Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An easy-to-extend multi-mode fusion core network user traffic application identification method

A technology for application identification and user traffic, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as insufficient, and achieve the effects of simple processing logic, reduced identification load, and fast response speed

Active Publication Date: 2017-11-28
WUHAN HONGXIN TECH SERVICE CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, many mobile terminal third-party applications (APPs) or network video applications will use the HTTP protocol to carry content. Therefore, it is obviously not enough to only recognize the HTTP protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An easy-to-extend multi-mode fusion core network user traffic application identification method
  • An easy-to-extend multi-mode fusion core network user traffic application identification method
  • An easy-to-extend multi-mode fusion core network user traffic application identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The specific implementation of the present invention will be described below according to the drawings and embodiments.

[0046] The basic principle of the embodiment of the present invention is: pay attention to the flow determined by source IP address, destination IP address, source port, destination port and application layer protocol (TCP / UDP) quintuple, each data message must belong to and only belong to One stream, and one stream is generated by the same application. According to the layered feature of the network protocol, the embodiment of the present invention naturally uses a layered model. That is, hierarchical processing is performed on the network layer, transport layer, and application layer. After analyzing the application layer data, find the flow node to which the service data packet belongs according to the quintuple formed by the obtained source IP address, destination IP address, source port, destination port and application layer protocol (TCP / UDP)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An easy-to-expand multi-mode fusion core network user traffic application identification method, including hierarchical data message analysis and identification and restoration of tunnel traffic; analysis of five-tuple information for management of IP layer and transport layer protocols; according to flow node information, The application identification method of the fusion of pre-identification, port identification, HTTP identification, P2P identification and PA identification method is adopted to obtain the specific application information of the data message and the data flow to which it belongs. Each identification method supports independent expansion, and the identification method with simple processing logic and fast response speed is front-loaded to reduce the identification load of subsequent complex methods and improve the efficiency of identification processing; HTTP supports secondary identification to improve the effectiveness and accuracy of identification; At the same time, it supports the identification methods of DPI and DFI, effectively identifying encrypted application protocols and P2P protocol data streams.

Description

technical field [0001] The present invention relates to the field of communication network traffic identification, and more specifically, the present invention relates to an easy-to-extend multi-method fusion core network real-time user traffic application identification method. Background technique [0002] In order to understand the usage of different network applications and the bandwidth occupation in the communication network, so as to carry out effective traffic monitoring or network user analysis, it is necessary to effectively identify the data flow of the communication network first. [0003] There are two main types of traditional communication network user traffic application identification technologies, Deep Packet Inspection (DPI) and Deep Flow Inspection (DFI). [0004] DPI is to identify the message by deeply reading the content of the message load. In addition to analyzing the content of the message L2 (data link layer), L3 (network layer), and L4 (transport ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26
Inventor 李磊罗晓羽肖伟明余道敏
Owner WUHAN HONGXIN TECH SERVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products