CN102946320B - Distributed supervision method and system for user behavior log forecasting network - Google Patents
Distributed supervision method and system for user behavior log forecasting network Download PDFInfo
- Publication number
- CN102946320B CN102946320B CN201210382322.8A CN201210382322A CN102946320B CN 102946320 B CN102946320 B CN 102946320B CN 201210382322 A CN201210382322 A CN 201210382322A CN 102946320 B CN102946320 B CN 102946320B
- Authority
- CN
- China
- Prior art keywords
- network
- lca
- access
- popularity
- log
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 239000000284 extract Substances 0.000 claims abstract description 18
- 238000004458 analytical method Methods 0.000 claims abstract description 8
- UNEIHNMKASENIG-UHFFFAOYSA-N para-chlorophenylpiperazine Chemical compound C1=CC(Cl)=CC=C1N1CCNCC1 UNEIHNMKASENIG-UHFFFAOYSA-N 0.000 claims abstract 11
- 238000004364 calculation method Methods 0.000 claims description 22
- 230000008569 process Effects 0.000 abstract description 9
- 238000012544 monitoring process Methods 0.000 description 16
- 230000006870 function Effects 0.000 description 8
- 238000007726 management method Methods 0.000 description 6
- 238000011160 research Methods 0.000 description 5
- 230000000903 blocking effect Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000001105 regulatory effect Effects 0.000 description 3
- 238000007781 pre-processing Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 244000062645 predators Species 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
本发明公开了一种分布式用户行为日志预测网络监管方法,所述方法包括:数据包采集与策略预取服务器PCPP捕获网络用户发起的网络访问请求数据包,提取访问日志,上传给日志收集与分析服务器LCA;LCA存储所述访问日志,根据所述访问日志计算网络服务流行度;LCA根据所述访问日志获取所述网络服务流行度相对应的k个网络服务标识;并返回给所述PCPP;PCPP根据所述k个网络服务标识以及访问日志中的用户属性信息,向预先设定的策略库中进行策略预取,根据预取到的策略对网络用户访问请求进行监管处置。本发明能够实现海量网络用户对网络服务访问请求过程中的快速、高效、准确的网络监管和处置。
The invention discloses a distributed user behavior log prediction network supervision method, the method comprising: data packet collection and policy prefetching server PCPP captures network access request data packets initiated by network users, extracts access logs, and uploads them to the log collection and Analysis server LCA; LCA stores the access log, calculates network service popularity according to the access log; LCA obtains k network service identifiers corresponding to the network service popularity according to the access log; and returns to the PCPP ; PCPP performs policy prefetching from a preset policy library according to the k network service identifiers and user attribute information in the access log, and supervises and disposes network user access requests according to the prefetched policy. The invention can realize fast, efficient and accurate network supervision and disposal in the process of mass network users requesting network service access.
Description
技术领域technical field
本发明涉及网络监管技术领域,特别涉及一种分布式用户行为日志预测网络监管方法及系统。The invention relates to the technical field of network monitoring, in particular to a network monitoring method and system for predicting distributed user behavior logs.
背景技术Background technique
随着互联网的飞速发展,网络服务变得多种多样,丰富多彩。由于互联网从成立之初就本着开放自由的原则,越来越多的新型网络服务不断地被开发出来,并且被接入到互联网,供全球用户访问和接入。网络服务变得多种多样,丰富多彩,人与人之间的信息交流也变得更为方便。内容丰富的网络服务在给人们的生活带来了极大的方便的同时也成了不和谐信息传播的温床。因此,网络监管成为十分重要的研究课题。With the rapid development of the Internet, network services have become diverse and colorful. Since the Internet has been based on the principle of openness and freedom since its inception, more and more new network services have been continuously developed and connected to the Internet for global users to access and access. Network services have become diverse and colorful, and information exchange between people has become more convenient. The content-rich network service has brought great convenience to people's life, but it has also become a hotbed of discordant information dissemination. Therefore, network supervision has become a very important research topic.
网络监管的目的在于搜集、分析和处理网络信息和用户操作行为,并从中识别和提取网络服务信息和用户行为中所隐含的特定活动特征,其核心在于事先发现和预警功能。世界各国一直高度重视网络监管方面的研究,都开始建立政府、金融、关键行业的监测基础设施。如美国联邦调查局FBI早在2001年就曾提出“Carnivore”计划、法国国防部于2004年建立了“Frenchelon”系统、欧洲ERCIM组织2007年提出了网络监控会议计划、英国政府通讯总部也在2009年启动了MTI计划。各网络设备商、企业以及科研学者也积极进行相关研究,开发了各种网络行为分析产品,提出了诸多网络监测方案。在网络管理方面,有文献提出了针对异构网络的自治网络管理体系和基于策略的网络管理方法,“自管理”和“信任管理”的概念也被广泛应用于网络管理方法中。The purpose of network supervision is to collect, analyze and process network information and user operation behavior, and to identify and extract specific activity characteristics hidden in network service information and user behavior. Its core lies in the early detection and early warning functions. Countries around the world have always attached great importance to research on network supervision, and have begun to establish monitoring infrastructure for government, finance, and key industries. For example, the FBI of the United States proposed the "Carnivore" plan as early as 2001, the French Ministry of Defense established the "Frenchelon" system in 2004, the European ERCIM organization proposed a network monitoring conference plan in 2007, and the British Government Communications Headquarters also launched a plan in 2009. The MTI program was launched in 2009. Various network equipment vendors, enterprises, and scientific researchers are also actively conducting related research, developing various network behavior analysis products, and proposing many network monitoring solutions. In terms of network management, some literatures have proposed autonomous network management systems and policy-based network management methods for heterogeneous networks. The concepts of "self-management" and "trust management" have also been widely used in network management methods.
日志记录对监管系统起着重要作用,因此,网络日志被越来越多的研究所关注。对海量的网络用户和信息的监控决定了网络监管系统的运行需要大量的数据资料,同时也会产生大量的日志记录。当前的网络监管架构一般都采用单一的日志服务器结构。基于用户操作日志预测流媒体访问行为的相关研究工作提出了一种中心化的日志收集服务器,该日志收集服务器通过收集和分析大量用户操作记录实现对流媒体访问的预测。Logging plays an important role in the supervisory system, therefore, weblogs are paid more and more attention to by research. The monitoring of a large number of network users and information determines that the operation of the network monitoring system requires a large amount of data, and will also generate a large number of log records. The current network supervision framework generally adopts a single log server structure. The relevant research work on predicting streaming media access behavior based on user operation logs proposes a centralized log collection server, which realizes the prediction of streaming media access by collecting and analyzing a large number of user operation records.
