Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious traffic detection method and system, monitoring platform

A detection method and malicious traffic technology, applied in the field of mobile Internet, can solve problems such as huge traffic charges for users

Active Publication Date: 2019-04-26
CHINA TELECOM CORP LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide a malicious traffic detection method, system, and monitoring platform to solve the problem that SP maliciously pushes data traffic to offline user terminals in the mobile Internet and brings huge traffic charges to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious traffic detection method and system, monitoring platform
  • Malicious traffic detection method and system, monitoring platform
  • Malicious traffic detection method and system, monitoring platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0075] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0076] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0077] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, techniques, methods and devices should be considered part of the description. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a malicious traffic detection method and system and a monitoring platform; wherein the method comprises that an SP monitoring platform obtains the user IP address and the IP address of an SP server accessed by a user in the uplink request message of the user when accounting is started; the corresponding relationship of the IP address is built in IP address association records; after the accounting is finished, the corresponding relationship is deleted; through searching whether the user IP address and the IP address of the SP in the downlink request message sent to the user by the SP server are in the IP address association records or not, whether an illegal SP pushes a data packet to the user or not can be identified; and for a condition that the IP address of a P2P application is random, whether the SP is legal is determined through detecting whether the service feature of the data in the downlink request message matches with a preset service feature or not. The embodiment of the invention can be used for preventing the illegal SP to push the data packet to the user maliciously.

Description

technical field [0001] The invention relates to the field of mobile Internet, in particular to a malicious traffic detection method, system and monitoring platform. Background technique [0002] With the widespread use of mobile Internet applications, the problem of malicious traffic in the mobile Internet is also emerging. These malicious traffic include malicious traffic generated by user terminals to the network, and illegal service providers (abbreviated as: SP) send data to user terminals. Malicious traffic generated by the package. [0003] Currently, there are two main reasons for malicious traffic on the mobile Internet: [0004] The first is that the SP records the IP address of the visiting user after the user has visited the web page provided by the SP, and pushes a data packet to the user according to the recorded IP address without the user's request. [0005] The second is when the user deactivates the data service (that is: offline), if the SP does not relea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W24/04H04W24/08
Inventor 凌颖陈健
Owner CHINA TELECOM CORP LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More