Unlock instant, AI-driven research and patent intelligence for your innovation.

A Method for Analyzing and Identifying Large Bandwidth Private Connections

An identification method and high-bandwidth technology, which can be used in transmission systems, electrical components, etc., to solve problems such as inability to locate network security, loss of operator customer resources, and poor quality of Internet access for users.

Active Publication Date: 2021-06-08
BEIJING RUNSTONE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the speed-up strategy of operators' broadband networks, the bandwidth of home broadband access continues to increase, and incidents of using home broadband bandwidth resources for illegal operations emerge in endlessly, making it impossible to locate network security, and at the same time causing loss of customer resources for operators; bandwidth resale, black operations ( Sell ​​one or more broadband resources to more users), resulting in poor quality of Internet access for end users. The social response is that the operator's network is poor, which affects the operator's brand and reduces customer trust.
[0003] Among them, DPI (Deep Packet Inspection Technology) identifies the number of terminals of a broadband user by monitoring the id sequence of the user's IP protocol layer. There are already cracking technologies and equipment on the network. control;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Analyzing and Identifying Large Bandwidth Private Connections
  • A Method for Analyzing and Identifying Large Bandwidth Private Connections

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0020] In addition, the steps shown in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and, although a logical order is shown in the flow diagrams, in some cases, the sequence may be different. The steps shown or described are performed in the order herein.

[0021] Such as figure 1 As shown, a large-bandwidth private connection anal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a large bandwidth private connection analysis and identification method, comprising: step 1) establishing daily traffic statistics baselines of various access bandwidth types, and filtering out abnormal users according to the set traffic threshold coefficients of each access bandwidth; 2) Classify and analyze the identified users with abnormal traffic. The same network access devices, similar inner and outer vlan ids, user-side access MAC addresses are similar, and the online and offline times are consistent. Combining the four identification parameters, all Matching or partially matching users are grouped and classified; grouped users are checked according to the matching degree of parameters with different priorities, so as to identify bundled private connection users. The invention can identify single user private connection and multi-user binding private connection.

Description

technical field [0001] The invention relates to a large-bandwidth private connection analysis and identification method based on Radius (broadband user access authentication system) data and DNS (user domain name request data). Background technique [0002] With the speed-up strategy of operators' broadband networks, the bandwidth of home broadband access continues to increase, and incidents of using home broadband bandwidth resources for illegal operations emerge in endlessly, making it impossible to locate network security, and at the same time causing loss of customer resources for operators; bandwidth resale, black operations ( Sell ​​one or more broadband resources to more users), resulting in poor quality of Internet access for end users. The social response is that the operator's network is poor, which affects the operator's brand and reduces customer trust. [0003] Among them, DPI (Deep Packet Inspection Technology) identifies the number of terminals of a broadband ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 王立俊杨世标叶晓斌李东升龙柯钟凯关诚勇
Owner BEIJING RUNSTONE TECH