Method for broadband private connection analysis and identification

An identification method and large-bandwidth technology, applied in electrical components, transmission systems, etc., can solve problems such as lowering customer trust, poor operator network, and large investment, and achieve the effect of avoiding security behaviors that cannot be located and low cost

Active Publication Date: 2019-01-01
BEIJING RUNSTONE TECH
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the speed-up strategy of operators' broadband networks, the bandwidth of home broadband access continues to increase, and incidents of using home broadband bandwidth resources for illegal operations emerge in endlessly, making it impossible to locate network security, and at the same time causing loss of customer resources for operators; bandwidth resale, black operations ( Sell ​​one or more broadband resources to more users), resulting in poor quality of Internet access for end users. The social response is that the operator's network is poor, which affects the operator's brand and reduces customer trust.
[0003] Among them, DPI (Deep Packet Inspection Technology) identifies the number of terminals of a broadband user by monitoring the id sequence of the user's IP protocol layer. There are already cracking technologies and equipment on the network. control;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for broadband private connection analysis and identification
  • Method for broadband private connection analysis and identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0020] In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0021] Such as figure 1 As shown, a large-bandwidth private connection anal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for broadband private connection analysis and identification. The method comprises the steps of: the step 1) establishing a plurality of bandwidth types of daily flow statistics base line, and filtering an abnormal user according to each arranged access bandwidth threshold coefficient; and the step 2) performing subsumption analysis for the identified flowabnormal user, wherein the same network access device, a similar inner and outer layer vlan id and the user side access MAC address are similar, the online and offline time is consistent, the four identification parameters are combined, users who meet the requirement or partially meet the requirement are subjected to grouping and classification; the grouped users are subjected to checking with different priority according to the parameter matching rate to identify the binding private connection users. The method for broadband private connection analysis and identification can identify the single user private connection and multi-user binding private connection.

Description

technical field [0001] The invention relates to a large-bandwidth private connection analysis and identification method based on Radius (broadband user access authentication system) data and DNS (user domain name request data). Background technique [0002] With the speed-up strategy of operators' broadband networks, the bandwidth of home broadband access continues to increase, and incidents of using home broadband bandwidth resources for illegal operations emerge in endlessly, making it impossible to locate network security, and at the same time causing loss of customer resources for operators; bandwidth resale, black operations ( Sell ​​one or more broadband resources to more users), resulting in poor quality of Internet access for end users. The social response is that the operator's network is poor, which affects the operator's brand and reduces customer trust. [0003] Among them, DPI (Deep Packet Inspection Technology) identifies the number of terminals of a broadband ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 王立俊杨世标叶晓斌李东升龙柯钟凯关诚勇
Owner BEIJING RUNSTONE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products