首页 | 本学科首页   官方微博 | 高级检索  
     检索      

高速网络流实时处理模型研究与实现
引用本文:苏自鹏,袁磊,刘鹏,陈兴蜀,罗永刚,陈良国.高速网络流实时处理模型研究与实现[J].山东大学学报(理学版),2022,57(9):25-32.
作者姓名:苏自鹏  袁磊  刘鹏  陈兴蜀  罗永刚  陈良国
作者单位:1.四川大学网络空间安全学院, 四川成都 610207;2.四川大学网络空间安全研究院, 四川 成都 610207;3.中移(成都)信息通信科技有限公司, 四川 成都 611730
基金项目:中国移动科研基金(CM20200409)
摘    要:针对当前网络流处理存在的实时性不足,难以适应不同网络流量规模的问题,研究并实现了一种多流量场景实时网络流重组架构,旨在进行网络流处理时能够适应不同的网络流量场景,并且有效提升系统资源利用率。该架构基于DPDK实现高速流量实时采集,并且对流重组过程进行阶段划分,构造不同场景的运行拓扑,实现系统资源的动态分配。在单机环境下实现了该系统,并在10 Gbps网络环境下进行测试,结果表明该架构在吞吐量和资源利用率上优于同类其他方法。

关 键 词:网络安全  流记录  网络流特征提取  DPDK  

Research and implementation of real-time processing model of high-speed network stream
SU Zi-peng,YUAN Lei,LIU Peng,CHEN Xing-shu,LUO Yong-gang,CHEN Liang-guo.Research and implementation of real-time processing model of high-speed network stream[J].Journal of Shandong University,2022,57(9):25-32.
Authors:SU Zi-peng  YUAN Lei  LIU Peng  CHEN Xing-shu  LUO Yong-gang  CHEN Liang-guo
Institution:1. School of Cyber Science and Engineering, Sichuan University, Chengdu 610207, Sichuan, China;2. Cybersecurity Research Institute, Sichuan University, Chengdu 610207, Sichuan, China;3. China Mobile(Chengdu)Information Communication Technology Co., Ltd., Chengdu 611730, Sichuan, China
Abstract:With the increasing scale of network traffic, it becomes more and more difficult to analyze network traffic in real time, efficiently and accurately. Aiming at the problem that the current network flow processing is not real-time enough and it is difficult to adapt to different network traffic scale, this paper studies and implements a real-time network flow restructuring architecture with multiple traffic scenarios,Designed to be able to adapt to different network traffic scenarios during network stream processing, And effectively improve system resource utilization. The architecture is based on DPDK to achieve real-time collection of high-speed traffic, and the process of stream reorganization is divided into stages, to construct operating topologies for different scenarios, and to achieve dynamic allocation of system resources. The system was implemented in a stand-alone environment and tested in a 10Gbps network environment. The results show that the architecture is superior to similar methods in throughput and resource utilization.
Keywords:network security  flow record  network flow feature extraction  DPDK  
点击此处可从《山东大学学报(理学版)》浏览原始摘要信息
点击此处可从《山东大学学报(理学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号