针对于国内的网络信息安全监管的需求,相应的网络监管系统及关键技术被不断地提出。然而,在实现本发明的过程中,发明人发现现有技术至少存在以下问题:In response to the needs of domestic network information security supervision, corresponding network supervision systems and key technologies have been continuously proposed. However, in the process of realizing the present invention, the inventor finds that the prior art has at least the following problems:
现有的监管方式粒度不够精确,不具备特定用户对特定网络服务内容的访问控制。当前对非法服务或用户处理技术一般为:a)域名劫持;b)IP地址封锁;c)特定端口封锁;d)SSL连接阻断;e)关键字过滤阻断等。The granularity of the existing regulatory methods is not precise enough, and there is no access control for specific users to specific network service content. The current processing techniques for illegal services or users generally include: a) domain name hijacking; b) IP address blocking; c) specific port blocking; d) SSL connection blocking; e) keyword filtering blocking, etc.
现有的访问日志一般采用单一结构。单一化结构日志服务器在大量数据处理的时候具有一定的瓶颈,原因在于:a)大规模网络服务请求时,系统提取、分析和处理数据时延增大;b)单一节点失败问题;c)可扩展性、健壮性差;d)容易成为被攻击的重点对象等。Existing access logs generally adopt a single structure. The single-structured log server has a certain bottleneck when processing a large amount of data. The reasons are: a) When large-scale network service requests are requested, the system extracts, analyzes and processes data. Poor scalability and robustness; d) easy to become the key target of attacks, etc.
单一终端能力有限,大规模网络服务请求时,系统处理时延增大,不能满足网络监管的实时性要求。不具备特定用户对特定网络服务内容的访问控制。大容量网络访问数据存储必将导致系统存储空间成为性能瓶颈。可扩展性差。显然,这种单一客户/服务器(Client/Server,C/S)结构在规模和功能上不能满足高效、快速、准确网络监管的要求。The capability of a single terminal is limited, and when a large-scale network service is requested, the system processing delay increases, which cannot meet the real-time requirements of network supervision. There is no access control for specific users to specific web service content. Large-capacity network access data storage will inevitably cause system storage space to become a performance bottleneck. Poor scalability. Obviously, this single client/server (Client/Server, C/S) structure cannot meet the requirements of efficient, fast and accurate network supervision in terms of scale and function.
发明内容Contents of the invention
为了解决现有技术的问题,本发明实施例提供了一种分布式用户行为日志预测网络监管方法及系统。所述技术方案如下:In order to solve the problems in the prior art, an embodiment of the present invention provides a distributed user behavior log prediction network monitoring method and system. Described technical scheme is as follows:
一种分布式用户行为日志预测网络监管方法,所述方法包括:A distributed user behavior log prediction network supervision method, the method comprising:
数据包采集与策略预取服务器PCPP捕获网络用户发起的网络访问请求数据包,提取访问日志,上传给日志收集与分析服务器LCA;The data packet collection and policy prefetching server PCPP captures the network access request data packets initiated by network users, extracts access logs, and uploads them to the log collection and analysis server LCA;
LCA存储所述访问日志,根据所述访问日志计算网络服务流行度;The LCA stores the access log, and calculates the network service popularity according to the access log;
LCA根据所述访问日志获取所述网络服务流行度相对应的k个网络服务标识;并返回给所述PCPP;The LCA acquires k network service identifiers corresponding to the network service popularity according to the access log; and returns to the PCPP;
PCPP根据所述k个网络服务标识以及访问日志中的用户属性信息,向预先设定的策略库中进行策略预取,根据预取到的策略对网络用户访问请求进行监管处置。PCPP performs policy prefetching from a preset policy library according to the k network service identifiers and user attribute information in the access log, and supervises and handles network user access requests according to the prefetched policy.
所述PCPP采用旁路监听的方式从网络数据转发设备捕获网络用户发起的网络访问请求数据包。The PCPP captures the network access request data packet initiated by the network user from the network data forwarding device by way of bypass monitoring.
所述访问日志是以四元组的形式存储的,包括网络用户所处网络的标识CNID、网络用户访问目标的IP地址DIP、网络用户访问目标的端口地址DPort以及网络服务标识URL。The access log is stored in the form of a quaternion, including the identifier CNID of the network where the network user is located, the IP address DIP of the network user's access target, the port address DPort of the network user's access target, and the network service identification URL.
所述LCA存储所述访问日志,包括:The LCA stores the access logs, including:
所述LCA提取<CNID,DIP,DPort>并进行散列计算获得key值;The LCA extracts <CNID, DIP, DPort> and performs hash calculation to obtain the key value;
根据key值,LCA获得所述访问日志存储的后继结点LCA,并向该后继结点分发用户访问日志;According to the key value, the LCA obtains the successor node LCA stored in the access log, and distributes the user access log to the successor node;
所述后继结点LCA接收到分发的所述访问日志后,存储所述访问日志至其网络服务访问日志库中。After receiving the distributed access log, the successor node LCA stores the access log in its network service access log library.
所述根据所述网络日志计算网络服务流行度,包括:The calculation of network service popularity according to the network log includes:
LCA将所述访问日志存储在网络日志存储表中,并建立网络服务流行度存储表;The LCA stores the access log in a network log storage table, and establishes a network service popularity storage table;
循环比较所述网络日志存储表和网络服务流行度存储表,若所述网络日志存储表中的第i项记录与网络服务流行度存储表中的第j项记录的CNID,DIP,DPort以及URL相同,则LCA设置网络服务流行度存储表中的相应网络服务流行度进行加1操作,同时,删除所述网络日志存储表中该记录项;Circularly compare the network log storage table and the network service popularity storage table, if the i-th item record in the network log storage table and the j-th item record in the network service popularity storage table CNID, DIP, DPort and URL Identical, then LCA sets the corresponding network service popularity in the network service popularity storage table Perform the plus 1 operation, and at the same time, delete the record item in the network log storage table;
若所述网络日志存储表中的第i项记录与网络服务流行度存储表中的第j项记录的CNID,DIP,DPort或者URL不同,则LCA在网络服务流行度存储表中增加对应的新记录项,并设置相应的网络服务流行度为“1”,同时,删除所述网络日志存储表中该记录项。If the i-th item record in the network log storage table is different from the CNID, DIP, DPort or URL of the j-th item record in the network service popularity storage table, then LCA will increase the corresponding new value in the network service popularity storage table. Record items and set the corresponding network service popularity is "1", and at the same time, delete the record item in the network log storage table.
