CN103441893A - User internet-surfing behavior analysis method based on broadcast television network - Google Patents

User internet-surfing behavior analysis method based on broadcast television network Download PDF

Info

Publication number
CN103441893A
CN103441893A CN2013103633162A CN201310363316A CN103441893A CN 103441893 A CN103441893 A CN 103441893A CN 2013103633162 A CN2013103633162 A CN 2013103633162A CN 201310363316 A CN201310363316 A CN 201310363316A CN 103441893 A CN103441893 A CN 103441893A
Authority
CN
China
Prior art keywords
data
user
keyword
internet behavior
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013103633162A
Other languages
Chinese (zh)
Inventor
朱志军
乔文正
李宝凯
张晓雷
李胜海
王明洋
张宇
杜梁
徐克强
魏长城
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DALIAN TNET NETWORK TECHNOLOGY Co Ltd
Original Assignee
DALIAN TNET NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DALIAN TNET NETWORK TECHNOLOGY Co Ltd filed Critical DALIAN TNET NETWORK TECHNOLOGY Co Ltd
Priority to CN2013103633162A priority Critical patent/CN103441893A/en
Publication of CN103441893A publication Critical patent/CN103441893A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a user internet-surfing behavior analysis method based on a broadcast television network. The user internet-surfing behavior analysis method comprises the following steps: whether data transmitted in a current network is data based on a PPPoE protocol is judged; if the data is based on the PPPoE protocol, whether current data transmission is in a discovery phase or in a conversation phase is analyzed; if the current data is in the discovery phase, user identifications of the current network data are extracted and contrasted with user identifications which are stored previously to determine identities of current users; keywords of a user internet-surfing behavior are extracted, and whether the keywords belong to TCP / IP keywords generated by the internet-surfing behavior and configured hardware keywords is judged; if the keywords are generated by the internet-surfing behavior, the keywords are marked; whether the data are legal is detected; if the data are legal, the data are not used; if the data are illegal, the data are released.

