| With the integration of terrestrial Internet,mobile communication network and space network,the space and earth integrated network architecture has gradually formed.Under this network architecture,the rapid development of cloud computing,Internet of Things,mobile Internet and other technologies have brought about not only technological and economic development,but also more complex network security issues,therefore,the interconnected security control gateways in the space and earth integrated network need to realize attack threat awareness and early warning.Aiming at the realization of threat awareness and early warning in interconnected security control gateways,the logical topology construction of gateways and the requirement of quantitative sensing and monitoring of communication resources and gateways load are proposed.Because of the huge scale of the network nowadays,it is impossible to draw the network topology and monitor the network manually,and it is difficult to set the standard time interval for the traditional equal time interval acquisition.The time interval is too long to lose important data and reduce data accuracy;the short time interval results in waste of network resources,large amount of data redundancy and data acquisition and so on.Therefore,this paper studies data acquisition technology and network logical topology construction technology,and proposes the research and design of monitoring and logical topology construction of interconnected security control gateways,to make some efforts for the basic research of the network security of the space and earth integrated network.The main work of this paper is as follows:(1)The security gateways control information acquisition strategy based on the improved swing door trending algorithmThis paper selected the swing door algorithm as the research object,aiming at the problems existing in the application of the algorithm in the scene of control information acquisition of security gateways,and then it proposed the improvement of the algorithm,and the control information acquisition strategy of security gateways based on the improved algorithm is further proposed.(2)The logical topology construction strategy based on binary search algorithmAiming at the problems existing in the application of traditional topology discovery based on traceroute in the scene of construction of gateways logical topology,this paper used the idea of binary search algorithm for improving it,and then a strategy of logical topology construction based on binary search algorithm is proposed.(3)Design and functional test of monitoring and logical topology construction of interconnected security control gatewaysBy synthesizing each module,the requirement analysis,module design and workflow design of the monitoring and logical topology construction system of the interconnected security control gateways are completed.According to the functional module design of the system,corresponding test samples are designed and functional tests are carried out according to the test samples.The experimental results show that the acquisition strategy improves the data acquisition ability of the system to the interconnected security control gateways.Compared with the traditional equal time interval acquisition strategy,under the condition of guaranteeing data accuracy,it can reduce the number of data acquisition and data transmission,effectively reduce the network overhead,improve the efficiency of data acquisition,and ultimately improve the monitoring efficiency of the interconnected security control gateways.The logical topology construction strategy improves the system's ability to construct logical topology for interconnected security control gateways,compared with traditional topology discovery based on traceroute,it can reduce the duplication of detection paths and resource consumption while ensuring the accuracy of topology data.At the same time,the above acquisition algorithm and logical topology construction algorithm have been actually embedded in the interconnected security control gateways,realized on the system and completed the corresponding functional tests. |