所述网络服务流行度存储表中设定时长内没有被更新的访问日志将被删除。The access logs that have not been updated within the set period of time in the network service popularity storage table will be deleted.
所述方法还包括:The method also includes:
当所述LCA当前系统时间与其最后一次进行的网络服务访问流行度计算时间之差等于τ时,所述LCA启动新一轮的网络服务流行度计算。When the difference between the current system time of the LCA and the last network service access popularity calculation time of the LCA is equal to τ, the LCA starts a new round of network service popularity calculation.
所述LCA根据所述访问日志获取所述网络服务流行度相对应的k个网络服务标识,包括:The LCA acquires k network service identifiers corresponding to the network service popularity according to the access log, including:
所述LCA利用CNID、DIP、DPort在网络服务流行度存储表中获得所有相关的URL条数;Described LCA utilizes CNID, DIP, DPort to obtain all relevant URL bar numbers in network service popularity storage table;
根据预先设定的k值,获得网络服务流行度排名在前k项的URL;Obtain the top k URLs of network service popularity according to the preset k value;
若存在多于k条网络服务具有相同网络服务流行度,则提取被访问时间最靠前的网络服务流行度排名在前k项的URL。If there are more than k network services with the same network service popularity, extract the URLs of the network service popularity ranking the top k items with the most access time.
所述方法还包括:The method also includes:
所述访问日志中的用户属性信息由PCPP从所述网络日志中提取;所诉预先设定的策略库根据网络监管的策略设定;The user attribute information in the access log is extracted from the network log by PCPP; the preset policy library is set according to the policy of network supervision;
所述根据预取到的策略对网络用户访问请求进行监管处置,包括:The supervising and handling of network user access requests according to the prefetched strategy includes:
从所述策略库中获取所述网络用户与所述k个网络服务之间的监管策略;Acquiring supervision policies between the network user and the k network services from the policy library;
在所述网络用户下一次访问请求时,判断其是否针对所述k个网络服务,若是,则直接根据预取的策略对其进行网络监管处置;否则,提取网络用户请求访问数据包,生成网络用户访问日志。When the network user requests the next access, it is judged whether it is for the k network services, and if so, it is directly subjected to network supervision and treatment according to the prefetching strategy; otherwise, the network user request access data packet is extracted to generate a network User access logs.
一种分布式用户行为日志预测网络监管系统,所述系统包括PCPP和LCA,其中,A distributed user behavior log prediction network monitoring system, the system includes PCPP and LCA, wherein,
所述PCPP用于捕获网络用户发起的网络访问请求数据包,提取访问日志,上传给LCA;获取网络服务流行度,并根据预先设定的策略库获取网络监管策略,对所述网络用户的网络访问请求进行监管处置;The PCPP is used to capture the network access request packet initiated by the network user, extract the access log, and upload it to the LCA; obtain the popularity of the network service, and obtain the network supervision policy according to the preset policy library, and control the network of the network user. access requests for regulatory disposition;
所述LCA用于分发存储所述访问日志,根据所述访问日志计算网络服务流行度并下发给PCPP。The LCA is used for distributing and storing the access log, and calculating the network service popularity according to the access log and sending it to the PCPP.
所述系统包括若干个LCA,所述LCA组成分布式哈希表DHT网络;The system includes several LCAs, and the LCAs form a distributed hash table DHT network;
LCA对接收到的所述访问日志通过分布式哈希算法进行散列计算获得key值,根据key值,LCA获得所述访问日志存储的后继结点LCA,并向该后继结点分发用户访问日志。The LCA performs hash calculation on the received access log through a distributed hash algorithm to obtain a key value, and according to the key value, the LCA obtains the successor node LCA stored in the access log, and distributes the user access log to the successor node .
本发明实施例提供的技术方案带来的有益效果是:The beneficial effects brought by the technical solution provided by the embodiments of the present invention are:
通过以分布式方式收集、存储和分析网络用户操作日志记录,根据访问日志计算网络服务流行度,再根据网络服务流行度来预测用户下次访问网络的行为可能针对的网络服务,从而预取到下次网络访问所需要的监管策略。结合网络服务的属性和用户属性,并调用相应预处理策略,以实现海量网络用户对网络服务访问请求过程中的快速、高效、准确的网络监管和处置。By collecting, storing and analyzing network user operation log records in a distributed manner, calculating the network service popularity based on the access log, and then predicting the network service that the user's next access to the network behavior may target according to the network service popularity, so as to prefetch The governance policy required for the next network access. Combining the attributes of network services and user attributes, and invoking corresponding preprocessing strategies, in order to realize the rapid, efficient and accurate network supervision and disposal in the process of mass network users' access requests to network services.
附图说明Description of drawings
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings that need to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present invention. For those skilled in the art, other drawings can also be obtained based on these drawings without creative effort.
图1是本发明实施例一提供的分布式用户行为日志预测网络监管方法流程图;FIG. 1 is a flow chart of a distributed user behavior log prediction network supervision method provided by Embodiment 1 of the present invention;
图2是本发明实施例一提供的PCPP查询用户使用接入网ID示意图;FIG. 2 is a schematic diagram of the PCPP query user access network ID provided by Embodiment 1 of the present invention;
图3是本发明实施例二提供的分布式用户行为日志预测网络监管系统结构示意图。FIG. 3 is a schematic structural diagram of a distributed user behavior log prediction network supervision system provided by Embodiment 2 of the present invention.
具体实施方式Detailed ways
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式作进一步地详细描述。In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.
