Method and system for monitoring P2P software
A software and strategy technology, applied in the network field, can solve the problems of inaccurate matching and identification, lack of products with blocking function, etc., to avoid false negatives and false positives, widely used, simple and convenient to expand
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] Embodiment 1. In the establishment stage of above-mentioned A. protocol feature model; The protocol static feature extraction step of Edonkey2000 is arranged, see figure 2 ;
[0048] 1) E3 96 FF F0 load length 6
[0049] 2) E3 A2 FF F0 load length 6
[0050] 3) E3 97 load length 34
[0051] 4) E3 9A load length 18
[0052] 5) E3 92 load length 10
[0053] Similar to the above-mentioned embodiments, static features can be extracted for data packets transmitted in specific applications of each P2P application, and a static feature model corresponding to the P2P application can be established accordingly:
[0054] Secondly, mining the associated behavior feature sequence in the actual P2P application running process, this stage includes all the action behavior sequences that can identify the specific stage of the protocol during the P2P running process (such as the client sends a Peer request, the server responds to the Peer list, etc.).
Embodiment 2
[0055] Embodiment 2: In the step of identification and positioning in the above-mentioned B. application stage, there are steps for establishing a behavior characteristic state model in the stage of Netease popo login:
[0056] 1) The client and the server perform a TCP handshake connection (usually 220.181.28.238:443)
[0057] 2) Use the SSL protocol to negotiate the session key used in subsequent communications (the client sends a Clienth*llo to initiate a handshake. This message contains a list of algorithms that can be implemented by itself and other required messages, and the SSL server will respond A Serverh*llo, which determines the algorithm required for this communication, and then sends its own certificate (which contains its identity and its own public key). After receiving this message, the Client will generate a secret message, using SSL The server's public key is encrypted and transmitted, and the SSL server decrypts it with its own private key. The session key n...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com