CN112565005B - Network serial line detection method and device, equipment and medium - Google Patents

Network serial line detection method and device, equipment and medium Download PDF

Info

Publication number
CN112565005B
CN112565005B CN202011348400.3A CN202011348400A CN112565005B CN 112565005 B CN112565005 B CN 112565005B CN 202011348400 A CN202011348400 A CN 202011348400A CN 112565005 B CN112565005 B CN 112565005B
Authority
CN
China
Prior art keywords
address
network
network segment
target detection
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011348400.3A
Other languages
Chinese (zh)
Other versions
CN112565005A (en
Inventor
杨泳
马建东
汤凌峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing VRV Software Corp Ltd
Original Assignee
Beijing VRV Software Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing VRV Software Corp Ltd filed Critical Beijing VRV Software Corp Ltd
Priority to CN202011348400.3A priority Critical patent/CN112565005B/en
Publication of CN112565005A publication Critical patent/CN112565005A/en
Application granted granted Critical
Publication of CN112565005B publication Critical patent/CN112565005B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a network serial line detection method, a device, equipment and a medium, wherein the method comprises the following steps: acquiring a target detection network segment; determining a pseudo address of the device in the target detection network segment; and detecting whether the equipment in the target detection network segment is connected to a public network or not based on the pseudo address to obtain a detection result. The method is used for a network administrator to find out a series network in time.