网络信息安全监管系统的运行需要大量的数据资料,同时也会产生大量的数据记录。因为单一终端能力有限,对于网络服务监管实时性强的特性,更需要多节点之间的协作以提高系统的性能和稳定性。因此,我们基于分布式哈希表(Distributed Hash Table,DHT)提出一种基于分布式用户行为日志预测的网络监模型(DUHP),DUHP以分布式、自组织等特征实现分布式环境下用户行为日志共享、可扩展性、低成本以及负载均衡等优势。DUHP的特征在于以分布式方式分发和存储用户访问网络服务日志,计算网络服务访问流行度(hot),基于用户自然属性(如年龄、兴趣爱好、地域等)并结合日志分析结果,预测用户未来访问行为,以此为依据进行用户动态属性(如黑白名单)与网络服务属性(如域名、黑白名单等)匹配从而实现策略预取,达到快速高效的监管。The operation of the network information security supervision system requires a large amount of data, and will also generate a large number of data records. Because of the limited capability of a single terminal, the real-time nature of network service supervision requires collaboration among multiple nodes to improve system performance and stability. Therefore, based on Distributed Hash Table (DHT), we propose a network monitoring model (DUHP) based on distributed user behavior log prediction. Advantages of log sharing, scalability, low cost, and load balancing. DUHP is characterized by distributing and storing user access network service logs in a distributed manner, calculating network service access popularity (hot), based on user natural attributes (such as age, hobbies, regions, etc.) and combining log analysis results to predict the user's future Access behavior, based on which, user dynamic attributes (such as black and white lists) are matched with network service attributes (such as domain names, black and white lists, etc.) to achieve policy prefetching and fast and efficient supervision.
本发明实施例的方案针对已有相关网络监管方案/技术存在的问题,提出一种新颖的基于分布式行为日志预测的网络监管系统。其特点在于:1)基于用户操作日志预测用户未来访问行为。这一特点用以解决用户请求访问网络服务过程中的低时延、高效监管。2)基于用户属性和网络服务属性进行访问权限匹配。这一特点用以实现特定用户对特定服务内容的访问控制,解决现有基于IP地址(端口)等粗粒度监管问题,达到更为细粒度的“用户-服务”匹配的监管。3)采用对等网络(Peer-to-Peer,P2P)构建分布式“用户—服务”操作日志的分发、计算和存储结构。这一特点目的在于解决单一节点瓶颈问题,为大规模日志记录计算和存储提供解决方案。本发明实施例的目的在于满足网络服务多样性和大规模化环境下对网络服务高效监管的支持。The solutions of the embodiments of the present invention aim at the problems existing in related network monitoring solutions/technologies, and propose a novel network monitoring system based on distributed behavior log prediction. Its features are as follows: 1) Predict the user's future access behavior based on the user operation log. This feature is used to solve the low-latency and efficient supervision during the process of user requests to access network services. 2) Match access rights based on user attributes and network service attributes. This feature is used to realize the access control of specific users to specific service content, solve the existing coarse-grained supervision problems based on IP addresses (ports), and achieve more fine-grained "user-service" matching supervision. 3) Use peer-to-peer network (Peer-to-Peer, P2P) to construct the distribution, calculation and storage structure of distributed "user-service" operation log. The purpose of this feature is to solve the bottleneck problem of a single node and provide a solution for large-scale logging calculation and storage. The purpose of the embodiments of the present invention is to meet the needs of network service diversity and support for efficient supervision of network services in a large-scale environment.
实施例一Embodiment one
如图1所示,为本发明实施例提供的分布式用户行为日志预测网络监管方法流程图,具体如下:As shown in Figure 1, the flow chart of the distributed user behavior log prediction network supervision method provided by the embodiment of the present invention is as follows:
步骤10,PCPP捕获网络用户发起的网络访问请求数据包,提取访问日志,上传给LCA。In step 10, the PCPP captures the network access request data packet initiated by the network user, extracts the access log, and uploads it to the LCA.
当网络用户发起网络访问请求时,数据包采集与策略预取服务器(PCPP)捕获数据包并按给定规则提取访问日志。当访问日志被提取,PCPP将进行两方面工作:1)根据访问日志中的源端(用户)IP地址向IP地址规则库(IPRD)查询并获得用户所使用的接入网ID(CNID);2)上传访问日志至其连接的日志收集与分析服务器(LCA)。进一步的,根据访问日志中的关键信息(如URL)向其连接的LCA请求查询该网络服务访问流行度 When a network user initiates a network access request, the data packet collection and policy prefetching server (PCPP) captures the data packet and extracts the access log according to a given rule. When the access log is extracted, PCPP will perform two tasks: 1) query the IP address rule base (IPRD) according to the source (user) IP address in the access log and obtain the access network ID (CNID) used by the user; 2) Upload the access log to the log collection and analysis server (LCA) connected to it. Further, according to the key information (such as URL) in the access log, request the access popularity of the network service to the connected LCA
具体步骤如下:Specific steps are as follows:
假定用户SIP(i)发起对网址的访问请求WebSitei,PCPP(p)按一定方式(如旁路监听)从网络数据转发设备(如路由器、交换机等)抓取数据包并提取用户IP地址Source IP(i)。Assuming that user SIP(i) initiates an access request to the website WebSite i , PCPP(p) captures data packets from network data forwarding devices (such as routers, switches, etc.) in a certain way (such as bypass monitoring) and extracts the user's IP address Source IP(i).
PCPP(p)凭借该Source IP(i)向IPRD查询用户所使用的CNID。(CNID可以为用户定义的任何无二义性的字符,为方便说明,本方案中采用正整数表示CNID,例如“1”表示教育网,“2”表示电信网等等。)PCPP(p) queries IPRD for the CNID used by the user by virtue of the Source IP(i). (CNID can be any unambiguous character defined by the user. For the convenience of description, a positive integer is used to represent CNID in this solution, such as "1" for education network, "2" for telecommunication network, etc.)
IPRD按照一定规则(如按照最长匹配方法)查询并返回CNID给向其发出查询请求的PCPP(p)。如图2所示,为PCPP查询用户使用接入网ID示意图。其中,IP地址库中包含着IP地址范围、对应的接入网类型和接入网ID。PCPP(p)获取用户的源IP地址,向IP地址规则库IPRD查询,按照最长匹配规则匹配,返回接入网ID给PCPP(p)。IPRD inquires according to certain rules (for example, in accordance with the longest matching method) and returns the CNID to the PCPP(p) which sends the inquiry request to it. As shown in FIG. 2 , it is a schematic diagram of the access network ID used by the PCPP query user. Wherein, the IP address library includes the IP address range, the corresponding access network type and the access network ID. PCPP(p) obtains the source IP address of the user, queries the IP address rule base IPRD, matches according to the longest matching rule, and returns the access network ID to PCPP(p).
PCPP(p)利用例如深度包检测(DPI)技术提取网络服务标识(例如URL),并以四元组<CNID,DIP,DPort,URL>创建用户访问日志。PCPP(p) uses deep packet inspection (DPI) technology to extract network service identifiers (such as URLs), and creates user access logs with four-tuple <CNID, DIP, DPort, URL>.
PCPP(p)把创建的用户访问日志上传至其连接的LCA。至此,访问日志被上传到了LCA。PCPP(p) uploads the created user access log to its connected LCA. At this point, the access log is uploaded to the LCA.
步骤20,LCA存储访问日志,根据访问日志计算网络服务流行度。Step 20, the LCA stores the access log, and calculates the popularity of the network service according to the access log.
当PCPP上传的用户访问日志达到后,LCA提取<CNID,DIP,DPort>并进行散列计算获得key值。这里的散列计算,可以是现有技术中常用的哈希计算。根据key值,LCA获得该用户访问日志存储的后继结点Successor(key)并向该后继结点分发用户访问日志。后继结点接收到分发的所述访问日志后,存储访问日志至其网络服务访问日志库中。When the user access log uploaded by PCPP arrives, LCA extracts <CNID, DIP, DPort> and performs hash calculation to obtain the key value. The hash calculation here may be a hash calculation commonly used in the prior art. According to the key value, LCA obtains the successor node Successor (key) where the user access log is stored and distributes the user access log to the successor node. After the subsequent node receives the distributed access log, it stores the access log in its network service access log library.
当DHT网络中的其他LCA分发的用户访问日志后,LCA(k)将按表一所示的存储结构存储该用户访问日志至其网络服务访问日志库(WARD)中。After other LCAs in the DHT network distribute user access logs, LCA(k) will store the user access logs in its network service access log library (WARD) according to the storage structure shown in Table 1.
表一Table I
其中,DIP表示目的IP地址。DPort表示目的端口。WebService表示网络服务标识如URL(统一资源定位符)。在本实施例中,为方便说明,我们仅以URL代替WebService进行阐述。Wherein, DIP represents the destination IP address. DPort represents the destination port. WebService represents a network service identifier such as URL (Uniform Resource Locator). In this embodiment, for the convenience of description, we only use URL instead of WebService for illustration.
这里,完成了LCA对访问日志的存储。实际上,本实施例提出的分布式用户行为预测,就是基于分布式的存储而来的。这里的LCA根据分布式网络而构建成一个网络结构,多个LCA建立的分布式网络完成对所有的访问日志的存储。Here, the storage of the access log by the LCA is completed. In fact, the distributed user behavior prediction proposed in this embodiment is based on distributed storage. The LCA here builds a network structure based on the distributed network, and the distributed network established by multiple LCAs completes the storage of all access logs.
进一步的,LCA需要根据获取的访问日志进行网络服务流行度的计算。网络服务流行度是一个标识具体的网络服务流行程度的指标,访问一个网络服务的用户越多,说明该网络服务的流行度越高,该网络服务的网络服务流行度指标就越高。我们计算网络服务流行度,目的在于通过这个指标,获取用户下一步可能访问的网络服务的概率,从而预测用户下一次访问网络的网络服务指向。Further, LCA needs to calculate the popularity of network services according to the obtained access logs. Network service popularity is an index that identifies the popularity of a specific network service. The more users accessing a network service, the higher the popularity of the network service is, and the higher the network service popularity index of the network service is. The purpose of calculating the popularity of network services is to use this indicator to obtain the probability of the network service that the user may visit next, so as to predict the network service point of the user's next visit to the network.
为了减轻LCA的压力,网络服务流行度计算不宜频繁。为此本实施例设置一个周期阀值τ,即LCA当前系统时间与其最后一次进行的网络服务访问流行度计算时间之差等于τ时,该LCA才会启动新一轮的网络服务流行度计算。表二给出了网络服务流行度存储结构。In order to reduce the pressure of LCA, the network service popularity calculation should not be frequent. For this reason, this embodiment sets a period threshold value τ, that is, when the difference between the current system time of the LCA and the last network service access popularity calculation time performed by the LCA is equal to τ, the LCA will start a new round of network service popularity calculation. Table 2 shows the storage structure of network service popularity.
表二Table II
其中CNID,DIP,DPort和URL与表1其中含义相同。表示网络服务流行度。LastAccessTime表示该URL的最后被访问时间。Among them, CNID, DIP, DPort and URL have the same meanings as those in Table 1. Indicates the popularity of network services. LastAccessTime indicates the last time the URL was accessed.
为方便阐述本网络服务流行度计算方案,本实施例定义了一些词汇和对应的注释,如表三所示。In order to facilitate the description of the network service popularity calculation scheme, this embodiment defines some vocabulary and corresponding notes, as shown in Table 3.
表三Table three
DHT网络中的各个LCA进行网络服务流行度计算流程以LCA(k)为例。步骤如下:Each LCA in the DHT network performs the calculation process of network service popularity. Take LCA(k) as an example. Proceed as follows:
当本机网络服务流行度计算周期τ到达,LCA(k)循环比较表1“用户访问日志存储表”(以下简称“表1”)和表2“网络服务流行度存储表”(以下简称“表2”)各记录项。When the local network service popularity calculation period τ arrives, the LCA (k) cycle compares Table 1 "User Access Log Storage Table" (hereinafter referred to as "Table 1") and Table 2 "Network Service Popularity Storage Table" (hereinafter referred to as " Table 2") each record item.
若表1中的第i项记录与表2中的第j项记录的CNID,DIP,DPort以及URL相同,则LCA(k)设置表2中的进行加1操作,同时,删除表1中该记录项。If the i-th record in Table 1 has the same CNID, DIP, DPort and URL as the j-th record in Table 2, then LCA(k) sets the Perform the plus 1 operation, and delete the record item in Table 1 at the same time.
若表1中的第i项记录与表2中的第j项记录的CNID,DIP,DPort或者URL不同,则LCA(k)在表2中增加对应的新记录项,并设置对应的为“1”,同时,删除表1中该记录项。If the i-th record in Table 1 is different from the CNID, DIP, DPort or URL of the j-th record in Table 2, then LCA(k) will add a corresponding new record in Table 2 and set the corresponding is "1", and at the same time, delete the entry in Table 1.
也就是说,循环比较网络日志存储表和网络服务流行度存储表,若网络日志存储表中的第i项记录与网络服务流行度存储表中的第j项记录的CNID,DIP,DPort以及URL相同,则LCA设置网络服务流行度存储表中的相应网络服务流行度进行加1操作,同时,删除网络日志存储表中该记录项;若网络日志存储表中的第i项记录与网络服务流行度存储表中的第j项记录的CNID,DIP,DPort或者URL不同,则LCA在网络服务流行度存储表中增加对应的新记录项,并设置相应的网络服务流行度为“1”,同时,删除网络日志存储表中该记录项。That is to say, compare the network log storage table and the network service popularity storage table cyclically. Identical, then LCA sets the corresponding network service popularity in the network service popularity storage table Carry out the operation of adding 1, and at the same time, delete the record item in the network log storage table; if the i-th record in the network log storage table is different from the CNID, DIP, DPort or URL of the j-th record in the network service popularity storage table , then LCA adds a corresponding new record item in the network service popularity storage table, and sets the corresponding network service popularity is "1", and at the same time, delete the record item in the network log storage table.
进一步的,为了减轻LCA的负载并提高预测的准确率,很久没有被更新的用户访问日志将会被定期删除,为此,如下公式给出了一个定期删除冗余访问日志的度量值用以判断哪些用户访问日志将被删除。Furthermore, in order to reduce the load of LCA and improve the accuracy of prediction, user access logs that have not been updated for a long time will be deleted regularly. For this reason, the following formula gives a metric value for periodically deleting redundant access logs to judge Which user access logs will be deleted.
timerange=CurrentTime-LastAccessTimetimerange=CurrentTime-LastAccessTime
其中,CurrentTime表示LCA当前系统时间,LastAccessTime表示该网络服务最后被访问的时间。Timerange为LCA当前系统时间与网络服务最后被访问的时间之间的时间间隔。当Timerange等于或大于设定的删除操作门阀值时,过时的用户访问日志将被删除以提高预测的准确性和高效性。Among them, CurrentTime represents the current system time of the LCA, and LastAccessTime represents the time when the network service was last accessed. Timerange is the time interval between the current system time of the LCA and the time when the network service was last accessed. When Timerange is equal to or greater than the set delete operation threshold, outdated user access logs will be deleted to improve prediction accuracy and efficiency.
步骤30,LCA根据访问日志获取网络服务流行度相对应的k个网络服务标识;并返回给PCPP。Step 30, the LCA obtains k network service identifiers corresponding to the popularity of the network service according to the access log; and returns it to the PCPP.
LCA利用CNID、DIP、DPort在网络服务流行度存储表中获得所有相关的URL条数;根据预先设定的k值,获得网络服务流行度排名在前k项的URL;若存在多于k条网络服务具有相同网络服务流行度,则提取被访问时间最靠前的网络服务流行度排名在前k项的URL。LCA uses CNID, DIP, and DPort to obtain the number of all relevant URLs in the network service popularity storage table; according to the preset k value, obtain the URLs with the top k items in network service popularity; if there are more than k If the network services have the same network service popularity, the URLs of the network service popularity ranking the top k items with the most access time are extracted.
当一条用户访问记录例如record(i)PCPP(p)到达LCA(k)。则LCA(k)将会被触发执行以下工作流程实现准确、高效支持网络监管策略预取:When a user access record such as record(i)PCPP(p) arrives at LCA(k). Then LCA(k) will be triggered to execute the following workflow to achieve accurate and efficient support for network supervision policy prefetching:
LCA(k)利用三元组<CNID,DIP,DPort>在表2“网络服务流行度存储表”中获得所有相关的URL条数(记为CountExisting)。LCA(k) uses the triple <CNID, DIP, DPort> to obtain the number of all relevant URLs (denoted as CountExisting) in Table 2 "Network Service Popularity Storage Table".
LCA(k)查询系统管理员设置的URL数目(记为CountSpecified)。LCA(k) queries the number of URLs set by the system administrator (recorded as CountSpecified).
LCA(k)计算得到k值,并通过该值获得网络服务流行度排名在前k项(包括第k项)的URL。LCA(k)把这些URL以及对应的用户访问日志中的源端(用户)IP组成一条replying消息下发给PCPP(p)。LCA(k) calculates the k value, and obtains the URLs of the top k items (including the kth item) in terms of network service popularity through this value. LCA(k) composes these URLs and the source (user) IP in the corresponding user access log to form a replying message and sends it to PCPP(p).
若存在多于k条网络服务具有相同流行度,那么LCA(k)将提取被访问时间最靠前的网络服务流行度排名在前k项(包括第k项)的URL。并将这些URL以及对应的用户访问日志中的源端(用户)IP组成一replying消息下发PCPP(p)。If there are more than k network services with the same popularity, then LCA(k) will extract the URLs of the network service with the highest access time and ranking the top k items (including the kth item) in terms of popularity. And these URLs and the source (user) IP in the corresponding user access log form a replying message and send it to PCPP(p).
步骤40,PCPP根据k个网络服务标识以及访问日志中的用户属性信息,向预先设定的策略库中进行策略预取,根据预取到的策略对网络用户访问请求进行监管处置。Step 40: PCPP performs policy prefetching from a preset policy library according to the k network service identifiers and user attribute information in the access log, and supervises and handles network user access requests according to the prefetched policy.
从策略库中获取网络用户与k个网络服务之间的监管策略;在网络用户下一次访问请求时,判断其是否针对k个网络服务,若是,则直接根据预取的策略对其进行网络监管处置;否则,提取网络用户请求访问数据包,生成网络用户访问日志。Obtain the supervision strategy between the network user and k network services from the policy library; when the network user requests the next visit, judge whether it is for k network services, and if so, directly perform network supervision on it according to the prefetched strategy Disposal; otherwise, extract the network user request access data packet, and generate the network user access log.
