on the basis of determining whether the message parameters contain attack characteristics of a network attack, in the above step S209 of the present application, when the tunnel service device determines that the above message parameters in the UDP protocol message match the attack characteristics of a network attack, the UDP message is discarded.
可选的,本申请实施例提供的用于构建虚拟专用网络的方法还包括:Optionally, the method for establishing a virtual private network provided in the embodiment of the present application further includes:
步骤S301,接收服务器返回的第二类协议报文;Step S301, receiving the second type protocol message returned by the server;
本申请上述步骤S301中,区别于步骤S208,如图4所示,在发送UDP协议报文的过程中,当检测该UDP协议报文中的报文参数与网络攻击的攻击特征不匹配时,将通过发送模块发送该UDP协议报文,在步骤S301中,通过接收模块接收服务器返回的UDP协议报文,通过设定来自服务器的数据均视为安全数据,以加速处理速度,进而通过特征解密,将解密后的UDP协议报文传送至应用层协议对接装置。In the above-mentioned step S301 of the present application, different from step S208, as shown in Figure 4, in the process of sending the UDP protocol message, when it is detected that the message parameters in the UDP protocol message do not match the attack characteristics of the network attack, the UDP protocol message will be sent through the sending module. In step S301, the UDP protocol message returned by the server is received by the receiving module, and the data from the server is set to be regarded as safe data to speed up the processing speed, and then the decrypted UDP protocol message is transmitted to the application layer protocol docking device through feature decryption.
具体的,在本申请实施例提供的用于构建虚拟专用网络的方法中,设定当UDP协议报文到达隧道业务装置中的接收模块时,直接送给数据监测模块进行合法性检测。或,如果为了加速处理速度,在客户端这个模块可以直接跳过,无条件相信服务端发送的数据。Specifically, in the method for establishing a virtual private network provided in an embodiment of the present application, when a UDP protocol packet arrives at the receiving module in the tunnel service device, it is directly sent to the data monitoring module for legitimacy verification. Alternatively, to speed up processing, this module can be directly skipped on the client side, and the data sent by the server can be unconditionally trusted.
步骤S302,依据第二类协议报文的目的地址匹配对应的转发端口;Step S302, matching the corresponding forwarding port according to the destination address of the second type protocol message;
区别于步骤S206,如图4所示,隧道核心配置模块,在接收UDP协议报文时,为了加速处理速度,隧道核心配置模块可以配置数据检测模块直接跳过检测,无条件相信服务器发送的数据,并通过数据解密模块对接收到的UDP协议报文执行解密,然后由应用层协议对接装置中的隧道管道装置接收解密后的UDP协议报文。Different from step S206, as shown in Figure 4, when receiving UDP protocol messages, in order to speed up the processing speed, the tunnel core configuration module can configure the data detection module to directly skip the detection, unconditionally believe the data sent by the server, and perform decryption on the received UDP protocol messages through the data decryption module, and then the decrypted UDP protocol messages are received by the tunnel pipeline device in the application layer protocol docking device.
本申请上述步骤S302中,隧道管道装置接收解密后的UDP协议报文后将依据协议报文中的目的地址匹配转发端口,若服务器返回的UDP协议报文对应客户端的TCP隧道转换装置发送的UDP协议报文,则在隧道管道装置接收解密后的该UDP协议报文后,将该UDP协议报文返回TCP隧道转换装置,通过TCP隧道转换装置中创建的本地TCP服务端发送给客户端应用程序;同理,若该服务器返回的UDP协议报文对应客户端的UDP接管装置发送UDP协议报文,则在隧道管道装置接收解密后的该UDP协议报文后,将该UDP协议报文返回UDP接管装置,并由该UDP接管装置将该UDP协议报文发送给客户端应用程序。In the above step S302 of the present application, after the tunnel pipeline device receives the decrypted UDP protocol message, it will match the forwarding port according to the destination address in the protocol message. If the UDP protocol message returned by the server corresponds to the UDP protocol message sent by the TCP tunnel conversion device of the client, then after the tunnel pipeline device receives the decrypted UDP protocol message, it will return the UDP protocol message to the TCP tunnel conversion device, and send it to the client application through the local TCP server created in the TCP tunnel conversion device; similarly, if the UDP protocol message returned by the server corresponds to the UDP protocol message sent by the UDP takeover device of the client, then after the tunnel pipeline device receives the decrypted UDP protocol message, it will return the UDP protocol message to the UDP takeover device, and the UDP takeover device will send the UDP protocol message to the client application.
步骤S303,通过转发端口返回第二类协议报文。Step S303: Return the second type protocol message through the forwarding port.
基于步骤S302,隧道管道装置匹配UDP的目的地址,得到的转发端口,本申请上述步骤S303中,将得到的转发端口,通过该转发端口返回UDP协议报文至客户端应用程序。Based on step S302, the tunnel pipeline device matches the destination address of UDP and obtains the forwarding port. In the above step S303 of this application, the obtained forwarding port is used to return the UDP protocol message to the client application through the forwarding port.
进一步地,可选的,步骤S303中通过转发端口返回第二类协议报文包括:Further, optionally, returning the second type of protocol message through the forwarding port in step S303 includes:
Step1,检测目的地址对应的转发端口支持的协议报文的类型;Step 1: Detect the type of protocol message supported by the forwarding port corresponding to the destination address;
本申请步骤S303中的Step1中,若要通过转发端口返回第二类协议报文,则通过检测目的地址对应的转发端口支持的协议报文的类型,即,判断该UDP协议报文中的目的地址对应的转发端口所支持的协议报文的类型是TCP协议报文或UDP协议报文。In Step 1 of step S303 of this application, if the second type of protocol message is to be returned through the forwarding port, the type of protocol message supported by the forwarding port corresponding to the destination address is detected, that is, it is determined whether the type of protocol message supported by the forwarding port corresponding to the destination address in the UDP protocol message is a TCP protocol message or a UDP protocol message.
Step2,依据转发端口支持的协议报文的类型发送第二类协议报文。Step 2: Send the second type of protocol message according to the type of protocol message supported by the forwarding port.
基于Step1中,检测转发端口所支持的协议报文的类型,本申请Step2中,通过检测转发端口所支持的协议报文的类型,将UDP协议报文通过对应的转发端口发送,具体如何依据转发端口支持的协议报文的类型发送第二类协议报文见步骤A和步骤B,或,步骤A’。Based on Step 1, the type of protocol message supported by the forwarding port is detected. In Step 2 of this application, the UDP protocol message is sent through the corresponding forwarding port by detecting the type of protocol message supported by the forwarding port. For specific information on how to send the second type of protocol message based on the type of protocol message supported by the forwarding port, see Step A and Step B, or Step A’.
可选的,Step2中依据转发端口支持的协议报文的类型发送第二类协议报文包括:Optionally, in Step 2, sending the second type of protocol message according to the type of protocol message supported by the forwarding port includes:
步骤A,当检测到转发端口支持的协议报文的类型为第一类协议报文时,获取第二类协议报文中的数据;Step A, when it is detected that the type of the protocol message supported by the forwarding port is the first type of protocol message, obtaining data in the second type of protocol message;
步骤B,通过对应的转发端口返回数据。Step B: Return data through the corresponding forwarding port.
结合步骤A和步骤B,当隧道管道装置检测到转发端口支持的协议报文类型为TCP协议报文时,TCP隧道转换装置中通过本地的TCP服务器获取UDP协议报文中的数据,进而通过TCP隧道转换装置对应的转发端口返回获取到的UDP协议报文中的数据。In combination with step A and step B, when the tunnel pipeline device detects that the protocol message type supported by the forwarding port is a TCP protocol message, the TCP tunnel conversion device obtains the data in the UDP protocol message through the local TCP server, and then returns the obtained data in the UDP protocol message through the forwarding port corresponding to the TCP tunnel conversion device.
可选的,Step2中依据转发端口支持的协议报文的类型发送第二类协议报文包括:Optionally, in Step 2, sending the second type of protocol message according to the type of protocol message supported by the forwarding port includes:
步骤A’,当检测到转发端口支持的协议报文的类型为第二类协议报文时,通过对应的转发端口返回第二类协议报文。Step A': when it is detected that the type of the protocol message supported by the forwarding port is the second type protocol message, the second type protocol message is returned through the corresponding forwarding port.
