Proprietary software flow monitoring method and device

A flow monitoring and flow control technology, applied in the computer field

Active Publication Date: 2020-07-07
上海卓辰信息科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The port-based flow control algorithm is simpler. For the traffic entering the port, no user traffic identification is performed. If the specified port threshold is exceeded, the packet will be discarded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proprietary software flow monitoring method and device
  • Proprietary software flow monitoring method and device
  • Proprietary software flow monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Hereinafter, the present disclosure will be described more fully with reference to the accompanying drawings, in which the embodiments of the present disclosure are shown. But these embodiments can be implemented in many different forms and should not be construed as being limited to the embodiments described herein. On the contrary, these examples are provided so that the present disclosure will be thorough and complete, and will fully convey the scope of the present disclosure to those skilled in the art.

[0018] The flowcharts and block diagrams in the drawings illustrate the possible implementation architecture, functions, and operations of the devices, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagram may represent a module, program segment, or part of code, and the module, program segment, or part of code contains one or more logic for implementing predetermi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A private software flow monitoring method and equipment thereof are disclosed. The method comprises the following steps of receiving a message; acquiring flow control auxiliary information of the message and updating a corresponding receiving message number in a software flow control table, wherein the flow control auxiliary information at least includes a message type; comparing the receiving message number and an assigned threshold, and when a receiving number of the message is greater than the assigned threshold, abandoning the message and generating an alarm; and when the receiving number of the message is not greater than the assigned threshold, forwarding the message according to a normal path. In each embodiment of the invention, a three-level software flow control strategy including the message type is provided; the messages are classified, and according to data messages of the different types, the different assigned thresholds are set so that effective flow control can be performed on the data messages; and then a service can not monopolize resources and a risk of system breakdown caused by a simulation message attack is avoided or reduced.

Description

Technical field [0001] The present invention relates to the technical field of computer technology, and more specifically, to a method and equipment for monitoring private software traffic. Background technique [0002] Nowadays, web browsing, private E-mail sending and receiving, P2P downloading, network TV, instant messaging, and online games, etc., are increasingly proliferating applications that are not relevant and unrelated to work. Customers' limited export network bandwidth resources are quickly occupied and swallowed by non-critical applications and irrelevant applications such as P2P downloads and Internet TV, causing valuable bandwidth resources to be abused and wasted. On the other hand, once a hacker simulates a user's normal message to attack the system, it will monopolize resources and cause all users' services to be interrupted. [0003] At present, the existing software flow control granularity is generally relatively coarse, usually only based on the user's MAC a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26
CPCH04L43/0876
Inventor 翟跃
Owner 上海卓辰信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products