当replying消息到达PCPP(p),PCPP(p)根据相应的用户属性信息与replying中k条URL到策略库中进行策略预取。这样,当该用户发起下一个网络服务请求时,截获请求数据包的PCPP(p)即可以通过预取的策略实现如放行、过滤、阻断等监控手段和技术。也就是说,这里的策略预取,实际上是对用户的下一次对网络服务的访问进行策略预取,预先判断用户下一次访问可能的网络服务,预先获取用户与网络服务之间的监管策略,从而在用户进行网络服务请求的时候,有针对性的进行监管和控制。When the reply message reaches PCPP(p), PCPP(p) prefetches the policy in the policy library according to the corresponding user attribute information and the k URLs in the reply. In this way, when the user initiates the next network service request, the PCPP(p) that intercepts the request data packet can implement monitoring methods and technologies such as release, filter, and block through the prefetching strategy. That is to say, the policy prefetching here is actually to prefetch the policy for the user's next access to the network service, pre-judge the possible network service for the user's next visit, and pre-acquire the supervision strategy between the user and the network service , so that when users make network service requests, targeted supervision and control are carried out.
这里的用户属性信息,包括用户注册时填写的相关信息。当用户访问日志上传完成,PCPP利用源IP地址向用户信息库(UID)发送用户信息查询请求request(Source IP(i)),UID根据用户注册时填写的属性信息(如民族、爱好、年龄等)给予其用户标签,并向发起用户信息查询请求的PCPP返回对应的用户标签。PCPP缓存该用户标签。The user attribute information here includes the relevant information filled in when the user registers. When the user access log is uploaded, PCPP uses the source IP address to send a user information query request (Source IP(i)) to the user information database (UID), and the UID is based on the attribute information (such as ethnicity, hobbies, age, etc.) ) gives its user label, and returns the corresponding user label to the PCPP that initiates the user information query request. PCPP caches this user tag.
实施例2Example 2
如图3所示,本发明实施例提供一种分布式用户行为日志预测网络监管系统,包括PCPP和LCA,其中,As shown in Figure 3, an embodiment of the present invention provides a distributed user behavior log prediction network monitoring system, including PCPP and LCA, wherein,
PCPP用于捕获网络用户发起的网络访问请求数据包,提取访问日志,上传给LCA;获取网络服务流行度,并根据预先设定的策略库获取网络监管策略,对网络用户的网络访问请求进行监管处置;PCPP is used to capture network access request packets initiated by network users, extract access logs, and upload them to LCA; obtain network service popularity, and obtain network supervision policies according to a preset policy library, and supervise network user network access requests disposal;
LCA用于分发存储访问日志,根据访问日志计算网络服务流行度并下发给PCPP。LCA is used to distribute and store access logs, calculate network service popularity based on access logs and send them to PCPP.
具体来说,该系统包括若干个LCA,若干个LCA组成分布式哈希表DHT网络;Specifically, the system includes several LCAs, which form a distributed hash table DHT network;
LCA对接收到的访问日志通过分布式哈希算法进行散列计算获得key值,根据key值,LCA获得访问日志存储的后继结点LCA,并向该后继结点分发用户访问日志。The LCA performs hash calculation on the received access log through the distributed hash algorithm to obtain the key value. According to the key value, the LCA obtains the successor node LCA where the access log is stored, and distributes the user access log to the successor node.
具体来说,本实施例各个组成部分的结构功能如下:Specifically, the structural functions of the various components of this embodiment are as follows:
DHT网络:DHT网络由日志收集与分析服务器(LCA)按一定的逻辑结构组成(例如Chord),其功能在于:1)分发、存储用户行为日志;2)计算网络服务访问流行度;3)当LCA离开或加入网络,DHT做自我更新。DHT network: DHT network is composed of log collection and analysis server (LCA) according to a certain logical structure (such as Chord), its functions are: 1) distribute and store user behavior logs; 2) calculate the popularity of network service access; 3) when LCA leaves or joins the network, and DHT does self-renewal.
日志收集与分析服务器(LCA):LCA的功能在于:1)接收来自数据包采集与策略预取服务器(PCPP)发送的用户访问日志;2)分析用户访问日志并周期性地计算网络服务访问流行度3)共享网络服务访问流行度至DHT网络;4)查询并转发网络服务访问流行度信息。Log collection and analysis server (LCA): The function of LCA is to: 1) receive user access logs sent from the data packet collection and policy prefetch server (PCPP); 2) analyze user access logs and periodically calculate network service access popularity Spend 3) Sharing network service access popularity to the DHT network; 4) query and forward the network service access popularity information.
数据包采集与策略预取服务器(PCPP):PCPP的功能在于:1)从网络数据转发器件(例如路由器、交换机等)抓取数据包;2)按照给定需求提取数据包信息并上传至其连接的LCA;3)向其连接的LCA发送网络服务访问流行度信息请求,并根据返回的热度信息预测用户未来可能访问的网络服务,结合用户动态属性与网络服务动态属性从策略库中预取处理策略。Packet Collection and Policy Prefetching Server (PCPP): The function of PCPP is to: 1) capture data packets from network data forwarding devices (such as routers, switches, etc.); 2) extract data packet information according to given requirements and upload to other Connected LCA; 3) Send a network service access popularity information request to the connected LCA, and predict the network service that the user may visit in the future according to the returned popularity information, and prefetch it from the policy library in combination with the user dynamic attribute and the network service dynamic attribute processing strategy.
需要说明的是:上述实施例提供的分布式用户行为日志预测网络监管系统在监管网络时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将系统设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的分布式用户行为日志预测网络监管系统与方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。It should be noted that when the distributed user behavior log prediction network supervision system provided by the above-mentioned embodiments supervises the network, it only uses the division of the above-mentioned functional modules as an example. In practical applications, the above-mentioned functions can be assigned by different The functional modules are completed, that is, the internal structure of the system equipment is divided into different functional modules to complete all or part of the functions described above. In addition, the distributed user behavior log prediction network supervision system provided by the above embodiments and the method embodiments belong to the same concept, and its specific implementation process is detailed in the method embodiments, and will not be repeated here.
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the above embodiments of the present invention are for description only, and do not represent the advantages and disadvantages of the embodiments.
综上所述,本发明实施例通过以分布式方式收集、存储和分析网络用户操作日志记录,根据访问日志计算网络服务流行度,再根据网络服务流行度来预测用户下次访问网络的行为可能针对的网络服务,从而预取到下次网络访问所需要的监管策略。结合网络服务的属性和用户属性,并调用相应预处理策略,以实现海量网络用户对网络服务访问请求过程中的快速、高效、准确的网络监管和处置。In summary, the embodiment of the present invention collects, stores and analyzes network user operation log records in a distributed manner, calculates network service popularity according to the access log, and then predicts the behavior of the user's next access to the network according to the network service popularity. Targeted network services, so as to prefetch the regulatory policies required for the next network access. Combining the attributes of network services and user attributes, and invoking corresponding preprocessing strategies, in order to realize the rapid, efficient and accurate network supervision and disposal in the process of mass network users' access requests to network services.