Description

Network serial line detection method and device, equipment and medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a network serial line detection method, apparatus, device, and medium.
Background
Inner net: generally, the system refers to an internal local area network, and only has internal mutual access rights, so that the internet cannot be accessed. An outer net: refers to a network that has access to the internet. Stringing: when an intranet gateway and an extranet (not within the range of the intranet) gateway are physically connected (for example, the intranet gateway and the extranet gateway are connected by using one network cable), in this scenario, after a PC (personal computer) machine under the intranet gateway device modifies an IP address and a gateway address into an extranet gateway address, the extranet network can be used, and this scenario is considered as the occurrence of crosstalk.
As shown in fig. 1, the network a is an intranet network, the network B is an extranet network, and the network B is connected to the internet through a gateway 10.0.0.1. Due to connection errors, the interface of the A network switch is connected to the B network switch, so that if the IP address of the A network is modified to be the IP address of the B network segment, the A network segment equipment can access the Internet through the gateway 10.0.0.1, and network crosstalk occurs at the moment.
In general, serial detection requires a technician to manually analyze the network topology, determine the network connection exit, find the switch interface, and then determine whether the network is connected in series. When the network topology is complex, this method is labor-consuming and inefficient.
Therefore, how to provide a network serial line detection scheme can accurately and quickly determine the serial line position without consuming manpower is a technical problem to be solved urgently by a technical person in the field.
Disclosure of Invention
The invention provides a network serial line detection method, a device, equipment and a medium, which can accurately and quickly determine the serial line position without consuming manpower.
In a first aspect, an embodiment of the present invention provides a network serial line detection method, including:
acquiring a target detection network segment;
determining a pseudo address of the device in the target detection network segment;
and detecting whether the equipment in the target detection network segment is connected to a public network or not based on the pseudo address to obtain a detection result.
Further, the acquiring the target detection network segment includes:
receiving a target detection network segment input by a user;
or setting the local network card into a hybrid mode and monitoring all arp packets flowing through the network card;
analyzing the arp packet to obtain a source ip address;
and under the condition that the source ip address is determined not to be the network segment, determining the ip network segment to which the arp packet belongs as a target detection network segment.
Further, the determining the pseudo address of the device in the target detection network segment includes:
starting to fetch two adjacent first addresses and second addresses from a high address in the ip range of the target detection network segment;
constructing an arp packet by taking the first address as a source address and the local mac as a source mac;
and sending the arp packet to the second address, if an arp repackage is received, determining that the first address is occupied, controlling the ip address to slide to a low range, continuously taking two adjacent ip addresses, and repeating the detection until the current ip is determined to be a pseudo address if the arp repackage is not received.
Further, the detecting whether the device in the target detection network segment is connected to a public network based on the pseudo address includes:
scanning the equipment to be detected in the target detection network segment;
sending an icmp packet to the device to be detected, wherein the icmp packet comprises: a target public network address;
and determining that the equipment to be detected is in a series line according to whether the icmp loopback packet is received.
Further, the scanning the device to be detected in the target detection network segment includes:
sequentially detecting the addresses which are not equal to the ip addresses in the target detection network segment;
constructing an arp packet, wherein a source ip of the arp packet is the pseudo address, and a source mac address is a local mac address; the destination ip of the arp packet is the address of other non-pseudo addresses in the target network segment;
sending an arp packet, and if an arp return packet is not received, detecting the next ip address; and if the arp return packet exists, the equipment is taken as the equipment to be detected.
Further, the icmp packet is sent to the device to be detected, where the icmp packet includes: the target public network address includes:
constructing an icmp packet, wherein a source ip address of the icmp packet is a pseudo address, a source mac is a local mac address, a destination ip is an internet public network address, and a destination mac is a mac address of equipment to be detected;
and sending the icmp packet to the equipment to be detected.
Further, the determining whether the device to be detected is in a series connection according to whether the icmp loopback packet is received comprises:
if the icmp return packet is not received, the device to be detected is a common device without gateway function, and starts to detect the next ip address;
and if the icmp return packet is received, the device to be detected is a gateway device which can be connected with an external network.
In a second aspect, the present invention provides a network serial line detection apparatus, including:
the network segment acquisition module is used for acquiring a target detection network segment;
the address determination module is used for determining a pseudo address of the device in the target detection network segment;
and the result determining module is used for detecting whether the equipment in the target detection network segment is connected to a public network or not based on the pseudo address to obtain a detection result.
In a third aspect, the present invention further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the computer program to implement the steps of the network crosstalk detection method according to any one of the above-mentioned embodiments.
In a fourth aspect, the present invention also provides a non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the network crosstalk detection method according to any one of the above.
