A method and system for identifying network boundaries
An identification method and network boundary technology, applied in the field of network resource mapping, can solve the problem of no geographical location, boundary, sampling bias affecting the accuracy of inference, etc., and achieve the effect of high accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach 1
[0070] Specific implementation mode one: as Figures 1 to 2 As shown, this embodiment provides the following description for the realization of the identification method or system of the Chinese network border:
[0071] To achieve this, the system is divided into four modules:
[0072] (1) Data labeling
[0073] (2) Data screening
[0074] (3) Gateway extraction
[0075] (4) Gateway verification
[0076] The input is the Traceroute data set from the detection point to the target IP address node, and the output is the gateway IP address set. For the input Traceroute data set, first mark each attribute of the IP address in each data, then remove the wrong Traceroute data, extract the gateway IP address from the remaining data through each attribute vote, and finally check the accuracy of these gateway IP addresses authenticating.
[0077] The specific implementation steps of the module (1) are (1.1) extract the IP address in each hop data from the Traceroute source data, a...
Embodiment
[0113] In order to describe the present invention more specifically, technical scheme of the present invention is described in detail below by example:
[0114] The object of this system test is a series of Traceroute source data measured by monitoring points, the format is as follows:
[0115]
[0116] It contains the monitoring point, destination IP address and Traceroute node information. Extract the IP address of each hop, and query each attribute in a unified manner: the source data contains RTT information, no need to query; obtain AS number and country information by querying the BGP database; query reverse domain name information through the "dig-x IP" command; The database IP2Location query country, region, city information; query organization information (org, netname, etc.) through the "whois IP" command; Ping the same target IP address through multiple monitoring points, take out the monitoring point information with the smallest delay, and the measured The res...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


