Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting game plug-in based on URI (Universal Resource Identifier) characteristic of HTTP (Hyper Text Transfer Protocol) flow

A detection method and game technology, applied in indoor games, video games, sports accessories, etc., to achieve the effect of improving detection ability, improving accuracy, and increasing the difficulty of anti-detection and anti-monitoring

Inactive Publication Date: 2019-10-25
福建天晴在线互动科技有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above-mentioned existing game plug-in behavior monitoring scheme may be bypassed by the plug-in using process hiding technology, memory polymorphism and other methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting game plug-in based on URI (Universal Resource Identifier) characteristic of HTTP (Hyper Text Transfer Protocol) flow
  • Method for detecting game plug-in based on URI (Universal Resource Identifier) characteristic of HTTP (Hyper Text Transfer Protocol) flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings.

[0039] see figure 1 As shown, a kind of game plug-in detection method based on HTTP traffic URI feature of the present invention, described method comprises the following steps: Step S1, the client of Windows system application layer creates network filtering driver at driver layer;

[0040] Step S2, establish a URI blacklist, the URI blacklist stores the URI character string contained in the HTTP packet sent by the plug-in; the step S2 is further specifically: in the process of creating a network filter driver, the plug-in is carried out in the process of network interaction The URI that can be accessed is written into the file of the network filter driver, and the Windows system application program loads and starts the network filter driver; after the network filter driver is successfully opened, the URI blacklist is initialized. During the process of initializing the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for detecting game plug-in based on URI characteristic of HTTP flow. The method comprises the steps of: S1, creating a network filter driver on a driver layer by a client of an application layer of the Windows system; S2, creating a URI blacklist; S3, capturing all the TCP (Transmission Control Protocol) data packets on a data flow layer by the network filter driver; extracting a URI parameter character string from the TCP data packets; traversing the URI blacklist to compare the URI parameter character string with each blacklist item of the URI blacklist; if the URI parameter character string extracted from the TCP data packets is the same with any one blacklist item in the URI blacklist, judging the game player has the plug-in using behavior; and S4, acquiring the process ID (Identity) information and the process routing information of the plug-in process from the context data flow, which is transmitted from the data flow creating layer of the Windowssystem to the data flow layer; and, reading the information into a plug-in detection log file. The method provided by the invention effectively detects the plug-in using behavior of the known HTTP flow characteristic, and collects the plug-in information.

Description

technical field [0001] The present invention relates to the field of computer system communication technology, software security, and game plug-in detection, especially a method for game plug-in detection and plug-in information collection based on HTTP traffic URI features, especially a game plug-in detection based on HTTP traffic URI features method. Background technique [0002] Existing cheating behavior monitoring modules usually use a detection method based on process memory scanning, such as scanning the memory space of a process to determine whether a cheating signature is included, etc. There is no publicly available HTTP traffic URI-based feature, and the existing cheating detection block usually uses A detection method based on process memory scanning, such as scanning the memory space of a process to determine whether it contains a plug-in feature code, etc. [0003] The above-mentioned existing game plug-in behavior monitoring scheme may be bypassed by methods ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): A63F13/75A63F13/70
CPCA63F13/70A63F13/75
Inventor 刘德建任佳伟陈宏展
Owner 福建天晴在线互动科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products