Data packet detection method and system

A detection method and detection system technology, applied in the direction of digital transmission system, transmission system, error prevention/detection using the return channel, etc., can solve the problems of limited use, large amount of memory, etc.

Active Publication Date: 2016-06-01
ALIBABA GRP HLDG LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1. The method for TTL detection and recording listed in CN200810067292.5 cannot be used in a NAT (NetworkAddressTransfer, Network Address Translator) environment. It records a formal TTL value for a source address, but in fact if the source address is For a NAT exit, there are multiple segments for the TTL value of this source address, then the actual TTL value recorded in the table will continue to change, as long as different operating systems access alternately, there will be a lot of manslaughter
Although CN200810067292.5 Figure 7 When described in , a TTL credible range will be judged in advance, but when the next TTL comparison table is searched based on the source address, as long as the operating system of the current visitor is different from the operating system of the TTL value recorded in the table, the It may lead to a judgment that does not match the actual TTL value, thus entering the packet loss process
[0010] 2. In CN200810067292.5, one source address corresponds to one storage structure, which requires a large amount of memory
[0011] 3. CN200810067292.5 obtains the TTL value by actively sending ICMP data packets and waiting for the return packet or obtaining the TTL value from the normal three-way handshake, but many network devices or software firewalls will automatically disable ICMP, so the use is limited
[0012] 4. CN200810067292.5 only describes the comparison between the actual TTL value and the pre-stored TTL record. If the difference between the two TTL values ​​is 1 or 2, it will be discarded. However, there may be some differences in the real network environment. Once there is a difference Using the one-to-one relationship between the TTL record described in CN200810067292.5 and the real client will cause very large manslaughter
[0013] 5. The TTL records prestored in CN200810067292.5 have an aging time, that is, the TTL records corresponding to each source address in the storage table will be updated periodically, and the system is redundant and not flexible enough
[0014] In summary, there are obviously inconveniences and defects in the actual use of the existing technology, so it is necessary to improve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data packet detection method and system
  • Data packet detection method and system
  • Data packet detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0069] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0070] Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and / or nonvolatile memory, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of computer readable media.

[0071] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to an Internet network access device, provides a data packet detection method and system. The data packet detection method comprises the steps of acquiring an original survival time value in a valid data packet; calculating a survival time reference value according to the original survival time value, the survival time reference value corresponding to a plurality of preset adjacent addresses of a source address of the valid data packet; acquiring a survival time value to be verified in a data packet to be verified; and determining whether the data packet to be verified is valid according to the survival time value to be verified and the survival time reference value. Therefore, the invention can reduce the transparent transmission rate of invalid data packets, can improve the security performance of a back-end server, also can be suitable for a variety of complex network environment, and is simple, practical and safe and reliable.

Description

technical field [0001] The invention relates to a data packet detection method and system. Background technique [0002] With the popularization of Internet technology, more and more applications have begun to migrate to the Internet, followed by more and more attacks against the Internet. Many attack data packets are illegal data packets directly forged by hackers, and then forwarded to the target machine through the Internet. If it is not judged that these data packets are not much different from ordinary packets, they will be accepted by network devices and servers. Once the forged attack data packet reaches the target machine, it will pose a fatal threat to the services running on the target machine until the server resources are exhausted and cannot operate normally. [0003] Therefore, an efficient and practical technical solution capable of judging whether a data packet is forged is particularly important. Among the methods for judging the authenticity of data pack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00H04L1/16H04L29/06
Inventor 魏雄烈祝顺民李库陈永保
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products