Description

User's internet behavior analytical method based on CHINA RFTCOM Co Ltd
Technical field
The present invention relates to a kind of analytical method of user's internet behavior, relate in particular to a kind of user's internet behavior analytical method based on CHINA RFTCOM Co Ltd.
Background technology
Along with the raising of people's living standard, to the variation that need to also become of video.People also wish the private video that exclusively enjoys, and enjoy at any time the video frequency program of oneself liking.And operator also can adjust programme content according to grasping the hot broadcast rate.Arise at the historic moment by network program request technology like this, in the normal online of user, also will protect user network safety, prevent the flame invasion.
Summary of the invention
The present invention is directed to the proposition of above problem, and a kind of user's internet behavior analytical method based on CHINA RFTCOM Co Ltd of development has following steps:
-judge whether the data of current network transmission are the data based on the PPPoE agreement;
If-data based on the PPPoE agreement, analyze current transfer of data in discovery stage or session stage;
If-current data is in the discovery stage: extract the user ID of current network data, compare with the user ID of storage before, determine active user's identity;
-extract the keyword of user's internet behavior, and judge whether to belong to the TCP/IP keyword of internet behavior generation and the hardware keyword of configuration;
If the keyword that-internet behavior produces, stamp sign; Whether legally detect described data, if legal, not by described data; If illegal, discharge data.
If judge that through step " whether the data that judge the current network transmission are the data based on the PPPoE agreement " current data are not the data of PPPoE agreement, determine whether vod data:
If-vod data: order program data is carried out to record: record the video of current user's program request and the video-on-demand times of video;
If not-vod data: directly abandon.
Also have to send before described step " if sign stamped in the keyword that internet behavior produces " step and check step: by described keyword, send to a checking module, then go to check and filter once.
Whether the keyword search data that the step that " whether legally detects described data " issues by the detection host computer are legal.
Whether the keyword that uses artificial manual handle to extract selects its data to allow to pass through.
Owing to having adopted above-mentioned technical method; a kind of user's internet behavior analytical method based on CHINA RFTCOM Co Ltd proposed by the invention, can analyze the user's internet behavior in the photoelectricity network, simultaneously accurately; also effectively protect user's network security, prevented the invasion of flame.
The accompanying drawing explanation
Technical scheme for clearer explanation embodiments of the invention or prior art, below will do one to the accompanying drawing of required use in embodiment or description of the Prior Art introduces simply, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is flow chart of the present invention
Embodiment
For the purpose, technical scheme and the advantage that make embodiments of the invention is clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is known to complete description:
As shown in Figure 1: a kind of user's internet behavior analytical method based on CHINA RFTCOM Co Ltd mainly comprises following steps:
A kind of user's internet behavior analytical method based on CHINA RFTCOM Co Ltd, mainly comprise the steps:
Whether the data that at first judge the current network transmission are the data based on the PPPoE agreement.According to the PPPoE consensus standard, PPPoE has two transmit stages, and one is the discovery stage, and a session stage finds that the identifier on rank is 0x8863, and the identifier of session stage is 0x8864.Can judge whether it is the PPPoE data by inquiring about two identifiers.
If, through checking, current data is based on the data of PPPoE agreement, further analyze current transfer of data in discovery stage or session stage; By identifying two identifiers, can complete.
Further, consider and may have different user's logins on a machine, the computing network identifier may occur merely, and the network flow data that follow-up different user is produced calculates on the user account of previous login.If current data are in the discovery stage: extract the user ID of current network data, compare with the user ID of storage before, determine active user's identity.
The user ID here refers to ID users, in the message flow the inside, is to be session-ID.
After determining user identity, further extract the keyword of user's internet behavior, and judge whether to belong to the TCP/IP keyword of internet behavior generation and the hardware keyword of configuration.
If the keyword that internet behavior produces, stamp sign; Whether legally detect described data, if legal, not by described data; If illegal, discharge data.In actual mechanical process, close the keyword that illegal foundation issues by host computer and judge by detecting data, for example: certain IP address is illegal.I give so long as such IP stamps the sign that no thoroughfare.
Further, the present invention has statistical function equally to vod data, if judge that through step " whether the data that judge the current network transmission are the data based on the PPPoE agreement " current data are not the data of PPPoE agreement, further judge whether current data are vod data:
If vod data: order program data is carried out to record: record the video of current user's program request and for the video-on-demand times of a certain video.
If not vod data, current data are unconcerned hash, directly abandon.
Further, described step " if keyword that internet behavior produces " also has the inspection step afterwards.The inspection here, refer to the keyword of this part, sends to a checking module and processed, and reexamines filtration once.In main flow process of the present invention, do not process.
Be further characterized in that: whether the keyword that uses artificial manual handle to extract selects its data to allow to pass through.Described data message, sent on computer screen, in the situation that there is the people to guard, if think not logos of the speech of sending or the content of browsing, it can not allowed to pass through.
Embodiment 1: step 101 as shown in Figure 1: the present invention is based on CHINA RFTCOM Co Ltd, so first will judge whether inputted data are data of PPPOE, are just to meet the data of wanting required for the present invention.If not data being sent into to 201.
Step 102: when entering this step, with two stages, one is the discovery stage, a session stage.If discovery stage execution step 103; That session stage carries out 105.
Step 103: extract user ID and deliver to 104.
Step 104: at this moment need to identify user ID, and compared with former user ID, difference says that the user changes.Or new user.To turn back to 102 after identity is determined, see whether the user identity identified has internet behavior.Enter 105.
Step 105: the keyword that extracts user's internet behavior sends into 107.
Step 106: extracting the keyword of user's internet behavior, if there is the internet behavior of being to send into 108, is not that internet behavior sends into 108.
Step 107: analyze 106 steps and send next keyword to, after inspection, stamp sign and send into 110.
Step 108: will send into the data that are not internet behavior and directly pass through.
Step 109: check that whether legal send the data of coming to sees, do not conform to rule and stop and pass through, legally just cannot pass through.Also can accept external control, select whether to pass through.
Step 110: process manually the keyword extracted and select its data whether to allow to pass through.
Whether step 201: sending by 101 the data of coming to and again analyze, is the content of video request program.That data are sent into to 203.Be not the data of video request program, explanation is unconcerned data, sends into 202.
Step 202: process 201 data of sending, processing side does not process, and directly abandons.
Step 203: 201 data of sending into are carried out to record.
The above; it is only preferably embodiment of the present invention; but protection scope of the present invention is not limited to this; anyly be familiar with those skilled in the art in the technical scope that the present invention discloses; be equal to replacement or changed according to technical scheme of the present invention and inventive concept thereof, within all should being encompassed in protection scope of the present invention.

Claims (5)

1. the user's internet behavior analytical method based on CHINA RFTCOM Co Ltd has following steps:
-judge whether the data of current network transmission are the data based on the PPPoE agreement;
If-data based on the PPPoE agreement, analyze current transfer of data in discovery stage or session stage;
If-current data is in the discovery stage: extract the user ID of current network data, compare with the user ID of storage before, determine active user's identity;
-extract the keyword of user's internet behavior, and judge whether to belong to the TCP/IP keyword of internet behavior generation and the hardware keyword of configuration;
If the keyword that-internet behavior produces, stamp sign; Whether legally detect described data, if legal, not by described data; If illegal, discharge data.
2. a kind of user's internet behavior analytical method based on CHINA RFTCOM Co Ltd according to claim 1, be further characterized in that: if judge that through step " whether the data that judge the current network transmission are the data based on the PPPoE agreement " current data are not the data of PPPoE agreement, determine whether vod data:
If-vod data: order program data is carried out to record: record the video of current user's program request and the video-on-demand times of video;
If not-vod data: directly abandon.
3. a kind of user's internet behavior analytical method based on CHINA RFTCOM Co Ltd according to claim 1 is further characterized in that:
Also have to send before described step " if sign stamped in the keyword that internet behavior produces " step and check step: by described keyword, send to a checking module, then go to check and filter once.
4. a kind of user's internet behavior analytical method based on CHINA RFTCOM Co Ltd according to claim 1 is further characterized in that: whether " whether legally detecting described data " step is legal by the keyword search data that detect host computer and issue.
5. a kind of user's internet behavior analytical method based on CHINA RFTCOM Co Ltd according to claim 1, be further characterized in that: whether the keyword that uses artificial manual handle to extract selects its data to allow to pass through.
CN2013103633162A 2013-08-16 2013-08-16 User internet-surfing behavior analysis method based on broadcast television network Pending CN103441893A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013103633162A CN103441893A (en) 2013-08-16 2013-08-16 User internet-surfing behavior analysis method based on broadcast television network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013103633162A CN103441893A (en) 2013-08-16 2013-08-16 User internet-surfing behavior analysis method based on broadcast television network

