Method and device for detecting protocol agent
A protocol and detection technology, applied in the field of communication, can solve the problems of false negatives and false positives, low detection efficiency of proxy protocols, etc., and achieve the effect of high efficiency and accurate detection results.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0072] Figure 5 Provided a preferred structural block diagram of a protocol agent detection device, see Figure 5 , the device includes: a first receiving unit 501, a first detecting unit 502, a second receiving unit 503, a first judging unit 504, a first saving unit 505, a second judging unit 506 and a second detecting unit 507 connected in sequence, in:
[0073] The first receiving unit 501 receives a message in response to the handshake information when the TCP connection is established;
[0074] The first detection unit 502 judges whether the TCP connection is initiated by the detection end or the client according to the message in response to the handshake information;
[0075] The second receiving unit 503 receives the request information sent by the client when the message in response to the handshake information is initiated by the client;
[0076] The first judging unit 504 judges whether the request information is proxy request information;
[0077] When the req...
Embodiment 2
[0104] Figure 7 A preferred flowchart of the protocol agent detection method is shown, see Figure 7 , the method includes:
[0105] S701. When the TCP connection is established, receive a message in response to the handshake information;
[0106] S702. Determine whether the TCP connection is initiated by the detection end or the client according to the message in response to the handshake information;
[0107] S703, if the message in response to the handshake information is initiated by the client, receive the request information sent by the client;
[0108] S704, judging whether the request information is agent request information;
[0109] S705. If the request information is proxy request information, save the destination server information requested by the client;
[0110] S706, judging whether the detection terminal establishes a connection with the saved destination server requesting access;
[0111] S707, if the detection end establishes a connection with the save...
Embodiment 3
[0134] This embodiment provides a specific example of the protocol agent detection method, in this embodiment, Figure 9 Another schematic diagram of the protocol proxy detection method is shown, by Figure 9It can be seen that the protocol agent detection device includes: a driver packet receiving module and an application layer message processing module connected in sequence.
[0135] Among them, the driver receiving module performs the function through the following steps:
[0136] S901, driving the receiving module to receive a TCP message;
[0137] S902, judging whether the TCP message is the second message of the three-way handshake, that is, the message syn_ack in response to the handshake information, if so, generating a table entry with the four elements of the TCP connection of the message and inserting it into the TCP filter table, And send the message to the application layer message processing module. If not, it means that the message may be an end message, may...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com