Network access detection system and network access detection method

A network access and detection system technology, applied in the Internet field, can solve problems such as undetectable shared access

Inactive Publication Date: 2013-01-16
ZICT TECH CO LTD
View PDF1 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Therefore, a new technical solution is needed, which can effectively improve the accuracy of shared access detection, and at the same time prevent certain hosts from evading detection by disrupting the IPID packet sending rules and order or dispersing IPID technical means, resulting in no shared access detection. access situation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access detection system and network access detection method
  • Network access detection system and network access detection method
  • Network access detection system and network access detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0038] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0039] figure 1 A block diagram of a network access detection system according to an embodiment of the present invention is shown.

[0040] Such as figure 1As shown, the network access detection s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network access detection system which comprises a data packet acquisition module, a message extraction module, a field extraction processing module and a host quantity determining module. The data packet acquisition module acquires data packets in a network; the message extraction module extracts HTTP (hypertext transport protocol) messages in the data packets; the field extraction module extracts and records values of user agent fields in the HTTP protocol messages; the host quantity determining module is used for comparing the record values of the user agent fields and determining quantity of hosts required to access to the network according to the comparison results. Correspondingly, the invention provides a network access detection method. By the network access detection system and the network access detection method, whether users are in sharing internet through multiple computers or not can be detected, sharing access detection precision can be improved effectively, detection evasion of some hosts by technical means such as breaking IPID (interface point identifier) contract rules and orders or dispersing the IPID is avoided, and further failure in detection of sharing access is avoided.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a network access detection system and a network access detection method. Background technique [0002] At present, the billing of the Internet broadband access service mainly adopts the method of billing by duration instead of billing by traffic. Some people take advantage of this loophole of the operator, often apply for broadband in the name of the individual and let enterprises or black Internet cafes use it, or several households share broadband to share the cost, which has caused a huge loss of revenue for the operator. Due to the historical reasons of the IP protocol design itself, no standard or protocol can directly reflect how many computers are shared in the LAN under the same IP address. Currently, the detection methods commonly used in the industry are as follows: [0003] There is an IPID identifier in the IP message, and the identifier of each machine cycles f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L12/70
Inventor 刘晗
Owner ZICT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products