Multimode integration core network user traffic application identification method easy to expand

A technology for application identification and user traffic, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as insufficient, achieve the effect of simple processing logic, improve identification processing efficiency, and improve effectiveness and accuracy

Active Publication Date: 2015-01-28
WUHAN HONGXIN TECH SERVICE CO LTD
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, many mobile terminal third-party applications (APPs) or network video applications use the HTTP protocol to carry content. Therefore, it is obviously not enough to only recognize the HTTP protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multimode integration core network user traffic application identification method easy to expand
  • Multimode integration core network user traffic application identification method easy to expand
  • Multimode integration core network user traffic application identification method easy to expand

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The specific implementation of the present invention will be described below according to the drawings and embodiments.

[0047] The basic principle of the embodiment of the present invention is: pay attention to the flow determined by the source IP address, destination IP address, source port, destination port and application layer protocol (TCP / UDP) quintuple, and each data message must belong to and only belong to One stream, and one stream is generated by the same application. According to the layered feature of the network protocol, the embodiment of the present invention naturally uses a layered model. That is, hierarchical processing is performed on the network layer, transport layer, and application layer. After parsing the application layer data, find the flow node to which the service data packet belongs according to the quintuple composed of the obtained source IP address, destination IP address, source port, destination port and application layer protocol (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A multimode integration core network user traffic application identification method easy to expand comprises the following steps that hierarchical data message analysis is conducted, and tunnel traffic is identified and restored; five-tuple information of IP layer and transport layer protocols is analyzed and managed; according to flow node information, the application identification method integrating a pre-identification method, a port identification method, an HTTP identification method, a P2P identification method and a PA identification method is adopted for obtaining data messages and specific application information of a data flow where the data messages belong. The identification methods support independent expansion, the identification method simple in processing logic and high in response speed is preferentially used, identification loads on the follow-up complex methods are lowered, and identification processing efficiency is improved; the HTTP identification method supports two-level identification, and identification effectiveness and accuracy are improved; meanwhile, a DPI identification mode and a DFI identification mode are supported, and encrypted application protocol and P2P protocol data flows are identified effectively.

Description

technical field [0001] The present invention relates to the field of communication network traffic identification, and more specifically, the present invention relates to an easy-to-extend multi-method fusion core network real-time user traffic application identification method. Background technique [0002] In order to understand the usage of different network applications and the bandwidth occupation in the communication network, so as to carry out effective traffic monitoring or network user analysis, it is necessary to effectively identify the data flow of the communication network first. [0003] There are two main types of traditional communication network user traffic application identification technologies, Deep Packet Inspection (DPI) and Deep Flow Inspection (DFI). [0004] DPI is to identify the message by deeply reading the content of the message load. In addition to analyzing the content of the message L2 (data link layer), L3 (network layer), and L4 (transport ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26
Inventor 李磊罗晓羽肖伟明余道敏
Owner WUHAN HONGXIN TECH SERVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products