high-hiding network agent method and system based on an HTTP protocol

An HTTP protocol and network proxy technology, applied in the field of high-secrecy network proxy methods and systems, can solve the problems of weak concurrency and easy identification of traffic, and achieve low cost, efficient proxy services, and reduced computing and occupancy rates. Effect

Active Publication Date: 2019-05-14
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to provide a high-concealment network proxy method and system based on the HTTP protocol, design and implement a set of proxy communication solutions that improve proxy efficiency and concealment, and solve the problem of weak concurrency and easy identification of traffic in existing proxy applications And other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • high-hiding network agent method and system based on an HTTP protocol
  • high-hiding network agent method and system based on an HTTP protocol
  • high-hiding network agent method and system based on an HTTP protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail in conjunction with the accompanying drawings.

[0065] The present embodiment provides a highly hidden network proxy system based on the HTTP protocol, such as figure 1 shown. A complete HTTP request forwarding process requires the joint participation of the user, the tunnel proxy client, the tunnel proxy server and the target server to complete. The whole process can be divided into two parts, the process in which the user sends an HTTP request to the target server and the server returns a resource response. The specific instructions are as follows:

[0066] (1) The tunnel proxy client listens on the corresponding port. Whenever the user sends an HTTP request (GET, POST, PUT or CONNECT, etc.) to the server in the Internet, a TCP connection will be established with the user. After the connection is esta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an HTTP-based high-hiding network agent method and system, which are used for designing and realizing a set of agent communication scheme for improving agent efficiency and hiding property, and solving the problems that the concurrency capability is weak, the flow is easy to identify and the like in the existing agent application. And data hiding transmission based on an application layer protocol is realized through a tunnel technology, so that the concealment of proxy traffic is improved. Meanwhile, the load data is split, the characteristics of the original data are hidden, and the purpose of anti-flow analysis is achieved. The communication quality of the agent system under high concurrent access is ensured through an asynchronous transmission framework, and theuse experience of a user is improved.

Description

technical field [0001] The invention belongs to the field of computer information technology, and in particular relates to a high-concealment network agent method and system based on the HTTP protocol. Background technique [0002] Proxy is a transfer station of network information, which solves many problems such as access restrictions caused by network structure, Internet speed is easily affected by bandwidth, and information security is difficult to guarantee. It is generally used in scenarios such as access control, data caching, and user privacy protection. [0003] From a product point of view, proxies on the market can be divided into personal customized VPN services and websites that provide a large number of proxy nodes. VPN provides individual users with faster Internet speed and hides their real IP by establishing a private network on a public network for encrypted communication. Proxy service providers (such as cloud proxy, ant proxy, etc.) collect a large numb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 彭怀梁龙思怡戴琼覃海湄
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products