The invention provides a network serial line detection method, a device, equipment and a medium, wherein the pseudo address of the equipment is determined in a target detection network segment, the equipment is disguised as the equipment in the target detection network segment, and whether the public network can be connected or not is further detected to obtain a detection result, thereby reducing the risk of illegally accessing the external network and reducing the time cost of technicians.
Drawings
In order to more clearly illustrate the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic diagram of network concatenation between network A and network B;
fig. 2 is a flowchart of a network serial line detection method according to an embodiment of the present invention;
fig. 3 is a second flowchart of a network serial line detection method according to an embodiment of the present invention;
fig. 4 is a third flowchart of a network crosstalk detection method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a network serial line detection device according to the present invention;
FIG. 6 is a schematic structural diagram of an electronic device according to the present invention;
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A network crosstalk detection method of the present invention is described below with reference to fig. 2-4.
Referring to fig. 2, fig. 3, and fig. 4, fig. 2 is a flowchart illustrating a network crosstalk detection method according to an embodiment of the present invention; fig. 3 is a second flowchart of a network serial line detection method according to an embodiment of the present invention; fig. 4 is a third flowchart of a network crosstalk detection method according to an embodiment of the present invention.
In a specific implementation manner of the present invention, an embodiment of the present invention provides a network serial line detection method, including:
step 110: acquiring a target detection network segment;
specifically, a target detection network segment can be obtained by means of user input, that is, the target detection network segment input by the user is received; certainly, an automatic acquisition mode may also be used, the local network card is set to be in a promiscuous mode, and all arp (Address Resolution Protocol) packets flowing through the local network card are monitored; analyzing the arp packet to obtain a source ip address; and under the condition that the source ip address is determined not to be the network segment, determining the ip network segment to which the arp packet belongs as a target detection network segment.
That is to say, the embodiment of the present invention provides a method for detecting whether a device network is in a series connection, where the method uses an active probing mode and a passive probing mode to determine a probed network. Active detection mode: setting network segments to be detected, actively carrying out serial detection on the network segments, and detecting whether equipment with a proxy forwarding function and capable of accessing an external network exists. And in the passive detection mode, namely, the local network card is set to be in a hybrid mode, all arp packets flowing through the local network card are monitored, the source ip address in the arp packet is analyzed, and when the arp packet of the non-local network segment is found, the serial line inspection is carried out on the ip network segment to which the arp packet belongs.
Step 120: determining a pseudo address of the device in the target detection network segment;
firstly, a network needing to be detected is found out through an active detection mode and a passive detection mode, and the network is an extranet network which can possibly access the Internet. And determining the ip range (x.x.x.1-x.x.x.255) which needs to be detected by the network according to the C-type network. An empty ip address may be found in the target detection segment as a pseudo address.
Step 130: and detecting whether the equipment in the target detection network segment is connected to a public network or not based on the pseudo address to obtain a detection result.
Specifically, after the pseudo address is determined, devices with proxy forwarding functions in the network segment are detected, addresses with ip addresses not equal to the addresses in the range are sequentially detected, an arp packet is constructed, the source ip of the arp packet is the pseudo ip address, the source mac address is the local mac address, the destination ip of the arp packet is other non-self ip addresses in the network segment, and the destination mac ff-ff-ff-ff-ff-ff is obtained. after an arp packet is sent out, if no arp return packet exists, directly detecting the next ip address; if the arp loopback packet exists, the device is indicated to exist, the source mac address in the arp loopback packet is obtained, and whether the device has a proxy forwarding function is further detected.
After scanning a device in a network segment, constructing an icmp (Internet Control Message protocol) packet, wherein the source ip address of the icmp packet is a pseudo ip address, the source mac is a local mac address, the destination ip is an Internet public network ip address, the destination mac is the device mac address, TTL (forwarding number) is equal to 64, and if the device is a gateway device, the device forwards a request packet to a public network ip and returns a public network return packet to the local machine.
And sending an icmp request packet to the device, if no icmp return packet exists, proving that the device is a common device, starting to detect the next ip address, if the icmp return packet exists, proving that the device is a gateway device which can be connected with an external network, and recording the destination ip address in the icmp packet every time in the TTL decrementing process. Thus, the routing information from the local machine to the public network ip is obtained until the request to the public network ip is made.
Further, in order to determine the pseudo address of the device in the target detection network segment, the following steps may be performed:
step 121: starting to fetch two adjacent first addresses and second addresses from a high address in the ip range of the target detection network segment;
step 122: constructing an arp packet by taking the first address as a source address and the local mac as a source mac;
step 123: and sending the arp packet to the second address, if an arp repackage is received, determining that the first address is occupied, controlling the ip address to slide to a low range, continuously taking two adjacent ip addresses, and repeating the detection until the current ip is determined to be a pseudo address if the arp repackage is not received.
