Unlock instant, AI-driven research and patent intelligence for your innovation.

Agent Internet identification method, computer device and computer-readable storage medium

An identification method and counting value technology, applied in the field of computer networks, can solve problems such as key connections cannot be identified

Active Publication Date: 2020-06-09
SANGFOR TECH INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The usual agent identification technology is Deep Packet Inspection (DPI) technology. DPI technology is a method based on the characteristics of network data packets. A series of character strings are found in statistical data packets as fingerprints, and these fingerprints are used to identify other agents. Data packets, for example, by counting the appearance rules of IP data packet IDs, or the regularity of TCP sequence numbers to identify whether proxy Internet access tools are used. critical connection not identified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Agent Internet identification method, computer device and computer-readable storage medium
  • Agent Internet identification method, computer device and computer-readable storage medium
  • Agent Internet identification method, computer device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0043] Please refer to figure 1 and figure 2 , figure 1 It is a method flow chart of the method 100 for identifying the proxy surfing the Internet in the first embodiment of the present invention, figure 2 It is a schematic diagram of the module structure of the computer device 110 applying the method 100 for identifying the proxy surfing the Internet.

[0044] The proxy surfing identification method 100 is applied to a computer device 110 connected to the Internet, and the computer device 110 can access Internet sites or perform data interaction through the Internet. Wherein, the proxy surfing identification method 100 includes the following steps:

[0045] Step S10, sequentially acquiring data packets generated by the Internet connection established by the user.

[0046]It should be noted that, when a u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy internet connection identification method. The method comprises the following steps: a data message caused by internet connection established by a user and destinationIP information corresponding to the internet connection are obtained successively; the accumulative number of times of matching between the destination IP information corresponding to the internet connection established by the user and different IP information in a preset IP list within a preset period of time is recorded; when the accumulative matching number reaches a preset threshold, the internet connection is determined to be proxy internet connection; and when the accumulative matching number does not reach the preset threshold value and the internet connection is not initiated by a preset application, the internet connection is determined to be proxy internet connection. According to the method disclosed by the invention, with the mode of combination of the IP list with behavior identification, the identification rate and the correct rate are increased; and the method can be applied to identification of proxy internet connection tools with different types. In addition, the invention also provides a computer device and a computer readable storage medium.

Description

technical field [0001] The present invention relates to the technical field of computer networks, and in particular, to a method for identifying a proxy surfing the Internet, a computer device and a computer-readable storage medium having the method for identifying the proxy surfing the Internet. Background technique [0002] Generally speaking, in order to prevent leakage of secrets or improve work efficiency, companies, schools or institutions usually use firewalls and other means to filter the data interaction of specific websites or servers to restrict networked computer devices from accessing some specific websites or Data interaction with some specific servers. However, by using the proxy surfing tool, the above-mentioned restrictions on surfing the Internet can be bypassed, and the purpose of freely accessing restricted specific websites or performing data interaction with some specific servers can be achieved. Proxy Internet access tools usually include protocol-bas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/26
Inventor 杨跃
Owner SANGFOR TECH INC