A method of network traffic detection

A network traffic and detection method technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of lack of application layer analysis, inability to identify Bittorrent traffic, etc., to achieve easy promotion, high-speed identification and measurement, and improve efficiency. Effect

Active Publication Date: 2018-02-23
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional network-level firewalls (packet filtering) lack the analysis of application layer (layer 7 of the OSI model) traffic, so they cannot identify the traffic downloaded by Bittorrent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of network traffic detection
  • A method of network traffic detection
  • A method of network traffic detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] A network traffic detection method of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0026] as attached figure 1 , figure 2 As shown, the present invention provides a network traffic detection method, and its specific implementation process is:

[0027] 1. Identify P2P protocol traffic: How to accurately and quickly identify P2P network data packets has become a difficult problem. A relatively simple method is to determine the P2P network traffic directly through known commonly used ports of P2P software, but this may cause other applications using one of the ports to be unable to use normally. In addition, if the P2P application software can dynamically adjust the port, then this method is powerless. For example, BitTorrent usually listens on port 688l. If this port is occupied, it will try to reach port 6889. The present invention adopts the method of summarizing the characteristic codes of network data pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network flow detection method, the specific implementation process of which is as follows: identifying P2P protocol flow; classifying flow through an algorithm; and completing flow statistics. Compared with the prior art, this network flow detection method can not only identify the general protocol based on the general traditional identification method, but also can identify the firewall construction method of those network protocols that are difficult to identify through the advanced identification method; make full use of Its scalability allows heavy packet capture and statistical work to be completed in the kernel, improving efficiency; it is practical and easy to promote.

Description

technical field [0001] The invention relates to computer communication information technology, more specifically to a network flow detection method. Background technique [0002] The current mainstream network technology is point-to-point communication technology, and it is the most difficult to detect. The common measurement method at present is the measurement method based on the port. Bittorrent is a representative of P2P protocols. It is very popular in China and has a large number of users. It uses dynamic ports while masquerading its own traffic as HTTP traffic. Traditional network-level firewalls (packet filtering) lack the analysis of application layer (layer 7 of the OSI model) traffic, so they cannot identify the traffic downloaded by Bittorrent. Based on this, the present invention provides a method for identifying P2P traffic through application layer matching. Contents of the invention [0003] The technical task of the present invention is to solve the de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/08
Inventor 周国浪
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products