That is, after the IP range is determined, it is necessary to find an unoccupied IP address as a detected source IP address in the detected network, and the local mac as a detected source mac address, which is referred to as a pseudo address herein. Specifically, two adjacent addresses are taken from a high address in the ip range, and an arp packet is constructed, wherein the source ip of the arp packet is x.x.x.254, the source mac is local mac, the destination ip is x.x.253, and the destination mac ff-ff-ff-ff-ff is assumed to be x.x.x.253. after the arp packet is sent out, if the arp return packet is received, the ip is proved to be occupied, the ip address slides to a low range, two adjacent ip addresses are continuously taken, and the detection logic is repeated; if no packet is received, the ip is not occupied, and the ip is determined to be a pseudo address.
Further, in order to detect whether the device in the target detection network segment is connected to the public network based on the pseudo address, the following steps may be performed to obtain a detection result:
step 131: scanning the equipment to be detected in the target detection network segment;
specifically, addresses which are not equal to the ip address of the target detection network segment can be sequentially detected; constructing an arp packet, wherein a source ip of the arp packet is the pseudo address, and a source mac address is a local mac address; the destination ip of the arp packet is the address of other non-pseudo addresses in the target network segment; sending an arp packet, and if an arp return packet is not received, detecting the next ip address; and if the arp return packet exists, the equipment is taken as the equipment to be detected.
Step 132: sending an icmp packet to the device to be detected, wherein the icmp packet comprises: a target public network address;
specifically, an icmp packet can be constructed, where a source ip address of the icmp packet is a pseudo address, a source mac is a local mac address, a destination ip is an internet public network address, and a destination mac is an address of the device mac to be detected; and sending the icmp packet to the equipment to be detected.
Step 133: and determining that the equipment to be detected is in a series connection according to whether the icmp return packet is received.
Specifically, if the icmp return packet is not received, the device to be detected is a common device without a gateway function, and starts to detect the device of the next ip address; and if the icmp return packet is received, the device to be detected is a gateway device which can be connected with an external network.
The network serial line detection method determines the pseudo address of the equipment in the target detection network segment, disguises the equipment as the equipment in the target detection network segment, further detects whether the public network can be connected or not, obtains a detection result, reduces the risk of illegal access to the external network and reduces the time cost of technicians, and can be used for a network administrator to find a serial line network in time.
The network crosstalk detection apparatus provided in the present invention is described below, and the network crosstalk detection apparatus described below and the network crosstalk detection method described above may be referred to in correspondence with each other.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a network serial line detection device according to the present invention.
In another embodiment of the present invention, the present invention provides a network crosstalk detection apparatus 500, including:
a network segment obtaining module 510, configured to obtain a target detection network segment;
an address determining module 520, configured to determine a pseudo address of the device in the target detection network segment;
a result determining module 530, configured to detect whether the device in the target detection network segment is connected to a public network based on the pseudo address, so as to obtain a detection result.
The network serial line detection device provided by the invention can be used for disguising the equipment into equipment in the target detection network segment by determining the fake address of the equipment in the target detection network segment, further detecting whether the public network can be connected or not to obtain a detection result, reducing the risk of illegally accessing the external network and reducing the time cost of technicians, and can be used for a network administrator to find a serial line network in time.
Fig. 6 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 6: a processor (processor)610, a communication Interface (Communications Interface)620, a memory (memory)630 and a communication bus 640, wherein the processor 610, the communication Interface 620 and the memory 630 communicate with each other via the communication bus 640. The processor 610 may invoke logic instructions in the memory 630 to perform a network crosstalk detection method comprising: acquiring a target detection network segment; determining a pseudo address of the device in the target detection network segment; and detecting whether the equipment in the target detection network segment is connected to a public network or not based on the pseudo address to obtain a detection result.
In addition, the logic instructions in the memory 630 may be implemented in software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product, the computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions, which when executed by a computer, enable the computer to perform the network crosstalk detection method provided by the above methods, the method comprising: acquiring a target detection network segment; determining a pseudo address of the equipment in the target detection network segment; and detecting whether the equipment in the target detection network segment is connected to a public network or not based on the pseudo address to obtain a detection result.
In yet another aspect, the present invention also provides a non-transitory computer-readable storage medium having stored thereon a computer program, which when executed by a processor is implemented to perform the network crosstalk detection methods provided above, the method including: acquiring a target detection network segment; determining a pseudo address of the device in the target detection network segment; and detecting whether the equipment in the target detection network segment is connected to a public network or not based on the pseudo address to obtain a detection result.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment may be implemented by software plus a necessary general hardware platform, and may also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (9)

