Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protocol identification method, device and system

A technology of protocol identification and identification table, which is applied in the field of communication to achieve the effect of reducing misidentification and improving identification accuracy

Active Publication Date: 2011-06-15
HUAWEI TECH CO LTD
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, this method is not suitable for scenarios that require high message recognition accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protocol identification method, device and system
  • Protocol identification method, device and system
  • Protocol identification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment one, such as figure 1 As shown, the embodiment of the present invention provides a method for protocol identification, including:

[0028] 101: Extract the identification tuple of the message; the identification tuple at least includes a network address;

[0029] The identification tuple mentioned above may be an N-tuple such as: one-tuple: network address; or, two-tuple: network address and port; or, three-tuple: network address, port (port), and transport layer protocol. Of course, the specific number of tuples can be set according to the needs of protocol identification, which is not limited in this embodiment. The above IP address can be the IP address of the source end of the message or the IP address of the destination end of the message. If the IP address of the source end is used, the port also uses the port of the source end. If the IP address of the destination end is used, the port also uses the port of the destination end.

[0030] 102: Search t...

Embodiment 2

[0039] Embodiment 2, this embodiment will take the extraction of N-tuple information as an example, use the matching method to search the identification table, and determine whether the search and identification is successful through the judgment method as an example, and explain the method of protocol identification, as follows: image 3 shown, including:

[0040] 301: Extract an N-tuple of the message, where the N-tuple includes the network address, port, and transport layer protocol of the message.

[0041]Above-mentioned N-tuple can refer to unary (only network address), two-tuple (comprising network address, port) and triple (comprising network address, port, transport layer protocol (for example: Transmission Control Protocol (Transmission Control Protocol, TCP) / User Datagram Protocol (User Datagram Protocol, UDP) / Stream Control Transmission Protocol (Stream Control Transmission Protocol, SCTP)).

[0042] On the live network, many data flows belong to client / server appl...

Embodiment 3

[0053] Embodiment three, such as Figure 4 As shown, the embodiment of the present invention also provides a device for protocol identification, including:

[0054] An extraction unit 401, configured to extract the identification tuple of the message; the identification tuple at least includes a network address;

[0055] a storage unit 402, configured to store an identification table;

[0056] The algorithm search unit 403 searches the identification table for the algorithm application list corresponding to the identification tuple;

[0057] The protocol identification unit 404 is configured to use the algorithm in the algorithm application list to identify the content of the message, so as to obtain the protocol type of the message.

[0058] Specifically, the extracting unit 401 is specifically configured to extract the network address of the packet; or, the network address and port; or, the network address, port, and transport layer protocol.

[0059] Such as Figure 5 A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a protocol identification method, a protocol identification device and a protocol identification system. The method comprises the following steps of: extracting an identification tuple of a message, wherein the identification tuple at least comprises a network address; searching an algorithm application list corresponding to the identification tuple in an identification table; and performing content identification on the message by using an algorithm in the algorithm application list to acquire a protocol type of the message. According to the implementation mode, the identification tuple which at least includes an Internet protocol (IP) address and is extracted from the message is adopted for searching the corresponding algorithm, and the searched algorithm is used for content identification of the message, so that the identification precision is improved and the error identification of the message is reduced.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a protocol identification method, device and system. Background technique [0002] Nowadays, more and more applications are carried on the network, and the requirements for bandwidth are getting higher and higher. Operators want to ensure that their operating network can well carry various key services (such as: web page (WEB) browsing), while restricting some non-critical services (such as: Voice over Internet Protocol (Voice over Internet Protocol, VOIP), peer-to-peer (Peer to Peer, P2P)) unrestrained occupation of network resources. Based on this, the operator needs to identify the protocol type used by the packet (or data flow) carried by the network at the application layer. [0003] The existing protocol type identification method is to poll all possible matching identification characteristic conditions or algorithms for identification. The above polling m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCY10S707/99933H04L29/06H04L69/22H04L29/0653H04L9/40
Inventor 刘华
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products