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。Those of ordinary skill in the art can understand that all or part of the steps for implementing the above embodiments can be completed by hardware, and can also be completed by instructing related hardware through a program. The program can be stored in a computer-readable storage medium. The above-mentioned The storage medium mentioned may be a read-only memory, a magnetic disk or an optical disk, and the like.
以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included in the protection of the present invention. within range.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210382322.8A CN102946320B (en) | 2012-10-10 | 2012-10-10 | Distributed supervision method and system for user behavior log forecasting network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210382322.8A CN102946320B (en) | 2012-10-10 | 2012-10-10 | Distributed supervision method and system for user behavior log forecasting network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102946320A CN102946320A (en) | 2013-02-27 |
CN102946320B true CN102946320B (en) | 2015-06-24 |
Family
ID=47729229
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210382322.8A Active CN102946320B (en) | 2012-10-10 | 2012-10-10 | Distributed supervision method and system for user behavior log forecasting network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102946320B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103914743B (en) * | 2014-04-21 | 2017-01-25 | 中国科学技术大学先进技术研究院 | On-line serial content popularity prediction method based on autoregressive model |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104135546A (en) * | 2014-07-25 | 2014-11-05 | 可牛网络技术(北京)有限公司 | Method for loading webpage and terminal |
CN104486098A (en) * | 2014-11-26 | 2015-04-01 | 中国建设银行股份有限公司 | Access fault monitoring method and device |
CN105827608B (en) * | 2016-03-31 | 2019-02-12 | 微梦创科网络科技(中国)有限公司 | Distributed API service abnormal user identification and analysis method and reverse proxy service gateway |
CN109218401B (en) * | 2018-08-08 | 2021-08-31 | 平安科技(深圳)有限公司 | Log collection method, system, computer device and storage medium |
CN109271782B (en) * | 2018-09-14 | 2021-06-08 | 杭州朗和科技有限公司 | Method, medium, system and computing device for detecting attack behavior |
CN110609901B (en) * | 2019-09-17 | 2022-04-15 | 国家电网有限公司 | A method for predicting user network behavior based on vectorized features |
CN111404960B (en) * | 2020-03-26 | 2022-02-25 | 军事科学院系统工程研究院网络信息研究所 | Attribute extraction method applied to heaven-earth integrated network access control system |
CN111949884B (en) * | 2020-08-26 | 2022-06-21 | 桂林电子科技大学 | A deep fusion recommendation method based on multimodal feature interaction |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101404630A (en) * | 2008-11-25 | 2009-04-08 | 中国网络通信集团公司 | Method and system for implementing internet service access gate |
CN101420554A (en) * | 2007-10-25 | 2009-04-29 | 索尼株式会社 | Program guide provides system, equipment, method and program |
CN102449633A (en) * | 2009-06-01 | 2012-05-09 | 皇家飞利浦电子股份有限公司 | Dynamic determination of access rights |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8640216B2 (en) * | 2009-12-23 | 2014-01-28 | Citrix Systems, Inc. | Systems and methods for cross site forgery protection |
-
2012
- 2012-10-10 CN CN201210382322.8A patent/CN102946320B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101420554A (en) * | 2007-10-25 | 2009-04-29 | 索尼株式会社 | Program guide provides system, equipment, method and program |
CN101404630A (en) * | 2008-11-25 | 2009-04-08 | 中国网络通信集团公司 | Method and system for implementing internet service access gate |
CN102449633A (en) * | 2009-06-01 | 2012-05-09 | 皇家飞利浦电子股份有限公司 | Dynamic determination of access rights |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103914743B (en) * | 2014-04-21 | 2017-01-25 | 中国科学技术大学先进技术研究院 | On-line serial content popularity prediction method based on autoregressive model |
Also Published As
Publication number | Publication date |
---|---|
CN102946320A (en) | 2013-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102946320B (en) | Distributed supervision method and system for user behavior log forecasting network | |
US11757945B2 (en) | Collaborative database and reputation management in adversarial information environments | |
JP6490059B2 (en) | Method for processing data, tangible machine readable recordable storage medium and device, and method for querying features extracted from a data record, tangible machine readable recordable storage medium and device | |
Cambazoglu et al. | Scalability challenges in web search engines | |
CN103561012B (en) | WEB backdoor detection method and system based on relevance tree | |
US11968239B2 (en) | System and method for detection and mitigation of data source compromises in adversarial information environments | |
US11790016B2 (en) | Method, device and computer program for collecting data from multi-domain | |
Liu et al. | A novel content popularity prediction algorithm based on auto regressive model in information-centric IoT | |
US20160299971A1 (en) | Identifying Search Engine Crawlers | |
CN102968591B (en) | Malicious-software characteristic clustering analysis method and system based on behavior segment sharing | |
CN104935653A (en) | A bypass cache method and device for accessing hot resources | |
Zhao et al. | A novel enhanced lightweight node for blockchain | |
Satpathy et al. | Sensing and actuation as a service delivery model in cloud edge centric internet of things | |
Bai et al. | Analysis and detection of bogus behavior in web crawler measurement | |
CN117453922A (en) | A rapid construction and storage system for power threat intelligence knowledge graph | |
Katsaros et al. | CDNs content outsourcing via generalized communities | |
Feng et al. | An efficient caching mechanism for network-based url filtering by multi-level counting bloom filters | |
Lai et al. | A scalable multi-attribute hybrid overlay for range queries on the cloud | |
Chen et al. | Big data generation and acquisition | |
Al-Sakran et al. | A proposed performance evaluation of NoSQL databases in the field of IoT | |
CN103944894A (en) | Malicious domain name detection system based on cloud computing | |
Karolewicz et al. | On efficient data storage service for IoT | |
CN109600413A (en) | A kind of data management and transmission method based on high-energy physics example | |
Boukhalfa et al. | Network Traffic Analysis using Big Data and Deep Learning Techniques | |
Tan et al. | Malfilter: A lightweight real-time malicious url filtering system in large-scale networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |