Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for detecting traffic hijacking

A traffic hijacking and detection method technology, applied in the field of data processing, can solve problems such as network impact, coordination difficulties, and non-recommended use, and achieve the effect of improving efficiency and accuracy

Active Publication Date: 2021-04-27
CHINA MOBILE GRP GUANGDONG CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the second scheme is that it is difficult to find the hijacking phenomenon of forged packets for the first time, and changing the routing table of each hop route requires the in-depth support of other departments. If the router is outside the province or outside the network, the coordination is more difficult
Furthermore, there is a certain risk in changing the routing table, which will have a certain impact on the network
This program is not recommended to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting traffic hijacking
  • Method and device for detecting traffic hijacking
  • Method and device for detecting traffic hijacking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0069] Some of the words mentioned in the embodiments of the present invention are illustrated below.

[0070] The terminal mentioned in the embodiment of the present invention is a device such as a mobile terminal or a personal computer (Personal Computer, PC for short) used. Examples include smartphones, personal digital assistants (PDAs), tablets, laptops, carputers, handheld game consoles, smart glasses, smart watches, wearable devices, virtual display dev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a traffic hijacking detection method and device, and relates to the technical field of data processing. Wherein, the method includes: acquiring request data packets and response data packets for analyzing traffic hijacking within a preset period of time in an interface of the network; processing the response data packets to obtain TTLs corresponding to multiple IP addresses in the network respectively The standard deviation of the return value; if the standard deviation of the TTL return value corresponding to the IP address is greater than or equal to the jitter threshold of the TLL return value in the preset network, it is determined that the IP address is the first IP address suspected of traffic hijacking; according to The first IP address determines the number of response packets corresponding to the first request packet in which the destination IP address in the request packet is the first IP address; when judging that the number of response packets corresponding to the first request packet is greater than or equal to the preset If the number is smaller than the number, it is determined that the first IP address corresponding to the first request data packet is an IP address with traffic hijacking.

Description

technical field [0001] The present invention relates to the technical field of data processing, in particular to a method and device for detecting traffic hijacking. Background technique [0002] With the rapid development of broadband, while the number of Internet users and traffic is increasing sharply, the number of user clicks and traffic guidance has important value. For this reason, there are a large number of traffic anomalies in the network, such as DNS (domain name service, domain name service) hijacking, HTTP (Hyper Text Transport Protocol, hypertext transfer protocol) link hijacking, etc., maliciously modify the returned content of the user's access to the website, This leads to a decline in the quality of users' perception of use, which is likely to cause batch complaints and pose a security risk to the operator's network. In order to purify the network environment, improve user awareness, stabilize the user group, and also respond to the 315 special activity of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1466
Inventor 孙剑骏李永强范春湘徐木生李维袁晓明
Owner CHINA MOBILE GRP GUANGDONG CO LTD