Encrypted traffic analysis method based on man-in-the-middle hijacking technology
A parsing method and man-in-the-middle technology, applied in the field of network information security, can solve problems such as effective supervision of encrypted traffic, and achieve the effects of protecting computer security, responding quickly, and protecting enterprise security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The technical solutions in the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the above-described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments.
[0019] refer to figure 1 , an encrypted traffic analysis method based on man-in-the-middle hijacking technology, the method consists of two parts, one is the proxy client program, and the other is serving the monitoring center. The client program is uniformly pushed by the domain administrator and installed silently. The working principle of the proxy client is: forging a digital certificate to deceive the browser and the real server in both directions, and the forged digital certificate must be signed by the root certificate imported by the client during installation, otherwise the browser will warn that it is not trusted.
[0020] Step 1. Silent push installation of proxy client through domai...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

