Supercharge Your Innovation With Domain-Expert AI Agents!

A proxy traffic detection method, apparatus, electronic device and readable storage medium

A traffic detection and traffic technology, applied in the field of network security, can solve problems such as weak technical detection capability, inability to proxy traffic detection, and inability to obtain network packet content.

Active Publication Date: 2022-08-09
SANGFOR TECH INC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the traffic passes port masquerade or transmission encryption, such as generated by using Shadowsocks tool (Shadowsocks is a widely used proxy tool based on socks protocol, which uses symmetric encryption algorithm to encrypt communication traffic), it will make it impossible to obtain network data The content of the packet, and thus cannot detect the proxy traffic, so the detection ability of related technologies is weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A proxy traffic detection method, apparatus, electronic device and readable storage medium
  • A proxy traffic detection method, apparatus, electronic device and readable storage medium
  • A proxy traffic detection method, apparatus, electronic device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments It is only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.

[0051] Please refer to figure 1 , figure 1 This is a flowchart of a proxy traffic detection method provided in the embodiment of the present application. The method includes:

[0052] S101: Acquire the traffic to be detected, and determine the data stream behavior characteristics corresponding to the traffic to be detected.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a proxy traffic detection method, device, electronic device, and computer-readable storage medium. The method includes: acquiring traffic to be detected, and determining data stream behavior characteristics corresponding to the traffic to be detected; The characteristics obtained by detecting the network communication of the traffic; using the identification and classification model to classify the behavior characteristics of the data stream, and obtain the classification result; if the classification result is abnormal, the traffic to be detected is determined to be the proxy traffic; this method does not pay attention to the individual traffic in the traffic. The specific content of the data packet, but the corresponding data stream behavior characteristics are extracted. The data stream behavior characteristics can reflect the characteristics of the session connection or the network communication situation of the data flow, and detect the traffic to be detected from the characteristics of the network communication situation of the traffic, so it can detect the proxy traffic transmitted through port masquerading or encryption. Has strong detection ability.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to a proxy traffic detection method, a proxy traffic detection device, an electronic device, and a computer-readable storage medium. Background technique [0002] The socks protocol (Protocol for sessions traversal across firewall securely) provides a framework that enables clients in the TCP (Transmission Control Protocol, Transmission Control Protocol) and UDP (User Datagram Protocol, User Datagram Protocol) domains Or the server application can use the services provided by the network firewall more conveniently and safely, such as accessing overseas websites and hiding its real IP. In order to detect the proxy traffic, the related art usually reads the content of the network data packet, that is, the payload and the port number, and determines whether the network data packet is a data packet in the proxy traffic based on the content. However, if the traff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L47/10H04L43/02H04L43/0876
CPCH04L43/08H04L43/16H04L63/1408H04L63/0428H04L63/30
Inventor 岳巍
Owner SANGFOR TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More