1. A network serial line detection method is characterized by comprising the following steps:
acquiring a target detection network segment;
determining a pseudo address of the equipment in the target detection network segment;
detecting whether equipment in the target detection network segment is connected to a public network or not based on the pseudo address to obtain a detection result;
the method comprises the steps of obtaining a target detection network segment through inputting a target detection network segment by a user or through an ip network segment where an arp packet source address obtained by a local network card is located, selecting an ip address which is not occupied in the target detection network segment as a pseudo address of the device, disguising the device as a device in the target detection network segment, sending an icmp packet to a device to be detected in the target detection network segment, determining the device where a detection address is located as a gateway device which can be connected with an external network when receiving the icmp packet, and connecting the device and the gateway in series, wherein the icmp packet comprises the following steps: a target public network address.
2. The network crosstalk detection method according to claim 1,
the acquiring of the target detection network segment comprises:
receiving a target detection network segment input by a user;
or setting the local network card into a hybrid mode and monitoring all arp packets flowing through the network card;
analyzing the arp packet to obtain a source ip address;
and under the condition that the source ip address is determined not to be the network segment, determining the ip network segment to which the arp packet belongs as a target detection network segment.
3. The network crosstalk detection method according to claim 1,
the determining the pseudo address of the device in the target detection network segment includes:
starting to fetch two adjacent first addresses and second addresses from a high address in the ip range of the target detection network segment;
constructing an arp packet by taking the first address as a source address and taking the local mac as a source mac;
and sending the arp packet to the second address, if an arp repackage is received, determining that the first address is occupied, controlling the ip address to slide to a low range, continuously taking two adjacent ip addresses, and repeating the detection until the current ip is determined to be a pseudo address if the arp repackage is not received.
4. The network crosstalk detection method according to claim 1,
the detecting whether the device in the target detection network segment is connected to a public network or not based on the pseudo address, and obtaining a detection result comprises:
scanning the equipment to be detected in the target detection network segment;
sending an icmp packet to the device to be detected, wherein the icmp packet comprises: a target public network address;
if the icmp return packet is not received, the device to be detected is a common device without gateway function, and starts to detect the next ip address;
and if the icmp return packet is received, the device to be detected is a gateway device which can be connected with an external network.
5. The network crosstalk detection method according to claim 4,
the scanning of the equipment to be detected in the target detection network segment comprises the following steps:
sequentially detecting the addresses which are not equal to the ip addresses in the target detection network segment;
constructing an arp packet, wherein a source ip of the arp packet is the pseudo address, and a source mac address is a local mac address; the destination ip of the arp packet is the address of other non-pseudo addresses in the target network segment;
sending an arp packet, and if an arp return packet is not received, detecting the next ip address; and if the arp return packet exists, the equipment is used as the equipment to be detected.
6. The network crosstalk detection method according to claim 4,
sending an icmp packet to the device to be detected, where the icmp packet includes: the target public network address includes:
constructing an icmp packet, wherein a source ip address of the icmp packet is a pseudo address, a source mac is a local mac address, a destination ip is an internet public network address, and a destination mac is a local mac address;
and sending the icmp packet to the equipment to be detected.
7. A network crosstalk detection apparatus, comprising:
the network segment acquisition module is used for acquiring a target detection network segment;
the address determination module is used for determining a pseudo address of the device in the target detection network segment;
a result determining module, configured to detect whether a device in the target detection network segment is connected to a public network based on the pseudo address, and obtain a detection result;
the target detection network segment is obtained by inputting a target detection network segment by a user or through an ip network segment where an arp packet source address obtained by a local network card is located, an ip address which is not occupied in the target detection network segment is selected as a pseudo address of the device, the device is disguised as a device in the target detection network segment, an icmp packet is sent to all addresses except the pseudo address in the target detection network segment, when an icmp return packet is received, the device where the detection address is located is determined to be a gateway device which can be connected with an external network, and the device and the gateway are connected in series.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the network crosstalk detection method according to any of claims 1 to 6 when executing the program.
9. A non-transitory computer readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the network crosstalk detection method according to any of claims 1 to 6.
CN202011348400.3A 2020-11-26 2020-11-26 Network serial line detection method and device, equipment and medium Active CN112565005B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011348400.3A CN112565005B (en) 2020-11-26 2020-11-26 Network serial line detection method and device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011348400.3A CN112565005B (en) 2020-11-26 2020-11-26 Network serial line detection method and device, equipment and medium