Publications (1)

Publication Number Publication Date
CN103441893A true CN103441893A (en) 2013-12-11

Family

ID=49695561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013103633162A Pending CN103441893A (en) 2013-08-16 2013-08-16 User internet-surfing behavior analysis method based on broadcast television network

Country Status (1)

Country Link
CN (1) CN103441893A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866952A (en) * 2005-07-29 2006-11-22 华为技术有限公司 Method, system and application for checking multicast user underling terminal device validity
CN101030945A (en) * 2007-04-06 2007-09-05 中兴通讯股份有限公司 Method for preventing PPPoE from being attacked by personnel server and false server
CN101202735A (en) * 2006-12-29 2008-06-18 深圳市同洲电子股份有限公司 Apparatus and method for establishing PPP link circuit based on TCP/IP protocol
CN101471936A (en) * 2007-12-29 2009-07-01 华为技术有限公司 Method, device and system for establishing IP conversation
CN102394857A (en) * 2011-06-29 2012-03-28 福建星网锐捷网络有限公司 Method, device and equipment for establishing point-to-point protocol session on Ethernet
CN102572838A (en) * 2012-02-15 2012-07-11 刘士顺 Wireless point-to-point protocol over Ethernet (PPPOE) dialing system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1866952A (en) * 2005-07-29 2006-11-22 华为技术有限公司 Method, system and application for checking multicast user underling terminal device validity
CN101202735A (en) * 2006-12-29 2008-06-18 深圳市同洲电子股份有限公司 Apparatus and method for establishing PPP link circuit based on TCP/IP protocol
CN101030945A (en) * 2007-04-06 2007-09-05 中兴通讯股份有限公司 Method for preventing PPPoE from being attacked by personnel server and false server
CN101471936A (en) * 2007-12-29 2009-07-01 华为技术有限公司 Method, device and system for establishing IP conversation
CN102394857A (en) * 2011-06-29 2012-03-28 福建星网锐捷网络有限公司 Method, device and equipment for establishing point-to-point protocol session on Ethernet
CN102572838A (en) * 2012-02-15 2012-07-11 刘士顺 Wireless point-to-point protocol over Ethernet (PPPOE) dialing system

Similar Documents

Publication Publication Date Title
US10313354B2 (en) Systems and methods for efficient and secure temporary anonymous access to media content
CN107645524B (en) Message pushing processing method and device
US10135818B2 (en) User biological feature authentication method and system
CN110768933B (en) Network flow application identification method, system and equipment and storage medium
CN103916389B (en) Defend the method and fire wall of HttpFlood attacks
CN100586169C (en) Authentication method for interdynamic television service
US10419431B2 (en) Preventing cross-site request forgery using environment fingerprints of a client device
CN106302308B (en) Trust login method and device
WO2009093226A3 (en) A method and apparatus for fingerprinting systems and operating systems in a network
CN103442018A (en) Dynamic defense method and system for CC (Challenge Collapsar) attack
CN104426835B (en) Login detection method, server, login detection device and system
CN103297433A (en) HTTP botnet detection method and system based on net data stream
WO2014153959A1 (en) Method, related apparatus and system for preventing cross-site request forgery
WO2015032281A1 (en) Method and system for generating and processing challenge-response tests
US8572366B1 (en) Authenticating clients
CN107046516B (en) Wind control method and device for identifying mobile terminal identity
CN102624878A (en) Method and system for identifying P2P (peer-to-peer) protocol on basis of DNS (domain name server) protocol
CN107147634B (en) WEB service layered authentication method supporting platform multi-application
KR101341596B1 (en) Apparatus and method for monitoring of wep application telecommunication data by user
CN105141575A (en) Encrypted application identification and encrypted webpage content classification methods, and encrypted application identification and/or encrypted webpage content classification devices
CN103441893A (en) User internet-surfing behavior analysis method based on broadcast television network
CN109831417B (en) Method, device, server and storage medium for processing account number for preventing harassment
CN103413080A (en) Password protection realization method based on gesture
US11363020B2 (en) Method, device and storage medium for forwarding messages
CN105554170B (en) A kind of processing method of DNS message, apparatus and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20131211

RJ01 Rejection of invention patent application after publication