本申请步骤A’中,当隧道管道装置检测到转发端口支持的协议报文类型为UDP协议报文时,UDP接管装置通过对应的端口返回接收到的UDP协议报文。In step A' of the present application, when the tunnel pipeline device detects that the protocol message type supported by the forwarding port is a UDP protocol message, the UDP takeover device returns the received UDP protocol message through the corresponding port.
本申请实施例提供的用于构建虚拟专用网络的方法中,通过在客户端侧配置图2所示的客户短隧道装置,通过检测接收到的协议报文的报文类型,判断该协议报文的报文类型是否为在VPN隧道中用于通信的报文类型,在判断结果为否的情况下,将该协议报文转换为在VPN隧道中用于通信的报文类型,并通过依据该协议报文的业务类型为该协议报文匹配对应的加密规则,并依据该加密规则对该协议报文进行加密,进而在判断该协议报文是否存在网络攻击的攻击特征,决定是否将该协议报文发送至服务器,本申请实施例提供的用于构建虚拟专用网络的方法可以应用于挑战攻击(Challenge Collapsar,简称CC)环境,通过在客户端部署数据检测模块,防止恶意利用隧道装置发起攻击,并且,本申请实施例中通过使用UDP协议报文这类所有网络设备均支持的通信协议,解决了VPN网络的兼容问题,且,通过协议报文的业务类型匹配对应的加密规则,能够灵活的调整加密范围和测量,以使得在服务器侧检测和解密的过程中缩短数据处理时间,提升数据处理效率。In the method for establishing a virtual private network provided by an embodiment of the present application, the client short tunnel device shown in Figure 2 is configured on the client side. By detecting the message type of the received protocol message, it is determined whether the message type of the protocol message is the message type used for communication in the VPN tunnel. If the determination result is negative, the protocol message is converted to the message type used for communication in the VPN tunnel. The protocol message is matched with a corresponding encryption rule based on the service type of the protocol message, and the protocol message is encrypted according to the encryption rule. Then, after determining whether the protocol message has attack characteristics of a network attack, it is determined whether the protocol message is sent to the server. The method for establishing a virtual private network provided by the embodiment of the present application can be applied to a Challenge Collapsar (CC) environment. By deploying a data detection module on the client side, malicious attacks launched by the tunnel device are prevented. In addition, by using a communication protocol such as UDP protocol messages, which are supported by all network devices, the embodiment of the present application solves the compatibility problem of the VPN network. Moreover, by matching the service type of the protocol message with the corresponding encryption rule, the encryption range and measurement can be flexibly adjusted, thereby shortening data processing time and improving data processing efficiency during the detection and decryption process on the server side.
此外,本申请实施例提供的用于构建虚拟专用网络的方法基于UDP协议,相当于是一个应用层的程序,因此区别于相关技术中在无盘工作站环境下,由于添加网卡等硬件设备需要重启,但是在无盘工作站情况下一但重启所有改动都会还原,故本申请实施例提供的用于构建虚拟专用网络的方法不需要添加网卡等硬件设备。In addition, the method for building a virtual private network provided in the embodiment of the present application is based on the UDP protocol, which is equivalent to an application layer program. Therefore, it is different from the related technology in a diskless workstation environment, where adding hardware devices such as network cards requires a restart. However, in the case of a diskless workstation, all changes will be restored once the workstation is restarted. Therefore, the method for building a virtual private network provided in the embodiment of the present application does not require adding hardware devices such as network cards.
实施例2Example 2
本申请提供了如图5所示的用于构建虚拟专用网络的方法。图5是根据本发明实施例二的用于构建虚拟专用网络的方法的流程图。The present application provides a method for constructing a virtual private network as shown in Figure 5. Figure 5 is a flow chart of a method for constructing a virtual private network according to a second embodiment of the present invention.
步骤S502,接收客户端发送的第二类协议报文;Step S502: receiving a second type protocol message sent by the client;
本申请实施例提供的用于构建虚拟专用网络的方法可以适用于虚拟专用网络(Virtual Private Network,简称VPN)的建立,其中,以用户数据报协议(User DatagramProtocol,简称UDP)作为VPN隧道通信协议,解决VPN隧道两侧设备存在对特定通信协议的不兼容的问题。The method for constructing a virtual private network provided in an embodiment of the present application can be applied to the establishment of a virtual private network (VPN), wherein the User Datagram Protocol (UDP) is used as the VPN tunnel communication protocol to solve the problem of incompatibility between devices on both sides of the VPN tunnel for specific communication protocols.
本申请上述步骤S502中,对应实施例一中,在客户端侧配置的客户端隧道装置,图6(a)是根据本发明实施例二的用于构建虚拟专用网络的方法中隧道终结装置的结构示意图,如图6(a)所示,本申请实施例二中在网络设备侧,配置隧道终结装置接收由客户端隧道装置发送的第二类协议报文,并对该第二类协议报文进行解析处理,其中,在本申请实施例中第二类协议报文为用户数据报协议(User Datagram Protocol,简称UDP)报文,在网络设备侧配置隧道终结装置的过程中与客户端一样,通过以UDP协议报文作为通用通信协议,以达到客户端与网络侧设备端兼容的效果,避免了相关技术中由于VPN隧道的两侧设备不支持特定的通信协议带来的不兼容问题,规避了VPN隧道建立失败的现象发生。In the above step S502 of the present application, corresponding to the first embodiment, the client tunnel device is configured on the client side. Figure 6(a) is a structural diagram of the tunnel termination device in the method for building a virtual private network according to the second embodiment of the present application. As shown in Figure 6(a), in the second embodiment of the present application, on the network device side, a tunnel termination device is configured to receive the second type of protocol message sent by the client tunnel device, and parse and process the second type of protocol message. In the embodiment of the present application, the second type of protocol message is a User Datagram Protocol (UDP) message. In the process of configuring the tunnel termination device on the network device side, as with the client, UDP protocol messages are used as the general communication protocol to achieve compatibility between the client and the network side device, thereby avoiding the incompatibility problem caused by the devices on both sides of the VPN tunnel not supporting a specific communication protocol in the related technology, and avoiding the occurrence of the failure of VPN tunnel establishment.
其中,本申请实施例中协议报文的报文类型包括:用户数据报协议(UserDatagram Protocol,简称UDP)或传输控制协议(Transmission Control Protocol,简称TCP),在本申请实施例中将以TCP协议结构封装的报文作为第一类协议报文,将以UDP协议结构封装的报文作为第二类协议报文。Among them, the message types of the protocol messages in the embodiment of the present application include: User Datagram Protocol (UDP) or Transmission Control Protocol (TCP). In the embodiment of the present application, the message encapsulated in the TCP protocol structure is regarded as the first type of protocol message, and the message encapsulated in the UDP protocol structure is regarded as the second type of protocol message.
步骤S504,判断第二类协议报文中的报文参数是否存在网络攻击的攻击特征;Step S504, determining whether the message parameters in the second type of protocol message contain attack characteristics of a network attack;
基于步骤S502,通过隧道终结装置中的收发包模块,接收来自客户端发送的UDP协议报文,本申请上述步骤S504中,通过隧道终结装置中的数据检测模块判断在该UDP协议报文中,该UDP协议报文中的报文参数是否存在网络攻击的攻击特征。Based on step S502, the UDP protocol message sent from the client is received through the packet receiving and sending module in the tunnel termination device. In the above step S504 of the present application, the data detection module in the tunnel termination device is used to determine whether the message parameters in the UDP protocol message have attack characteristics of a network attack.
其中,区别于客户端侧,在网络设备侧,该数据检测模块为不可跳过模块,即,所以通过步骤S502中的收发包模块接收的UDP协议报文均需由数据检测模块对该UDP协议报文的合法性进行检查,以最快的速度检测报文的合法性并丢弃不合法的数据。降低数据解密模块的压力和整体系统负载。Unlike the client side, the data inspection module on the network device side is a non-skippable module. That is, all UDP protocol packets received by the packet transceiver module in step S502 must be checked for legitimacy by the data inspection module. This module checks the legitimacy of the packets as quickly as possible and discards any illegal data. This reduces the pressure on the data decryption module and the overall system load.
步骤S506,在判断结果为否的情况下,依据服务器的类型将第二类协议报文发送至对应的发送端口。Step S506: If the judgment result is no, the second type protocol message is sent to the corresponding sending port according to the type of the server.
基于步骤S504中,对UDP协议报文安全性的判断检查,本申请上述步骤S504中,当得到该UDP协议报文中的报文参数不存在与网络攻击的攻击特征的判断结果时,通过隧道终结装置中的会员装置依据服务器的类型为该UDP协议报文分配对应发送端口。Based on the judgment check on the security of the UDP protocol message in step S504, in the above step S504 of the present application, when the judgment result is obtained that the message parameters in the UDP protocol message do not exist and the attack characteristics of the network attack are not met, the member device in the tunnel termination device allocates a corresponding sending port for the UDP protocol message according to the type of server.
这里当判断结果为是时,网络设备侧将通过数据检测模块丢弃不合法的UDP协议报文,在降低数据揭秘模块压力的基础上,保障在服务器端的安全。Here, when the judgment result is yes, the network device side will discard the illegal UDP protocol message through the data detection module, thereby reducing the pressure on the data decryption module and ensuring security on the server side.
由上可知,本申请上述实施例二所提供的方案,通过接收客户端发送的第二类协议报文;判断第二类协议报文中的报文参数是否存在网络攻击的攻击特征;在判断结果为否的情况下,依据服务器的类型将第二类协议报文发送至对应的发送端口。达到了VPN网络中的两侧支持不同通信协议的设备兼容的目的,从而实现了建立VPN隧道的技术效果,进而解决了由于VPN网络两侧设备存在对特定通信协议的不兼容的问题,导致VPN隧道无法建立的技术问题。As can be seen from the above, the solution provided in the second embodiment of the present application receives a second-type protocol message sent by a client; determines whether the message parameters in the second-type protocol message contain attack characteristics of a network attack; and if the determination result is negative, sends the second-type protocol message to the corresponding sending port based on the server type. This achieves the goal of compatibility between devices supporting different communication protocols on both sides of the VPN network, thereby achieving the technical effect of establishing a VPN tunnel, and further solving the technical problem of being unable to establish a VPN tunnel due to incompatibility between devices on both sides of the VPN network for specific communication protocols.
可选的,在步骤S506依据服务器的类型将第二类协议报文发送至对应的发送端口之前,本申请实施例提供的用于构建虚拟专用网络的方法包括:Optionally, before sending the second type of protocol message to the corresponding sending port according to the type of server in step S506, the method for establishing a virtual private network provided in an embodiment of the present application includes:
步骤S505,对第二类协议报文依据预设解密规则解密。Step S505: decrypt the second type of protocol message according to a preset decryption rule.
本申请步骤S505中,在步骤S506依据服务器的类型将第二类协议报文发送至对应的发送端口之前,如图6(a)所述,隧道终结装置还需要通过数据解密模块对数据检测模块检测合格的UDP协议报文进行解密。In step S505 of the present application, before sending the second type of protocol message to the corresponding sending port according to the type of server in step S506, as shown in Figure 6(a), the tunnel termination device also needs to decrypt the UDP protocol message that has passed the data detection module detection through the data decryption module.
其中,解密规则,用于通过UDP协议报文的业务类型,对该UDP协议报文匹配对应的解密规则,以使得指示数据解密模块依据该解密规则执行特征解密。具体见步骤S505中的Step1和Step2。The decryption rule is used to match the UDP protocol message with the corresponding decryption rule according to the service type of the UDP protocol message, so that the instruction data decryption module performs feature decryption according to the decryption rule. See Step 1 and Step 2 in step S505 for details.
进一步地,可选的,步骤S505,对第二类协议报文依据预设解密规则解密包括:Further, optionally, step S505, decrypting the second type of protocol message according to a preset decryption rule includes:
Step1,依据第二类协议报文的业务类型匹配对应的解密规则;Step 1: Match the corresponding decryption rule according to the service type of the second type of protocol message;
本申请上述步骤S505中的Step1中,由于UDP协议报文的业务类型不同,该UDP协议报文的加密方式也会跟随业务类型的不同而变化,即,客户端与网络设备侧用于通信建立通信链路的协议报文,可以视为施用简单的加密规则,以使得在网络设备侧根据协议报文的业务类型,对应的执行简单的解密,节约了数据处理时间,减轻了系统的数据处理负担;而在进行实际的业务数据传输时,通过对该业务数据在UDP协议报文中执行多位加密,则对应的在网络设备侧执行多位解密,从而保障数据的安全,其中多位加密可以为依据UDP协议报文中各个报文参数的特性执行的加密,同样多位解密则可以为针对多位加密执行对应的解密行为。In Step 1 of the above-mentioned step S505 of the present application, due to the different business types of the UDP protocol message, the encryption method of the UDP protocol message will also change with the different business types, that is, the protocol message used by the client and the network device side to communicate and establish a communication link can be regarded as applying a simple encryption rule, so that on the network device side, according to the business type of the protocol message, a simple decryption is performed accordingly, which saves data processing time and reduces the data processing burden of the system; and when performing actual business data transmission, by performing multi-bit encryption on the business data in the UDP protocol message, multi-bit decryption is performed on the network device side accordingly, thereby ensuring data security, wherein the multi-bit encryption can be encryption performed according to the characteristics of each message parameter in the UDP protocol message, and similarly, the multi-bit decryption can be the corresponding decryption behavior performed for the multi-bit encryption.
由上可知,通过获取UDP协议报文的业务类型,匹配得到对应该UDP协议报文的解密规则。As can be seen from the above, by obtaining the service type of the UDP protocol message, the decryption rule corresponding to the UDP protocol message is matched.
Step2,依据解密规则对第二类协议报文执行特征解密,特征解密,用于指示依据第二类协议报文中的报文参数执行解密,报文参数包括:报文长度、特征值、发送速率及数据大小中的至少一项。Step 2, perform feature decryption on the second type of protocol message according to the decryption rules, feature decryption is used to indicate that decryption is performed based on message parameters in the second type of protocol message, and the message parameters include: at least one of message length, feature value, sending rate and data size.
基于Step1中,获得的解密规则,本申请上述Step2中,通过获取得到对应UDP协议报文的解密规则,依据该解密规则对该UDP协议报文执行特征解密,其中,根据解密规则,提取UDP协议报文中对应的加密区域,该加密区域对应UDP协议报文结构中对应的报文参数,例如,报文长度、特征值、发送速率以及数据大小中的至少一项,根据解密规则的指示,将对UDP协议报文中对应的特征执行解密。Based on the decryption rules obtained in Step 1, in the above Step 2 of the present application, the decryption rules corresponding to the UDP protocol message are obtained, and feature decryption is performed on the UDP protocol message according to the decryption rules, wherein, according to the decryption rules, the corresponding encrypted area in the UDP protocol message is extracted, and the encrypted area corresponds to the corresponding message parameters in the UDP protocol message structure, for example, at least one of the message length, feature value, sending rate and data size, and according to the instructions of the decryption rules, the corresponding features in the UDP protocol message are decrypted.
这里报文参数中的特征值可以为UDP协议报文中的奇偶校验值。Here, the characteristic value in the message parameter may be a parity check value in a UDP protocol message.
此外,如图6(a)所示,在对UDP协议报文执行解密后,为避免UDP协议报文在解密过程中的损坏,通过数据还原模块,对解密后的UDP协议报文执行数据还原,得到解密后完整的UDP协议报文,以使得保障服务器接收到的UDP协议报文准确和完整。In addition, as shown in Figure 6(a), after the UDP protocol message is decrypted, in order to avoid damage to the UDP protocol message during the decryption process, the decrypted UDP protocol message is restored through the data restoration module to obtain the complete UDP protocol message after decryption, so as to ensure that the UDP protocol message received by the server is accurate and complete.
可选的,步骤S506依据服务器的类型将解密后的第二类协议报文发送至对应的发送端口包括:Optionally, step S506 includes sending the decrypted second-type protocol message to a corresponding sending port according to the type of the server:
Step1,当服务器的类型为支持第二类协议报文时,将第二类协议报文通过第一类发送端口发送至服务器,其中,第一类发送端口为支持第二类协议报文的服务器对应的端口;Step 1: When the server type supports the second type of protocol message, the second type of protocol message is sent to the server through the first type of sending port, wherein the first type of sending port is the port corresponding to the server that supports the second type of protocol message;
本申请上述Step1中,若依据服务器的类型将解密后的第二类协议报文发送至对应的发送端口,则需要判断服务器的类型,以此,针对不同的服务器类型为UDP协议报文分配对应的发送端口。In the above Step 1 of this application, if the decrypted second-type protocol message is sent to the corresponding sending port according to the type of server, it is necessary to determine the type of server, so as to allocate corresponding sending ports for UDP protocol messages according to different server types.
其中,当该服务器的类型为支持UDP协议报文时,UDP协议报文将通过第一发送端口发送至服务器,其中,第一发送端口可以为如图6(a)所示的数据转发模块的发送端口。When the server type supports UDP protocol messages, the UDP protocol messages will be sent to the server through the first sending port, wherein the first sending port may be a sending port of the data forwarding module as shown in FIG6(a).
Step2,当服务器的类型为支持第一类协议报文时,获取第二类协议报文中的数据,并将数据通过第二类发送端口发送至服务器,其中,第二类发送端口为支持第一类协议报文的服务器对应的端口。Step 2: When the server type supports the first type of protocol message, obtain the data in the second type of protocol message and send the data to the server through the second type of sending port, where the second type of sending port is the port corresponding to the server that supports the first type of protocol message.
本申请上述Step2中,当该服务器的类型为支持TCP协议报文时,TCP协议报文将通过第二发送端口发送至服务器,其中,第二发送端口可以为如图6(a)所示的数据代理模块的发送端口。In the above Step 2 of the present application, when the type of the server is to support TCP protocol messages, the TCP protocol messages will be sent to the server through the second sending port, wherein the second sending port can be the sending port of the data proxy module as shown in Figure 6(a).
结合Step1和Step2,如图6(a)所示,回源装置包括:数据代理模式和数据转发模块两种不同的选择。数据转发模块和数据代理模块最大的区别在于是否可以解决隧道和服务端协议的异构问题。当服务端采用TCP协议提供服务时,就需要由代理模块进行转换。当服务端采用UDP协议提供服务时,就可以采用转发模块对数据进行透传。通过回源装置确保了服务器端和客户端的兼容问题,避免了相关技术中由于VPN隧道的两侧设备不支持特定的通信协议带来的不兼容问题,规避了VPN隧道建立失败的现象发生。Combining Step 1 and Step 2, as shown in Figure 6(a), the back-to-source device includes two different options: a data proxy mode and a data forwarding module. The biggest difference between the data forwarding module and the data proxy module is whether they can resolve the heterogeneity of the tunnel and server protocols. When the server uses the TCP protocol to provide services, the proxy module is required to convert the data. When the server uses the UDP protocol to provide services, the forwarding module can be used to transparently transmit the data. The back-to-source device ensures compatibility between the server and the client, avoiding the incompatibility issues caused by the devices on both sides of the VPN tunnel not supporting specific communication protocols in related technologies, and circumventing the failure of VPN tunnel establishment.
本申请实施例提供的用于构建虚拟专用网络的方法还可以和服务器端侧合并部署在一起,故,本申请实施例中用于构建虚拟专用网络的方法仅以适用于网络设备侧为例进行说明,以实现本申请实施例中用于构建虚拟专用网络的方法为准,具体不做限定。The method for building a virtual private network provided in the embodiment of the present application can also be deployed together with the server side. Therefore, the method for building a virtual private network in the embodiment of the present application is only described as applicable to the network device side. The method for building a virtual private network in the embodiment of the present application shall prevail and is not specifically limited.
本申请上述实施例提供的一种可选方案中,如图6(b)所示,本申请实施例的用于构建虚拟专用网络的方法可以包括以下步骤:In an optional solution provided in the above embodiment of the present application, as shown in FIG6( b ), the method for constructing a virtual private network in the embodiment of the present application may include the following steps:
步骤a,客户端检测预先接收到的协议报文的报文类型。In step a, the client detects the message type of the protocol message received in advance.
其中,在客户端的应用层配置客户端隧道装置,通过应用层协议对接装置检测接收到的协议报文的报文类型,其中,在本申请实施例提供的客户端中,该客户端可以包括:笔记本电脑、台式电脑、平板电脑及私人电脑(Personal Computer,简称PC)等能够接入支持UDP协议的客户端。Among them, a client tunnel device is configured at the application layer of the client, and the message type of the received protocol message is detected through the application layer protocol docking device. Among them, in the client provided in the embodiment of the present application, the client may include: laptop computers, desktop computers, tablet computers and personal computers (Personal Computer, referred to as PC), etc. that can access clients that support the UDP protocol.
步骤b,当协议报文的报文类型为第一类协议报文时,将协议报文转换为在虚拟专用网络中用于通信的第二类协议报文。Step b: When the message type of the protocol message is a first type protocol message, convert the protocol message into a second type protocol message used for communication in the virtual private network.
步骤c,检测第二类协议报文中的报文参数,判断报文参数是否存在网络攻击的攻击特征。Step c: detecting message parameters in the second type of protocol message and determining whether the message parameters contain attack features of a network attack.
步骤d,在判断结果为否的情况下,发送第二类协议报文至服务器。Step d: If the judgment result is no, send the second type protocol message to the server.
其中,在判断结果为是的情况下,丢弃第二类协议报文。If the judgment result is yes, the second type of protocol message is discarded.
步骤e,服务器判断第二类协议报文中的报文参数是否存在网络攻击的攻击特征。In step e, the server determines whether the message parameters in the second type of protocol message contain attack features of a network attack.
步骤f,在判断结果为否的情况下,依据服务器的类型将第二类协议报文发送至对应的发送端口。Step f: If the judgment result is no, the second type protocol message is sent to the corresponding sending port according to the type of the server.
其中,当判断结果为是时,服务器将通过数据检测模块丢弃不合法的UDP协议报文,在降低数据揭秘模块压力的基础上,保障在服务器端的安全。Among them, when the judgment result is yes, the server will discard the illegal UDP protocol message through the data detection module, thereby reducing the pressure on the data decryption module and ensuring security on the server side.
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为依据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明所必须的。It should be noted that for the aforementioned method embodiments, for simplicity of description, they are all expressed as a series of action combinations. However, those skilled in the art should be aware that the present invention is not limited by the order of the actions described, because according to the present invention, certain steps can be performed in other orders or simultaneously. Secondly, those skilled in the art should also be aware that the embodiments described in this specification are all preferred embodiments, and the actions and modules involved are not necessarily required by the present invention.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的用于构建虚拟专用网络的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the method for building a virtual private network according to the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is a better implementation method. Based on this understanding, the technical solution of the present invention, or the part that contributes to the prior art, can be embodied in the form of a software product. The computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), and includes a number of instructions for enabling a terminal device (which can be a mobile phone, computer, server, or network device, etc.) to execute the methods described in each embodiment of the present invention.
实施例3Example 3
根据本发明实施例,还提供了一种用于实施上述方法的装置实施例,本申请上述实施例所提供的装置可以在客户端上运行。According to an embodiment of the present invention, a device embodiment for implementing the above method is also provided. The device provided in the above embodiment of the present application can be run on a client.
图7是根据本发明实施例三的用于构建虚拟专用网络的装置的结构示意图。FIG7 is a schematic structural diagram of an apparatus for building a virtual private network according to a third embodiment of the present invention.
如图7所示,该装置包括:检测模块72、转换模块74、判断模块76和发送模块78。As shown in FIG. 7 , the device includes: a detection module 72 , a conversion module 74 , a judgment module 76 and a sending module 78 .
其中,检测模块72,用于检测预先接收到的协议报文的报文类型;转换模块74,用于当协议报文的报文类型为第一类协议报文时,将协议报文转换为在虚拟专用网络中用于通信的第二类协议报文;判断模块76,用于检测第二类协议报文中的报文参数,判断报文参数是否存在网络攻击的攻击特征;发送模块78,用于在判断结果为否的情况下,发送第二类协议报文。Among them, the detection module 72 is used to detect the message type of the protocol message received in advance; the conversion module 74 is used to convert the protocol message into a second type of protocol message used for communication in the virtual private network when the message type of the protocol message is a first type of protocol message; the judgment module 76 is used to detect the message parameters in the second type of protocol message and judge whether the message parameters have attack characteristics of a network attack; the sending module 78 is used to send the second type of protocol message when the judgment result is no.
由上可知,本申请上述实施例三所提供的方案,通过检测预先接收到的协议报文的报文类型;当协议报文的报文类型为第一类协议报文时,将协议报文转换为在虚拟专用网络中用于通信的第二类协议报文;检测第二类协议报文中的报文参数,判断报文参数是否存在网络攻击的攻击特征;在判断结果为否的情况下,发送第二类协议报文,达到了VPN网络中的两侧支持不同通信协议的设备兼容的目的,从而实现了建立VPN隧道的技术效果,进而解决了由于VPN网络两侧设备存在对特定通信协议的不兼容的问题,导致VPN隧道无法建立的技术问题。As can be seen from the above, the solution provided in the above-mentioned embodiment 3 of the present application detects the message type of the protocol message received in advance; when the message type of the protocol message is a first-class protocol message, the protocol message is converted into a second-class protocol message used for communication in the virtual private network; the message parameters in the second-class protocol message are detected to determine whether the message parameters contain attack characteristics of a network attack; if the judgment result is no, the second-class protocol message is sent, thereby achieving the purpose of compatibility between devices on both sides of the VPN network that support different communication protocols, thereby realizing the technical effect of establishing a VPN tunnel, and further solving the technical problem that the VPN tunnel cannot be established due to the incompatibility of devices on both sides of the VPN network with specific communication protocols.
此处需要说明的是,上述检测模块72、转换模块74、判断模块76和发送模块78对应于实施例一中的步骤S202至步骤S208,四个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的客户端隧道装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the detection module 72, conversion module 74, judgment module 76, and sending module 78 described above correspond to steps S202 to S208 in the first embodiment. The examples and application scenarios implemented by these four modules and the corresponding steps are the same, but are not limited to the contents disclosed in the first embodiment. It should be noted that the above modules, as part of the device, can run in the client tunnel device provided in the first embodiment and can be implemented via software or hardware.
可选的,图8是根据本发明实施例三的一种用于构建虚拟专用网络的装置的结构示意图。如图8所示,转换模块74包括:获取单元741和封装单元742,Optionally, FIG8 is a schematic diagram of the structure of a device for building a virtual private network according to the third embodiment of the present invention. As shown in FIG8, the conversion module 74 includes: an acquisition unit 741 and an encapsulation unit 742,
其中,获取单元741,用于获取协议报文中的数据;封装单元742,用于依据第二类协议报文的格式封装数据,得到报文类型为第二类协议报文的协议报文。The acquisition unit 741 is used to acquire data in the protocol message; the encapsulation unit 742 is used to encapsulate the data according to the format of the second type of protocol message to obtain a protocol message of the second type of protocol message.
此处需要说明的是,上述获取单元741和封装单元742对应于实施例一中的步骤S204中的步骤Step1和步骤Step2,两个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的客户端隧道装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the acquisition unit 741 and encapsulation unit 742 correspond to Step 1 and Step 2 in Step S204 in the first embodiment. The examples and application scenarios implemented by the two modules and the corresponding steps are the same, but are not limited to the contents disclosed in the first embodiment. It should be noted that the above modules, as part of the device, can run in the client tunnel device provided in the first embodiment and can be implemented through software or hardware.
可选的,图9是根据本发明实施例三的另一种用于构建虚拟专用网络的装置的结构示意图。如图9所示,本申请实施例提供的用于构建虚拟专用网络的装置还包括:加密模块95,Optionally, FIG9 is a structural diagram of another device for building a virtual private network according to embodiment 3 of the present invention. As shown in FIG9, the device for building a virtual private network provided by the embodiment of the present application further includes: an encryption module 95,
其中,加密模块95,用于在检测第二类协议报文中的报文参数之前,依据协议报文的业务类型匹配得到对应的加密规则,并依据加密规则对第二类协议报文进行加密,其中,加密规则用于指示在加密过程中依据业务类型更改加密密级。Among them, the encryption module 95 is used to obtain the corresponding encryption rules based on the business type of the protocol message before detecting the message parameters in the second type of protocol message, and encrypt the second type of protocol message according to the encryption rules, wherein the encryption rules are used to indicate that the encryption level is changed according to the business type during the encryption process.
此处需要说明的是,上述加密模块95对应于实施例一中的步骤S205,该模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的客户端隧道装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the encryption module 95 corresponds to step S205 in the first embodiment. The examples and application scenarios implemented by this module and the corresponding steps are the same, but are not limited to the contents disclosed in the first embodiment. It should be noted that the module, as part of the device, can run in the client tunnel device provided in the first embodiment and can be implemented via software or hardware.
进一步地,可选的,图10是根据本发明实施例三的又一种用于构建虚拟专用网络的装置的结构示意图。如图10所示,加密模块95包括:加密单元951,Further, optionally, FIG10 is a structural diagram of another apparatus for building a virtual private network according to the third embodiment of the present invention. As shown in FIG10 , the encryption module 95 includes: an encryption unit 951,
其中,加密单元951,用于根据加密规则对第二类协议报文执行特征加密,其中,特征加密为依据第二类协议报文中的报文参数进行加密。The encryption unit 951 is configured to perform characteristic encryption on the second type of protocol message according to the encryption rule, wherein the characteristic encryption is encryption based on message parameters in the second type of protocol message.
此处需要说明的是,上述加密单元951对应于实施例一中的步骤S205中的Step1,该模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的客户端隧道装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the encryption unit 951 corresponds to Step 1 in Step S205 of the first embodiment. The examples and application scenarios implemented by this module and the corresponding steps are the same, but are not limited to the contents disclosed in the first embodiment. It should be noted that the module, as part of the device, can run in the client tunnel device provided in the first embodiment and can be implemented via software or hardware.
可选的,图11是根据本发明实施例三的再一种用于构建虚拟专用网络的装置的结构示意图。如图11所示,判断模块76包括:检测单元761、第一判断单元762和第二判断单元963,Optionally, FIG11 is a schematic diagram of the structure of another apparatus for building a virtual private network according to the third embodiment of the present invention. As shown in FIG11, the judgment module 76 includes: a detection unit 761, a first judgment unit 762 and a second judgment unit 963,
其中,检测单元761,用于检测第二类协议报文中的报文参数中的报文长度、特征值、发送速率及数据大小;第一判断单元762,用于判断报文参数中的报文长度、特征值、发送速率及数据大小中的至少一项是否与预设的攻击特征匹配;第二判断单元763,用于依据报文参数与攻击特征的匹配结果判断协议报文是否存在网络攻击。Among them, the detection unit 761 is used to detect the message length, characteristic value, sending rate and data size in the message parameters of the second type of protocol message; the first judgment unit 762 is used to determine whether at least one of the message length, characteristic value, sending rate and data size in the message parameters matches the preset attack feature; the second judgment unit 763 is used to determine whether the protocol message has a network attack based on the matching result between the message parameters and the attack feature.
此处需要说明的是,上述检测单元761、第一判断单元762和第二判断单元763对应于实施例一中的步骤S206中的Step1至Step3,三个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的客户端隧道装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the detection unit 761, first judgment unit 762, and second judgment unit 763 described above correspond to Steps 1 to 3 of Step S206 in Example 1. The examples and application scenarios implemented by these three modules and the corresponding steps are the same, but are not limited to those disclosed in Example 1. It should be noted that the above modules, as part of the device, can run in the client tunnel device provided in Example 1 and can be implemented via software or hardware.
可选的,本申请实施例提供的用于构建虚拟专用网络的装置还包括:执行模块,Optionally, the apparatus for constructing a virtual private network provided in the embodiment of the present application further includes: an execution module,
其中,执行模块,用于在判断结果为是的情况下,丢弃协议报文。The execution module is configured to discard the protocol message if the judgment result is yes.
此处需要说明的是,上述执行模块对应于实施例一中的步骤S209,该模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的客户端隧道装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the execution module described above corresponds to step S209 in Example 1. The examples and application scenarios implemented by this module and the corresponding step are the same, but are not limited to the content disclosed in Example 1. It should be noted that the module described above, as part of the device, can run in the client tunnel device provided in Example 1 and can be implemented via software or hardware.
可选的,本申请实施例提供的用于构建虚拟专用网络的装置还包括:接收模块、匹配模块和反馈模块,Optionally, the apparatus for constructing a virtual private network provided in the embodiment of the present application further includes: a receiving module, a matching module and a feedback module.
其中,接收模块,用于接收服务器返回的第二类协议报文;匹配模块,用于依据第二类协议报文的目的地址匹配对应的转发端口;反馈模块,用于通过转发端口返回第二类协议报文。Among them, the receiving module is used to receive the second type protocol message returned by the server; the matching module is used to match the corresponding forwarding port according to the destination address of the second type protocol message; and the feedback module is used to return the second type protocol message through the forwarding port.
此处需要说明的是,上述接收模块、匹配模块和反馈模块对应于实施例一中的步骤S301至步骤S303,三个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的客户端隧道装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the receiving module, matching module, and feedback module described above correspond to steps S301 to S303 in Example 1. The examples and application scenarios implemented by these three modules and the corresponding steps are the same, but are not limited to the contents disclosed in Example 1. It should be noted that the above modules, as part of the device, can run in the client tunnel device provided in Example 1 and can be implemented via software or hardware.
进一步地,可选的,反馈模块包括:类型检测单元和发送单元,Further, optionally, the feedback module includes: a type detection unit and a sending unit,
其中,类型检测单元,用于检测目的地址对应的转发端口支持的协议报文的类型;发送单元,用于依据转发端口支持的协议报文的类型发送第二类协议报文。The type detection unit is used to detect the type of protocol message supported by the forwarding port corresponding to the destination address; and the sending unit is used to send the second type of protocol message according to the type of protocol message supported by the forwarding port.
此处需要说明的是,上述类型检测单元和发送单元对应于实施例一中的步骤S303至的Step1和Step2,两个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的客户端隧道装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the above-mentioned type detection unit and sending unit correspond to Steps S303 to Step 1 and Step 2 in Example 1. The examples and application scenarios implemented by these two modules and the corresponding steps are the same, but are not limited to the contents disclosed in Example 1. It should be noted that the above-mentioned modules, as part of the device, can run in the client tunnel device provided in Example 1 and can be implemented through software or hardware.
可选的,发送单元包括:获取子单元和第一发送子单元,Optionally, the sending unit includes: an acquiring subunit and a first sending subunit,
其中,获取子单元,用于当检测到转发端口支持的协议报文的类型为第一类协议报文时,获取第二类协议报文中的数据;第一发送子单元,用于通过对应的转发端口返回数据。The acquiring subunit is used to acquire data in the second type of protocol message when it is detected that the type of protocol message supported by the forwarding port is the first type of protocol message; the first sending subunit is used to return data through the corresponding forwarding port.
此处需要说明的是,上述此处需要说明的是,上述类型检测单元和发送单元对应于实施例一中的步骤Step2中的步骤A和步骤B,两个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的客户端隧道装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the above-mentioned type detection unit and sending unit correspond to steps A and B in Step 2 of Example 1. The examples and application scenarios implemented by the two modules and the corresponding steps are the same, but are not limited to the contents disclosed in Example 1. It should be noted that the above-mentioned modules, as part of the device, can run in the client tunnel device provided in Example 1 and can be implemented through software or hardware.
可选的,发送单元包括:第二发送子单元,Optionally, the sending unit includes: a second sending subunit,
其中,第二发送子单元,用于当检测到转发端口支持的协议报文的类型为第二类协议报文时,通过对应的转发端口返回第二类协议报文。The second sending subunit is configured to return the second type of protocol message through the corresponding forwarding port when detecting that the type of the protocol message supported by the forwarding port is the second type of protocol message.
此处需要说明的是,上述此处需要说明的是,上述第二发送子单元对应于实施例一中的步骤Step2中的步骤A’,该模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例一所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例一提供的客户端隧道装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the second sending subunit corresponds to step A' in Step 2 of Example 1. This module and the corresponding steps implement the same examples and application scenarios, but are not limited to the contents disclosed in Example 1. It should be noted that the module, as part of the device, can run in the client tunnel device provided in Example 1 and can be implemented through software or hardware.
实施例4Example 4
根据本发明实施例,还提供了一种用于实施2中所述方法的装置实施例,本申请上述实施例所提供的装置可以在客户端上运行。According to an embodiment of the present invention, a device embodiment for implementing the method described in 2 is also provided. The device provided in the above embodiment of the present application can be run on a client.
图12是根据本发明实施例四的用于构建虚拟专用网络的装置的结构示意图。FIG12 is a schematic structural diagram of an apparatus for building a virtual private network according to a fourth embodiment of the present invention.
如图12所示,该装置包括:接收模块1202、判断模块1204和发送模块1206,As shown in FIG12 , the device includes: a receiving module 1202, a judging module 1204 and a sending module 1206.
其中,接收模块1202,用于接收客户端发送的第二类协议报文;判断模块1204,用于判断第二类协议报文中的报文参数是否存在网络攻击的攻击特征;发送模块1206,用于在判断结果为否的情况下,依据服务器的类型将第二类协议报文发送至对应的发送端口。Among them, the receiving module 1202 is used to receive the second-type protocol message sent by the client; the judging module 1204 is used to judge whether the message parameters in the second-type protocol message have attack characteristics of a network attack; the sending module 1206 is used to send the second-type protocol message to the corresponding sending port according to the type of server when the judgment result is no.
由上可知,本申请上述实施例四所提供的方案,通过接收客户端发送的第二类协议报文;判断第二类协议报文中的报文参数是否存在网络攻击的攻击特征;在判断结果为否的情况下,依据服务器的类型将第二类协议报文发送至对应的发送端口。达到了VPN网络中的两侧支持不同通信协议的设备兼容的目的,从而实现了建立VPN隧道的技术效果,进而解决了由于VPN网络两侧设备存在对特定通信协议的不兼容的问题,导致VPN隧道无法建立的技术问题。As can be seen from the above, the solution provided in the fourth embodiment of the present application receives a second-type protocol message sent by a client; determines whether the message parameters in the second-type protocol message contain attack characteristics of a network attack; and if the determination result is negative, sends the second-type protocol message to the corresponding sending port based on the server type. This achieves the purpose of compatibility between devices supporting different communication protocols on both sides of the VPN network, thereby achieving the technical effect of establishing a VPN tunnel, and further solving the technical problem of being unable to establish a VPN tunnel due to incompatibility between devices on both sides of the VPN network for specific communication protocols.
此处需要说明的是,上述接收模块1202、判断模块1204和发送模块1206对应于实施例二中的步骤S502至步骤S506,三个模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例二所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例二提供的隧道终结装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the receiving module 1202, the judging module 1204, and the sending module 1206 correspond to steps S502 to S506 in the second embodiment. The examples and application scenarios implemented by the three modules and the corresponding steps are the same, but are not limited to the contents disclosed in the second embodiment. It should be noted that the above modules, as part of the device, can run in the tunnel termination device provided in the second embodiment and can be implemented by software or hardware.
可选的,图13是根据本发明实施例四的一种用于构建虚拟专用网络的装置的结构示意图。如图13所示,本申请实施例提供的用于构建虚拟专用网络的装置还包括:解密模块1205,Optionally, FIG13 is a schematic diagram of the structure of a device for building a virtual private network according to a fourth embodiment of the present invention. As shown in FIG13, the device for building a virtual private network provided by the embodiment of the present application further includes: a decryption module 1205,
其中,解密模块1205,用于在依据服务器的类型将第二类协议报文发送至对应的发送端口之前,对第二类协议报文依据预设解密规则解密。The decryption module 1205 is configured to decrypt the second type of protocol message according to a preset decryption rule before sending the second type of protocol message to a corresponding sending port according to the type of server.
此处需要说明的是,上述解密模块1205对应于实施例二中的步骤S505,该模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例二所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例二提供的隧道终结装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the decryption module 1205 corresponds to step S505 in Example 2. The examples and application scenarios implemented by this module and the corresponding steps are the same, but are not limited to the contents disclosed in Example 2. It should be noted that the above module, as part of the device, can run in the tunnel termination device provided in Example 2 and can be implemented through software or hardware.
进一步地,可选的,图14是根据本发明实施例四的另一种用于构建虚拟专用网络的装置的结构示意图。如图14所示,解密模块1205包括:匹配单元12051和解密单元12052,Further, optionally, FIG14 is a structural diagram of another apparatus for building a virtual private network according to Embodiment 4 of the present invention. As shown in FIG14 , the decryption module 1205 includes: a matching unit 12051 and a decryption unit 12052.
其中,匹配单元12051,用于依据第二类协议报文的业务类型匹配对应的解密规则;解密单元12052,用于依据解密规则对第二类协议报文执行特征解密,特征解密,用于指示依据第二类协议报文中的报文参数执行解密,报文参数包括:报文长度、特征值、发送速率及数据大小中的至少一项。Among them, the matching unit 12051 is used to match the corresponding decryption rules according to the business type of the second type of protocol message; the decryption unit 12052 is used to perform feature decryption on the second type of protocol message according to the decryption rules, and the feature decryption is used to indicate that decryption is performed based on the message parameters in the second type of protocol message, and the message parameters include: at least one of: message length, feature value, sending rate and data size.
此处需要说明的是,上述匹配单元12051和解密单元12052对应于实施例二中的步骤S505中的Step1和Step2,两模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例二所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例二提供的隧道终结装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the matching unit 12051 and the decryption unit 12052 correspond to Step 1 and Step 2 in Step S505 of Example 2. The examples and application scenarios implemented by the two modules and the corresponding steps are the same, but are not limited to the contents disclosed in Example 2. It should be noted that the above modules, as part of the device, can run in the tunnel termination device provided in Example 2 and can be implemented through software or hardware.
可选的,图15是根据本发明实施例四的又一种用于构建虚拟专用网络的装置的结构示意图。如图15所示,发送模块1206包括:第一发送单元12061和第二发送单元12062,Optionally, FIG15 is a structural diagram of another apparatus for building a virtual private network according to Embodiment 4 of the present invention. As shown in FIG15 , the sending module 1206 includes: a first sending unit 12061 and a second sending unit 12062,
其中,第一发送单元12061,用于当服务器的类型为支持第二类协议报文时,将第二类协议报文通过第一类发送端口发送至服务器,其中,第一类发送端口为支持第二类协议报文的服务器对应的端口;第二发送单元12062,用于当服务器的类型为支持第一类协议报文时,获取第二类协议报文中的数据,并将数据通过第二类发送端口发送至服务器,其中,第二类发送端口为支持第一类协议报文的服务器对应的端口。Among them, the first sending unit 12061 is used to send the second type of protocol message to the server through the first type of sending port when the type of server supports the second type of protocol message, wherein the first type of sending port is the port corresponding to the server that supports the second type of protocol message; the second sending unit 12062 is used to obtain the data in the second type of protocol message when the type of server supports the first type of protocol message, and send the data to the server through the second type of sending port, wherein the second type of sending port is the port corresponding to the server that supports the first type of protocol message.
此处需要说明的是,上述第一发送单元12061和第二发送单元12062对应于实施例二中的步骤S506中的Step1和Step2,两模块与对应的步骤所实现的示例和应用场景相同,但不限于上述实施例二所公开的内容。需要说明的是,上述模块作为装置的一部分可以运行在实施例二提供的隧道终结装置中,可以通过软件实现,也可以通过硬件实现。It should be noted that the first sending unit 12061 and the second sending unit 12062 correspond to Step 1 and Step 2 in step S506 of Example 2. The examples and application scenarios implemented by the two modules and the corresponding steps are the same, but are not limited to the contents disclosed in Example 2. It should be noted that the above modules, as part of the device, can run in the tunnel termination device provided in Example 2 and can be implemented through software or hardware.
实施例5Example 5
根据本发明实施例,还提供了一种用于实施上述用于构建虚拟专用网络的方法实施例的系统实施例,本申请上述实施例所提供的用于构建虚拟专用网络的系统中的客户端隧道装置可以为客户端应用层的软件。According to an embodiment of the present invention, a system embodiment for implementing the above-mentioned method embodiment for building a virtual private network is also provided. The client tunnel device in the system for building a virtual private network provided by the above-mentioned embodiment of the present application can be software of the client application layer.
图16是根据本申请实施例的用于构建虚拟专用网络的系统的结构示意图。FIG16 is a schematic structural diagram of a system for building a virtual private network according to an embodiment of the present application.
如图16所示,该系统包括:客户端隧道装置1601和隧道网络设备1602,客户端隧道装置和隧道网络设备通信连接,其中,客户端隧道装置,用于通过检测接收到的协议报文的报文类型,将报文类型为第一类协议报文的协议报文转换为用于在虚拟专用网络中用于通信的第二类协议报文,通过检测第二类协议报文中的报文参数,判断协议报文是否存在网络攻击的攻击特征,在判断结果为否的情况下,发送协议报文;隧道网络设备,与客户端隧道装置通信连接,用于接收客户端隧道装置发送的第二类协议报文,通过检测第二类协议报文是否存在网络攻击,在判断结果为否的情况下,依据服务器的类型将解密后的第二类协议报文发送至对应的发送端口;其中,客户端隧道装置为图9至图11中任一所示的用于构建虚拟专用网络的装置;隧道网络设备为图12至图15中任一所示的用于构建虚拟专用网络的装置。As shown in Figure 16, the system includes: a client tunnel device 1601 and a tunnel network device 1602, the client tunnel device and the tunnel network device are communicatively connected, wherein the client tunnel device is used to convert a protocol message of the first type of protocol message into a second type of protocol message for communication in a virtual private network by detecting the message type of the received protocol message, and judge whether the protocol message has attack characteristics of a network attack by detecting message parameters in the second type of protocol message, and send the protocol message if the judgment result is no; the tunnel network device is communicatively connected to the client tunnel device, and is used to receive the second type of protocol message sent by the client tunnel device, and detect whether the second type of protocol message has attack characteristics of a network attack by detecting whether the second type of protocol message has attack characteristics of a network attack, and send the decrypted second type of protocol message to the corresponding sending port according to the type of server if the judgment result is no; wherein the client tunnel device is the device for building a virtual private network shown in any one of Figures 9 to 11; the tunnel network device is the device for building a virtual private network shown in any one of Figures 12 to 15.
可选的,系统还包括:服务器,该隧道网络设备嵌入服务器。Optionally, the system further includes: a server, and the tunnel network device is embedded in the server.
实施例6Example 6
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以用于保存上述实施例一所提供的用于构建虚拟专用网络的方法所执行的程序代码。The embodiment of the present invention further provides a storage medium. Optionally, in this embodiment, the storage medium can be used to store the program code executed by the method for building a virtual private network provided in the first embodiment.
可选地,在本实施例中,上述存储介质可以位于计算机网络中计算机终端群中的任意一个计算机终端中,或者位于移动终端群中的任意一个移动终端中。Optionally, in this embodiment, the storage medium may be located in any computer terminal in a computer terminal group in a computer network, or in any mobile terminal in a mobile terminal group.
可选地,在本实施例中,存储介质被设置为存储用于执行以下步骤的程序代码:检测预先接收到的协议报文的报文类型;当协议报文的报文类型为第一类协议报文时,将协议报文转换为在虚拟专用网络中用于通信的第二类协议报文;检测第二类协议报文中的报文参数,判断报文参数是否存在网络攻击的攻击特征;在判断结果为否的情况下,发送第二类协议报文。Optionally, in this embodiment, the storage medium is configured to store program code for executing the following steps: detecting the message type of a pre-received protocol message; when the message type of the protocol message is a first-class protocol message, converting the protocol message into a second-class protocol message used for communication in a virtual private network; detecting message parameters in the second-class protocol message, and determining whether the message parameters have attack characteristics of a network attack; and if the determination result is no, sending the second-class protocol message.
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:获取协议报文中的数据;依据第二类协议报文的格式封装数据,得到报文类型为第二类协议报文的协议报文。Optionally, the storage medium is further configured to store program code for executing the following steps: obtaining data in the protocol message; encapsulating the data according to the format of the second type of protocol message to obtain a protocol message of the second type of protocol message.
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:在检测第二类协议报文中的报文参数之前,依据协议报文的业务类型匹配得到对应的加密规则,并依据加密规则对第二类协议报文进行加密,其中,加密规则用于指示在加密过程中依据业务类型更改加密密级。Optionally, the storage medium is also configured to store program code for executing the following steps: before detecting the message parameters in the second type of protocol message, obtaining corresponding encryption rules based on the business type matching of the protocol message, and encrypting the second type of protocol message based on the encryption rules, wherein the encryption rules are used to indicate that the encryption level is changed according to the business type during the encryption process.
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:根据加密规则对第二类协议报文执行特征加密,其中,特征加密为依据第二类协议报文中的报文参数进行加密。Optionally, the storage medium is further configured to store program code for executing the following steps: performing feature encryption on the second type of protocol message according to encryption rules, wherein the feature encryption is encryption based on message parameters in the second type of protocol message.
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:检测第二类协议报文中的报文参数中的报文长度、特征值、发送速率及数据大小;判断报文参数中的报文长度、特征值、发送速率及数据大小中的至少一项是否与预设的攻击特征匹配;依据报文参数与攻击特征的匹配结果判断协议报文是否存在网络攻击。Optionally, the storage medium is also configured to store program code for executing the following steps: detecting the message length, characteristic value, sending rate and data size in the message parameters of the second type of protocol message; determining whether at least one of the message length, characteristic value, sending rate and data size in the message parameters matches a preset attack feature; and determining whether the protocol message contains a network attack based on the matching result between the message parameters and the attack feature.
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:在判断结果为是的情况下,丢弃第二类协议报文。Optionally, the storage medium is further configured to store program codes for executing the following steps: if the judgment result is yes, discard the second type of protocol message.
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:接收服务器返回的第二类协议报文;接收服务器返回的第二类协议报文;通过转发端口返回第二类协议报文。Optionally, the storage medium is further configured to store program codes for executing the following steps: receiving the second type of protocol message returned by the server; receiving the second type of protocol message returned by the server; and returning the second type of protocol message through the forwarding port.
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:检测目的地址对应的转发端口支持的协议报文的类型;依据转发端口支持的协议报文的类型发送第二类协议报文。Optionally, the storage medium is further configured to store program codes for executing the following steps: detecting the type of protocol message supported by the forwarding port corresponding to the destination address; and sending the second type of protocol message according to the type of protocol message supported by the forwarding port.
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:检测目的地址对应的转发端口支持的协议报文的类型;通过对应的转发端口返回数据。Optionally, the storage medium is further configured to store program codes for executing the following steps: detecting the type of protocol message supported by the forwarding port corresponding to the destination address; and returning data through the corresponding forwarding port.
可选地,存储介质还被设置为存储用于执行以下步骤的程序代码:当检测到转发端口支持的协议报文的类型为第二类协议报文时,通过对应的转发端口返回第二类协议报文。Optionally, the storage medium is further configured to store program code for executing the following steps: when it is detected that the type of the protocol message supported by the forwarding port is the second type of protocol message, returning the second type of protocol message through the corresponding forwarding port.
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。Optionally, in this embodiment, the above-mentioned storage medium may include but is not limited to: a USB flash drive, a read-only memory (ROM), a random access memory (RAM), a mobile hard disk, a magnetic disk or an optical disk, and other media that can store program codes.
可选地,本实施例中的具体示例可以参考上述实施例1中所描述的示例,本实施例在此不再赘述。Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiment 1, and this embodiment will not be described in detail here.
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the above embodiments of the present invention are for description only and do not represent the advantages or disadvantages of the embodiments.
在本发明的上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments of the present invention, the description of each embodiment has its own focus. For parts that are not described in detail in a certain embodiment, reference can be made to the relevant descriptions of other embodiments.
在本申请所提供的几个实施例中,应该理解到,所揭露的技术内容,可通过其它的方式实现。其中,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元或模块的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed technical content can be implemented in other ways. Among them, the device embodiments described above are only schematic. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods, such as multiple units or components can be combined or integrated into another system, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of units or modules, which can be electrical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separate, and the components shown as units may or may not be physical units, that is, they may be located in one place or distributed across multiple network units. Some or all of these units may be selected to achieve the purpose of this embodiment according to actual needs.
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, the functional units in the various embodiments of the present invention may be integrated into a single processing unit, each unit may exist physically separately, or two or more units may be integrated into a single unit. The aforementioned integrated units may be implemented in the form of hardware or software functional units.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention, or the part that contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product. The computer software product is stored in a storage medium and includes several instructions for enabling a computer device (which can be a personal computer, server or network device, etc.) to perform all or part of the steps of the method described in each embodiment of the present invention. The aforementioned storage medium includes: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or optical disk, etc. Various media that can store program codes.
以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above is only a preferred embodiment of the present invention. It should be pointed out that for ordinary technicians in this technical field, several improvements and modifications can be made without departing from the principles of the present invention. These improvements and modifications should also be regarded as within the scope of protection of the present invention.
Claims (24)
Publications (3)
| Publication Number | Publication Date |
|---|---|
| HK1240422A HK1240422A (en) | 2018-05-18 |
| HK1240422A1 HK1240422A1 (en) | 2018-05-18 |
| HK1240422B true HK1240422B (en) | 2021-04-30 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN107046495B (en) | Method, device and system for constructing virtual private network | |
| US9100370B2 (en) | Strong SSL proxy authentication with forced SSL renegotiation against a target server | |
| US10038693B2 (en) | Facilitating secure network traffic by an application delivery controller | |
| US9077709B1 (en) | Method for authenticated communications incorporating intermediary appliances | |
| US8811397B2 (en) | System and method for data communication between a user terminal and a gateway via a network node | |
| CN107113319B (en) | A method, device, system and proxy server for response in virtual network computing authentication | |
| US20110113236A1 (en) | Methods, systems, and computer readable media for offloading internet protocol security (ipsec) processing using an ipsec proxy mechanism | |
| CN107682284A (en) | Send the method and the network equipment of message | |
| US10397047B2 (en) | Apparatus, system, and method for secure remote configuration of network devices | |
| CN105578463B (en) | Method and device for dual connection secure communication | |
| CN102349264A (en) | Offloading cryptographic protection processing | |
| CN102571497A (en) | IPSec tunnel fault detection method, apparatus thereof and system thereof | |
| US11431730B2 (en) | Systems and methods for extending authentication in IP packets | |
| CN111355695B (en) | A security proxy method and device | |
| WO2013166696A1 (en) | Data transmission method, system and device | |
| CN109040059B (en) | Protected TCP communication method, communication device and storage medium | |
| US10944590B2 (en) | Transport protocol task offload emulation to detect chunks of data for communication with a private network | |
| US10116466B2 (en) | Transport protocol task offload emulation to detect offload segments for communication with a private network | |
| US9185130B2 (en) | Transmission apparatus, reception apparatus, communication system, transmission method, and reception method | |
| CN113810173B (en) | A method for verifying application information, a message processing method and a device | |
| KR101971995B1 (en) | Method for decryping secure sockets layer for security | |
| WO2021248999A1 (en) | Method for checking application information, message processing method and device | |
| CN117254976A (en) | National standard IPsec VPN implementation method, device, system and electronic equipment based on VPP | |
| HK1240422B (en) | Method, apparatus and system for constructing virtual private network | |
| WO2023231311A1 (en) | Vxlan tunnel authentication method and system, and access gateway and network access device |