Protocol identification control method and equipment based on application behavior mode

A protocol identification and control method technology, applied in the field of communication, can solve the problems of unable to realize network application flow control, unable to identify efficiently and so on.

Inactive Publication Date: 2009-09-30
HANGZHOU DPTECH TECH
View PDF0 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, it is impossible to quickly and efficiently identify encrypted P2P traffic and other network application traffic, and thus cannot realize the control of network application traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protocol identification control method and equipment based on application behavior mode
  • Protocol identification control method and equipment based on application behavior mode
  • Protocol identification control method and equipment based on application behavior mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The core idea of ​​the present invention is: for all sessions passing through the bandwidth management device, after using the IP / port identification method and the DPI identification method to detect the specified number of messages, the traffic type cannot be correctly identified, and the query based on the IP is created. The associated table entry between network traffic and the corresponding network protocol traverses the packet feature sequence corresponding to all possible network traffic used by the source IP address and destination IP address of the current session, and uses the packet feature sequence corresponding to each network traffic in the current session to perform If the current session completely matches a certain packet signature sequence, it is considered that the current session is using the network protocol corresponding to the packet signature sequence.

[0034] The present invention provides a protocol identification control method based on an app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a protocol identification control method based on application behavior mode applied in bandwidth management equipment. The method comprises following steps: judging if the current session possesses specific plaintext character produced by application layer network protocol; If the current session does not possesses specific plaintext character, finding if message character sequence matching with current session existed in the associated IP item between preset network flow and corresponding network protocol; if matching, then determining network protocol used by current session according to corresponding relation of message character sequence and network protocol. The invention can promptly, highly effectively identify network application flow unrecognized by port identification method and DPI method.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a protocol identification control method and equipment based on an application behavior pattern. Background technique [0002] Most of the current network traffic monitoring and bandwidth management devices use IP (Internet Protocol, Internet Protocol) / port identification method, DPI (Deep Packet Inspection, deep packet inspection) identification method and other methods to identify network application traffic and make corresponding management. Wherein, the IP / port identification method is based on the source IP address, source port number, destination IP address and destination port number of the TCP (Transmission Control Protocol, Transmission Control Protocol) or UDP (User Datagram Protocol, User Datagram Protocol) packet header , The protocol type identifies the network application traffic. The DPI identification method uses deep scanning of data packets to f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 郭瑾张国栋
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products