Publications (2)

Publication Number Publication Date
CN112565005A CN112565005A (en) 2021-03-26
CN112565005B true CN112565005B (en) 2022-05-13

Family

ID=75045815

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011348400.3A Active CN112565005B (en) 2020-11-26 2020-11-26 Network serial line detection method and device, equipment and medium

Country Status (1)

Country Link
CN (1) CN112565005B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004282665A (en) * 2003-03-19 2004-10-07 Nec Corp Network information detecting apparatus and method
JP2006149530A (en) * 2004-11-26 2006-06-15 Samii Kk Game machine inspection device, game machine inspection method and game machine
CN107426044A (en) * 2016-05-23 2017-12-01 中兴通讯股份有限公司 One kind is being got lines crossed detection method, device and Operation and Maintenance server
CN109067751A (en) * 2018-08-14 2018-12-21 腾讯科技(深圳)有限公司 ARP cheat detecting method, device and terminal under a kind of non-Root environment
CN110213761A (en) * 2019-05-27 2019-09-06 中国海洋大学 Multi-model puppet AP detection method and detection device based on two-way SYN reflection
JP2019194869A (en) * 2015-09-29 2019-11-07 株式会社東芝 Information equipment or information communication terminal and information processing method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1211843A1 (en) * 2000-11-30 2002-06-05 Hewlett-Packard Company, A Delaware Corporation Process and apparatus for automatic topology discovery
CN101136797B (en) * 2007-09-28 2012-11-21 深圳市利谱信息技术有限公司 Detection of inside and outside network physical connection, on-off control method and device for using the same
CN101257388B (en) * 2008-04-08 2010-07-28 成都市华为赛门铁克科技有限公司 Lawless exterior joint detecting method, apparatus and system
CN101521578B (en) * 2009-04-03 2011-09-07 北京邮电大学 Method for detecting computer illegal external connection in closed network
CN101909021A (en) * 2010-07-27 2010-12-08 清华大学 BGP (Border Gateway Protocol) gateway equipment and method for realizing gateway on-off function by utilizing equipment
CN106656643B (en) * 2015-10-29 2019-06-04 国家计算机网络与信息安全管理中心 A kind of segmentation calculates the measurement method of network delay

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004282665A (en) * 2003-03-19 2004-10-07 Nec Corp Network information detecting apparatus and method
JP2006149530A (en) * 2004-11-26 2006-06-15 Samii Kk Game machine inspection device, game machine inspection method and game machine
JP2019194869A (en) * 2015-09-29 2019-11-07 株式会社東芝 Information equipment or information communication terminal and information processing method
CN107426044A (en) * 2016-05-23 2017-12-01 中兴通讯股份有限公司 One kind is being got lines crossed detection method, device and Operation and Maintenance server
CN109067751A (en) * 2018-08-14 2018-12-21 腾讯科技(深圳)有限公司 ARP cheat detecting method, device and terminal under a kind of non-Root environment
CN110213761A (en) * 2019-05-27 2019-09-06 中国海洋大学 Multi-model puppet AP detection method and detection device based on two-way SYN reflection

Also Published As

Publication number Publication date
CN112565005A (en) 2021-03-26

Similar Documents

Publication Publication Date Title
CN103442008B (en) A kind of routing safety detecting system and detection method
US10873594B2 (en) Test system and method for identifying security vulnerabilities of a device under test
CN111130931B (en) Detection method and device for illegal external connection equipment
CN103167044A (en) Intelligent analysis method of domain name system (DNS) and poking measurement device and system
CN108418780A (en) Filter method and device, system, the dns server of IP address
CN112751733A (en) Link detection method, device, equipment, system and switch
WO2014062629A1 (en) System and method for correlating security events with subscriber information in a mobile network environment
US10097418B2 (en) Discovering network nodes
CN108307526A (en) Equipment connection method and Related product
CN115190108A (en) Method, device, medium and electronic equipment for detecting monitored equipment
CN112565005B (en) Network serial line detection method and device, equipment and medium
CN109327558A (en) Address management method and device
US20040233849A1 (en) Methodologies, systems and computer readable media for identifying candidate relay nodes on a network architecture
CN114500118B (en) Method and device for hiding satellite network topology
CN114978600B (en) Abnormal flow processing method, system, equipment and storage medium
US10015179B2 (en) Interrogating malware
CN115883574A (en) Access equipment identification method and device in industrial control network
CN109617920A (en) A kind of message processing method, device, router and firewall box
CN102457430B (en) Network package processing method and routing equipment
CN110611678B (en) Method for identifying message and access network equipment
CN114584352A (en) Multi-network interconnected network violation external connection detection method, device and system
CN110995738B (en) Violent cracking behavior identification method and device, electronic equipment and readable storage medium
CN112202776A (en) Source station protection method and network equipment
KR102387010B1 (en) Monitoring apparatus and monitoring method
CN116015876B (en) Access control method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant