CN103685322B - The method and apparatus of transmitting network data bag - Google Patents
The method and apparatus of transmitting network data bag Download PDFInfo
- Publication number
- CN103685322B CN103685322B CN201310754860.XA CN201310754860A CN103685322B CN 103685322 B CN103685322 B CN 103685322B CN 201310754860 A CN201310754860 A CN 201310754860A CN 103685322 B CN103685322 B CN 103685322B
- Authority
- CN
- China
- Prior art keywords
- network packet
- replacement treatment
- network
- logic
- executable file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Embodiments of the present invention provide the method and apparatus of a kind of transmitting network data bag.Described method includes: a) obtain the first executable file;B) run described first executable file, produce the first replacement Treatment logic;C) call described first replacement Treatment logic and carry out network data bag, described first replacement Treatment logic is for carrying out computing according to the operational rule of self and operational data to the protocol number in described network packet, and result computing obtained is as the protocol number in described network packet, wherein protocol number is for identifying the data structure of network packet;D) described network packet is sent.The method of the present invention can solve the unsafe problem of network data in prior art.Additionally, another aspect provides the equipment of a kind of transmitting network data bag, such as, software server or client installed.
Description
Technical field
Embodiments of the present invention relate to network field, more specifically, embodiments of the present invention relate to transmission network number
Method and apparatus according to bag.
Background technology
This part is it is intended that the embodiments of the present invention stated in claims provide background or context.Herein
Description can include the concept that can probe into, but is not necessarily the concept having contemplated that before or having probed into.Therefore, unless
This points out, is not otherwise existing skill for the description and claims of this application in the content described in this part
Art, and not because being included in this part just recognize it is prior art.
Realize communicating by intercoursing network packet between client with server.Such as, the visitor of online game
Communication between family end and network game server.
Some disabled users can monitor legitimate client and be sent to the network packet of server, or, monitor server
It is sent to the network packet of legitimate client, and carries out the structural analysis of packet based on substantial amounts of network packet, thus
Crack the procotol between client and server.And then, it is legal that disabled user will pretend to be according to the procotol cracked
User end to server sends network packet, and spoofing server is to reach various illegal objective.
Summary of the invention
The present inventor finds in research process, in the prior art, is sent to server or server in client
Being sent in the network packet of client in addition to including data, also include protocol number, protocol number is used for district
The data structure (in other words for identifying the type of network packet) of subnetwork packet.Such as, if client executing
One " walking " operates, and must comprise two parts in client is sent to the network packet of server, and a part is
The concrete data relevant with walking such as the final position of the initial point position " walked " and " walking ", another part is to represent this
It it is one " walking " protocol number of operating.Clearly for 100 kinds of network packet data structures, can use 100 different
Protocol number makes a distinction.If some network packet data structures are identical, then the association that these network packet are comprised
View numbering is the most identical.Disabled user would generally search the network number with same protocol numbering from the network packet listened to
According to bag, then disabled user carries out packet structure analysis based on the network packet that data structure is identical, thus cracks client
Procotol between end and server.
Therefore according to prior art, disabled user will utilize the agreement that the network packet that data structure is identical is comprised
Number this feature identical, determine which network packet listened to is the network data that data structure is identical soon
Bag, and carry out data packet analysis based on the network packet that data structure is identical, finally realize cracking of procotol, cause net
The unsafe problem of network data.
To this end, the method and apparatus being highly desirable to a kind of transmitting network data bag, to solve network data in prior art
Unsafe problem.
In the present context, the method and apparatus that embodiments of the present invention expectation provides a kind of transmitting network data bag.
In the first aspect of embodiment of the present invention, it is provided that a kind of method of transmitting network data bag, including: a) obtain
Take the first executable file;B) run described first executable file, produce the first replacement Treatment logic;C) described first is called
Replacement Treatment logic carrys out network data bag, and described first replacement Treatment logic is used for the operational rule according to self and computing
Data carry out computing to the protocol number in described network packet, and result computing obtained is as described network packet
In protocol number, wherein protocol number is for identifying the data structure of network packet;D) described network packet is sent.
In the second aspect of embodiment of the present invention, it is provided that the equipment of a kind of transmitting network data bag, including: obtain
Unit, for obtaining the first executable file;Running unit, is used for running described first executable file, produces the first displacement
Process logic;First call unit, is used for calling described first replacement Treatment logic and carrys out network data bag, and described first puts
Change and process logic, according to self operational rule and operational data, the protocol number in described network packet is carried out computing, and
Result computing obtained is as the protocol number in described network packet, and wherein said protocol number is used for identifying network number
Data structure according to bag;Transmitting element, is used for sending described network packet.
In embodiments of the present invention, owing to the protocol number in network packet to have been carried out replacement Treatment, therefore, increase
Add disabled user from the network packet listened to, found the difficulty of protocol number, also increased disabled user and search
To the difficulty of the network packet with same protocol numbering, so, illegitimate client the most just cannot determine have identical data
The network packet of structure.Finally, add and crack the difficulty of procotol, it is ensured that the safety of network data.
Particularly when the protocol number in different network packet is used different replacement Treatment modes so that tool
The protocol number having the network packet of identical network structure also differs, and illegitimate client more cannot utilize data structure identical
Identical this feature of the protocol number that comprised of network packet, determine which network packet listened to is data
The network packet that structure is identical.
Accompanying drawing explanation
By reading detailed description below, above-mentioned and other mesh of exemplary embodiment of the invention with reference to accompanying drawing
, feature and advantage will become prone to understand.In the accompanying drawings, if showing the present invention's by way of example, and not by way of limitation
Dry embodiment, wherein:
Fig. 1 schematically shows an exemplary application scene of embodiments of the present invention;
Fig. 2 schematically shows the flow process of the method for the transmitting network data bag according to an embodiment of the invention
Figure;
Fig. 3 schematically shows the structure chart that client in prior art is sent to the network packet of server;
Fig. 4 schematically shows the structure chart that client in the present invention is sent to the network packet of server;
Fig. 5 schematically shows the stream of the method for transmitting network data bag according to another implementation of the invention
Cheng Tu;
Fig. 6 schematically shows the structural frames of the equipment of the transmitting network data bag according to one embodiment of the present invention
Frame figure;
In the accompanying drawings, identical or corresponding label represents identical or corresponding part.
Detailed description of the invention
Principle and the spirit of the present invention are described below with reference to some illustrative embodiments.Should be appreciated that and provide this
A little embodiments are only used to make those skilled in the art better understood when and then realize the present invention, and not with any
Mode limits the scope of the present invention.On the contrary, it is provided that these embodiments are to make the disclosure more thorough and complete, and energy
Enough the scope of the present disclosure is intactly conveyed to those skilled in the art.
One skilled in the art will appreciate that embodiments of the present invention can be implemented as a kind of system, device, equipment, method
Or computer program.Therefore, the disclosure can be to be implemented as following form, it may be assumed that hardware, completely software completely
(including firmware, resident software, microcode etc.), or the form that hardware and software combines.
According to the embodiment of the present invention, it is proposed that the method and apparatus of a kind of transmitting network data bag.
In this article, it is to be understood that any number of elements in accompanying drawing is used to example and unrestricted and any
Name is only used for distinguishing, and does not have any limitation.
Principle and spirit below with reference to some representative embodiments of the present invention, in detail the explaination present invention.
Summary of the invention
The inventors discovered that, the protocol number comprised due to the network packet of same data structure is identical, because of
This, disabled user utilizes opposition thinking, first can search the network with same protocol numbering from the network packet listened to
Packet, and determine that these network packet are the network packet that data structure is identical.The most further based on data
The network packet that structure is identical carries out data packet analysis, and finally cracks the procotol between client and server.Also
That is, finding identical protocol number is the breach that disabled user cracks network packet.
If the protocol number in network packet is shielded, disabled user will be increased and know from network packet
Do not go out the difficulty of protocol number, and then also increase disabled user and find the network packet with same protocol numbering
Difficulty.So, disabled user will be made to be not easy to determine the network packet that data structure is identical, and be not easy based on number
The network packet identical according to structure carries out data packet analysis.Finally, add and crack the difficulty of procotol, it is ensured that network number
According to safety.
After the ultimate principle describing the present invention, introduce the various non-limiting embodiment party of the present invention in detail below
Formula.
Application scenarios overview
An exemplary application scene of embodiments of the present invention is schematically shown with reference first to Fig. 1, Fig. 1.Its
In, legitimate client (such as, desktop computer) 10 and server 20 carry out data interaction, and meanwhile, disabled user 30 monitors conjunction
Method client 10 is sent to the network packet 11 of server 20, and, monitor server 20 and be sent to legitimate client 10
Network packet 21, and attempt to crack between legitimate client 10 and server 20 according to the network packet 11 and 21 that listens to
Procotol, in order to legitimate client 10 can be pretended to be to send network packet to server 20 according to the procotol cracked
31, reach illegal objective with spoofing server 20.In order to reduce the probability even avoiding disabled user 30 to crack procotol,
In legitimate client 10 before server 20 sends network packet 11, legitimate client 10 is to the association in network packet 11
View numbering 12 carries out replacement Treatment.At server 20 before legitimate client 10 sends network packet 21, server 20 is right
Protocol number 22 in network packet 21 carries out replacement Treatment.It will be understood by those skilled in the art that the schematic diagram shown in Fig. 1
It is only examples can being achieved wherein of embodiments of the present invention.The scope of application of embodiment of the present invention is not subject to
Restriction to any aspect of this framework.
Illustrative methods
Below in conjunction with the application scenarios of Fig. 1, be described with reference to Figure 2 according to exemplary embodiment of the invention, for sending out
The method of SCN Space Cable Network packet.It should be noted that above-mentioned application scenarios is for only for ease of and understand the spirit of the present invention and former
Managing and illustrate, embodiments of the present invention are the most unrestricted.On the contrary, embodiments of the present invention can apply to
Any scene being suitable for.
Refer to Fig. 2, that schematically shows transmission network packet according to an embodiment of the invention
The flow chart of method, method the most such as may include that
Step 201: obtain the first executable file;
The executive agent of present embodiment both can be client, it is also possible to be server.
If executive agent is client, client downloads the first executable file from server;If executive agent is
Server, server finds the first executable file according to store path from local storage disk.
Step 202: run described first executable file, produces the first replacement Treatment logic;
Step 203: call described first replacement Treatment logic and come network data bag, described first replacement Treatment logic
For the protocol number in described network packet being carried out computing according to the operational rule of self and operational data, and by computing
The result obtained is as the protocol number in described network packet, and wherein protocol number is for identifying the data of network packet
Structure;
The first replacement Treatment logic can be called when generating each network packet, the first replacement Treatment logic presses
Operational rule and operational data according to self carry out computing to original agreement numbering, and result computing obtained is directly as net
The original agreement numbering of network packet.The first replacement Treatment logic can also be called after generating each network packet, by
First replacement Treatment logic carries out computing according to self operational rule and operational data to the protocol number in network packet,
And result computing obtained replaces the original agreement numbering protocol number as this network packet.
Step 204: send described network packet.
Such as, software developer carries out calculation process according to operational rule and operational data to protocol number by one
Method (the method is referred to as " replacement Treatment logic ") is written as software code, and software code is saved in a program
In source file.If the development language that software developer uses is lua programming language, it is possible to use the compiling of lua language
Source file is compiled into the executable file of binary form by device, is preserved in the server by executable file the most again.Work as conjunction
During method client Connection Service device, the executable file of preservation is sent to legitimate client by server.Legitimate client obtains
After this executable file, built-in script virtual machine runs executable file, and generates a replacement Treatment logic
(that is, the method according to operational rule and operational data, protocol number being carried out calculation process), when legitimate client calls this
After replacement Treatment logic, backstage will carry out calculation process according to operational rule and operational data to protocol number.
It should be noted that the operational rule in the first replacement Treatment logic and operational data are not done and are had by present embodiment
Body limits.Use any operational rule and operational data can realize technical scheme.
Such as, in a simple examples, if before sending network packet, the agreement in network packet is compiled
Number carry out adding 1 process, then, the additive operation carrying out protocol number is one " operational rule ", and " 1 " this numeral is
One " operational data ".Certainly, in actual applications, " operational rule " and " operational data " is more complicated, is only more than
Schematically illustrate the operation principle that protocol number is carried out calculation process.
The difficulty of procotol is cracked, it is also possible to in different network packet in order to further increase disabled user
Protocol number use different computing mode, i.e. dynamically change the computing mode of protocol number in network packet.So
Can reach, even the network packet that data structure is identical, its protocol number is it could also be possible that different.Therefore, illegally
User more can not find, by protocol number, the network packet that data structure is identical, and then the most more can not pass through
The network packet that data structure is identical is carried out data packet analysis to crack procotol.More even, break disabled user
Solve incomplete in the case of, service end is it has also been found that the network packet of some mistakes, and then follows the tracks of the network of these malice
The forgery behavior of packet also carries out corresponding defence process.
Based on this, according to a preferred embodiment of the present invention, present invention additionally comprises: the network data that statistics has generated
The number of bag.Above-mentioned steps 203 is particularly as follows: according to the number of the network packet generated, determine and call described first displacement
Process the number of times of logic, and call network packet described in described first replacement Treatment logical process according to the number of times determined, its
In, when the number of the network packet generated reaches corresponding present count value, it is increased by calling described first displacement
Process the number of times of logic.
Such as, for the 1st to the n-th network packet generated, 1 the first replacement Treatment logic is called to these nets
Network packet processes;For N+1 to the 2N the network packet generated, call 2 the first replacement Treatment continuously
These network packet are processed by logic;For 2N+1 to the 3N the network packet generated, call 3 times continuously
These network packet are processed by the first replacement Treatment logic ... the like.
Below as a example by an actual application scenarios, illustrate how the protocol number in different network packet is adopted
By different computing modes.
When player is played by game client, if it occur that continuous moving behavior, it may be assumed that
1. move to A2 point from A1 point;
2. move to A3 point from A2 point;
3. move to A4 point from A3 point;
4....;
5....;
9. move to A10 point from A9 point.
When player moves, game client can be used for representing trip to 9 network packet of game server
Play client there occurs continuous moving behavior.
Assume that " walking network packet " only comprises 3 partial contents:
1, represent that this is the protocol number that " walking " operates, for convenience of explanation, it is assumed that this protocol number is " 1 ".
2, the initial point position of walking.
3, the final position of walking.
If not performing technical scheme, then, game client is sent to the network data of game server
Wrap shown in Figure 3.For disabled user, it is after listening to these 9 network packet, by contrast it finds that, 9
Individual network packet has the data always " 1 " of a part, the most all does in conjunction with game client meanwhile
The operation of " walking ", to be just easy to reason out " 1 " be to represent " walking ", then further according to conventional understanding, " on foot " at least
Need " starting point " and " terminal " the two data, then, disabled user will attempt looking in the network packet listened to
Look for " starting point " and the data of " terminal ".Certainly, the actual process cracking procotol can be more complicated, and this is only one
Exemplary explanation.
From the example above it is found that in network packet " protocol number " breakthrough cracking procotol can be become
Mouthful.
If performing technical scheme, game client is sent to the network packet of game server and sees
Shown in Fig. 4.Here, the first replacement Treatment logic for adding 1 process to protocol number, for first network number generated
According to bag, call 0 the first replacement Treatment logic, i.e. the protocol number in first network packet generated is " 1 ";For
Second network data generated, calls 1 the first replacement Treatment logic, i.e. the association in second network packet generated
Discuss numbered " 2 ";... for the 9th network packet generated, call 8 the first replacement Treatment logics, i.e. the 9th life
Protocol number in the network packet become is " 9 ".Now, after disabled user listens to these network packet, it is impossible to letter
Single ground obtains the feature of " network packet on foot " by contrasting the content in these network packet, thus adds and crack net
The difficulty of network agreement.Visible, for different network packet, different, just owing to calling the number of times of the first replacement Treatment logic
The effect of different computing modes can be used to reach the protocol number in different network packet.So, in whole process
During, it is only necessary to a replacement Treatment logic, and without producing multiple replacement Treatment logic, scheme implements more
Simple and convenient.
Certainly, the process that protocol number carries out calculation process can be more complicated, above operational rule and operand
According to being only schematically explanation.
When the executive agent of the present invention is client, client needs to obtain the first executable file from server, for
The first executable file is avoided to be stolen by disabled user in transmitting procedure, in another preferred embodiment of the present invention
In, the first executable file is encryption file.Correspondingly, refer to Fig. 5, that schematically shows according to another of the present invention
The flow chart of the method for the transmitting network data bag of individual embodiment, method the most such as may include that
Step 501: obtain the first executable file, described first executable file is encryption file;
Step 502: described first executable file is decrypted;
Step 503: run described first executable file after deciphering, produce the first replacement Treatment logic;
Step 504: call described first replacement Treatment logic and come network data bag, described first replacement Treatment logic
For the protocol number in described network packet being carried out computing according to the operational rule of self and operational data, and by computing
The result obtained is as the protocol number in described network packet;
Step 505: send described network packet.
It addition, for client and server, it is the transmitting terminal of network packet, it also it is network packet
Receiving terminal.After client and server receives network packet as receiving terminal, owing to the agreement in network packet is compiled
Number being carried out calculation process in transmitting terminal side by the first replacement Treatment logic, therefore, client and server needs to connect
Protocol number in each network packet received carries out the inverse operation corresponding with calculation process and processes, say, that client
Also to produce the second decommutation process logic by running the second executable file on end and server, and by the second decommutation
Process logic the protocol number in network packet to be carried out and computing pair with inverse operation data according to the inverse operation rule of self
The inverse operation answered.Obviously, the protocol number obtained by after inverse operation processes is the original agreement numbering before calculation process.Then
Call and this original agreement protocol processing logic corresponding to numbering, by protocol processing logic according to self business rule to reception
Network packet in user data carry out Business Processing.
In addition to above-mentioned embodiment, client and server can also be no longer in the network packet received
Protocol number carries out above-mentioned inverse operation process, but between original agreement numbering and protocol processing logic that receiving terminal is configured
Corresponding relation be revised as transmitting terminal calculation process after corresponding relation between the protocol number and the protocol processing logic that obtain.This
Sample, after extracting protocol number from the network packet received, (this protocol number obtains after being transmitting terminal calculation process
The protocol number arrived), can directly transfer the protocol processing logic corresponding with the protocol number extracted.
Therefore, in another preferred embodiment of the present invention, described method also includes: receiving network data bag;From
The described network packet received is extracted protocol number, and according to the described protocol number about extraction pre-set and association
View processes the corresponding relation between logic, calls the protocol processing logic corresponding with the described protocol number extracted, described agreement
The user data that process logic is used in the described network packet to receiving of the business rule according to self carries out Business Processing.
According to the present invention, owing to the protocol number in network packet being shielded, therefore, disabled user is increased from net
Network packet identifies the difficulty of protocol number, and then also increases disabled user and find there is same protocol numbering
The difficulty of network packet.Make disabled user be not easy to determine the network packet that data structure is identical, and be not easy base
The network packet identical in data structure carries out data packet analysis.Finally, add and crack the difficulty of procotol, it is ensured that net
The safety of network data.
Example devices
After describing method, it follows that with reference to Fig. 6, that schematically shows according to one embodiment party of the present invention
The structural framing figure of the equipment of the transmitting network data bag of formula, describes the equipment for transmitting network data bag.Specifically, should
Equipment such as may include that
Acquiring unit 601, for obtaining the first executable file;
Running unit 602, is used for running described first executable file, produces the first replacement Treatment logic;
First call unit 603, is used for calling described first replacement Treatment logic and carrys out network data bag, and described first
Replacement Treatment logic carries out computing according to self operational rule and operational data to the protocol number in described network packet,
And result computing obtained is used for identifying network as the protocol number in described network packet, wherein said protocol number
The data structure of packet;
Transmitting element 604, is used for sending described network packet.
According to an embodiment of the invention, this equipment also includes: statistic unit, the network number generated for statistics
Number according to bag.
According to an embodiment of the invention, described first call unit 603 is configured that according to the network number generated
According to the number of bag, call the number of times of described first replacement Treatment logic, and call at described first displacement according to the number of times determined
Network packet described in reason logical process, wherein, whenever the number of the network packet generated reaches corresponding predetermined number
During value, it is increased by calling the number of times of described first replacement Treatment logic.
According to an embodiment of the invention, described first executable file is encryption file.
According to an embodiment of the invention, this equipment also includes:
Decryption unit, before running described first executable file in described running unit, can hold described first
Style of writing part is decrypted;
Described running unit 602 is configured that described first executable file after running deciphering, produces the first replacement Treatment
Logic.
According to an embodiment of the invention, described first call unit 603 is configured that
When generating network packet or after generating network packet, call described first replacement Treatment logic
Process described network packet.
According to an embodiment of the invention, this equipment also includes:
Receive unit, for receiving network data bag;
Second call unit, for extracting protocol number, and according to pre-setting from the described network packet received
About extract described protocol number and protocol processing logic between corresponding relation, the described protocol number called and extract
Corresponding protocol processing logic, described protocol processing logic is used for the described network data to receiving of the business rule according to self
User data in bag carries out Business Processing.
According to the present invention, owing to the protocol number in network packet being shielded, therefore, disabled user is increased from net
Network packet identifies the difficulty of protocol number, and then also increases disabled user and find there is same protocol numbering
The difficulty of network packet.Make disabled user be not easy to determine the network packet that data structure is identical, and be not easy base
The network packet identical in data structure carries out data packet analysis.Finally, add and crack the difficulty of procotol, it is ensured that net
The safety of network data.
If although it should be noted that, being referred to equipment for drying or the son of the equipment of transmitting network data bag in above-detailed
Device, but this division is the most enforceable.It practice, according to the embodiment of the present invention, above-described two
Or the feature of more device and function can embody in one apparatus.Otherwise, the feature of an above-described device and
Function can embody with Further Division for by multiple devices.
Although additionally, describe the operation of the inventive method in the accompanying drawings with particular order, but, this do not require that or
Hint must perform these operations according to this particular order, or having to carry out the most shown operation could realize desired
Result.Additionally or alternatively, it is convenient to omit some step, multiple steps are merged into a step and performs, and/or by one
Step is decomposed into multiple step and performs.
Although describing spirit and principles of the present invention by reference to some detailed description of the invention, it should be appreciated that, this
Invention is not limited to disclosed detailed description of the invention, and the division to each side does not means that the feature in these aspects can not yet
Combination to be benefited, this division merely to statement convenience.It is contemplated that contain claims spirit and
Various amendments included by the range of and equivalent arrangements.
Claims (10)
1. a method for transmitting network data bag, including:
A) the first executable file is obtained;
B) run described first executable file, produce the first replacement Treatment logic;
C) number of the network packet that statistics has generated, according to the number of the network packet generated, determines described in calling
The number of times of the first replacement Treatment logic, and call network number described in described first replacement Treatment logical process according to the number of times determined
According to bag, wherein, when the number of the network packet generated reaches corresponding present count value, it is increased by calling described
The number of times of one replacement Treatment logic, described first replacement Treatment logic is used for the operational rule according to self and operational data to institute
State the protocol number in network packet and carry out computing, and result computing obtained is as the agreement in described network packet
Numbering, wherein protocol number is for identifying the data structure of network packet;
D) described network packet is sent.
Method the most according to claim 1, wherein, described first executable file is encryption file.
Method the most according to claim 2, before step b), also includes:
Described first executable file is decrypted;
Step b), particularly as follows: run described first executable file after deciphering, produces the first replacement Treatment logic.
Method the most according to claim 1, wherein, at described step c), when generating network packet or in generation
After network packet, call described first replacement Treatment logic to process described network packet.
Method the most according to claim 1, also includes:
Receiving network data bag;
From the described network packet received, extract protocol number, and compile about the described agreement extracted according to pre-set
Number and protocol processing logic between corresponding relation, call the protocol processing logic corresponding with the described protocol number extracted, institute
State protocol processing logic for according to self business rule to receive described network packet in user data at
Reason.
6. an equipment for transmitting network data bag, including:
Acquiring unit, for obtaining the first executable file;
Running unit, is used for running described first executable file, produces the first replacement Treatment logic;
Statistic unit, for the number of the network packet that statistics has generated;
First call unit, for the number according to the network packet generated, determines that calling described first replacement Treatment patrols
Volume number of times, and call network packet described in described first replacement Treatment logical process according to the number of times determined, wherein, whenever
When the number of the network packet generated reaches corresponding present count value, it is increased by calling described first replacement Treatment logic
Number of times, described first replacement Treatment logic according to self operational rule and operational data to the association in described network packet
View numbering carries out computing, and result computing obtained is as the protocol number in described network packet, wherein said agreement
Numbering is for identifying the data structure of network packet;
Transmitting element, is used for sending described network packet.
Equipment the most according to claim 6, wherein, described first executable file is encryption file.
Equipment the most according to claim 7, also includes:
Decryption unit, before running described first executable file in described running unit, can perform literary composition to described first
Part is decrypted;
Described running unit is configured that described first executable file after running deciphering, produces the first replacement Treatment logic.
Equipment the most according to claim 6, wherein, described first call unit is configured that
When generating network packet or after generating network packet, call described first replacement Treatment logic and process
Described network packet.
Equipment the most according to claim 6, also includes:
Receive unit, for receiving network data bag;
Second call unit, for extracting protocol number, and according to the pass pre-set from the described network packet received
Corresponding relation between described protocol number and the protocol processing logic extracted, calls corresponding with the described protocol number extracted
Protocol processing logic, described protocol processing logic for according to self business rule to receive described network packet in
User data process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310754860.XA CN103685322B (en) | 2013-12-31 | 2013-12-31 | The method and apparatus of transmitting network data bag |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310754860.XA CN103685322B (en) | 2013-12-31 | 2013-12-31 | The method and apparatus of transmitting network data bag |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103685322A CN103685322A (en) | 2014-03-26 |
CN103685322B true CN103685322B (en) | 2016-12-21 |
Family
ID=50321636
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310754860.XA Active CN103685322B (en) | 2013-12-31 | 2013-12-31 | The method and apparatus of transmitting network data bag |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103685322B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1878125A (en) * | 2005-06-06 | 2006-12-13 | 华为技术有限公司 | Realization method for improving backbone network security |
CN102035801A (en) * | 2009-09-28 | 2011-04-27 | 西门子(中国)有限公司 | Method and device for preventing attack |
CN102098669A (en) * | 2011-03-10 | 2011-06-15 | 南京邮电大学 | Scheme for preventing node attack in Ad Hoc network |
CN102957585A (en) * | 2012-12-03 | 2013-03-06 | 惠州Tcl移动通信有限公司 | Data transmission method and data transmission device for Ethernet |
-
2013
- 2013-12-31 CN CN201310754860.XA patent/CN103685322B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1878125A (en) * | 2005-06-06 | 2006-12-13 | 华为技术有限公司 | Realization method for improving backbone network security |
CN102035801A (en) * | 2009-09-28 | 2011-04-27 | 西门子(中国)有限公司 | Method and device for preventing attack |
CN102098669A (en) * | 2011-03-10 | 2011-06-15 | 南京邮电大学 | Scheme for preventing node attack in Ad Hoc network |
CN102957585A (en) * | 2012-12-03 | 2013-03-06 | 惠州Tcl移动通信有限公司 | Data transmission method and data transmission device for Ethernet |
Also Published As
Publication number | Publication date |
---|---|
CN103685322A (en) | 2014-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2485577C1 (en) | Method of increasing reliability of detecting malicious software | |
TWI598765B (en) | Data protection methods and devices | |
Zhang et al. | Breaking into the vault: Privacy, security and forensic analysis of Android vault applications | |
CN104680039B (en) | A kind of data guard method and device of application program installation kit | |
US10007498B2 (en) | Application randomization mechanism | |
US10193927B2 (en) | Method of instruction location randomization (ILR) and related system | |
Chothia et al. | Leakwatch: Estimating information leakage from java programs | |
CN109255234A (en) | Processing method, device, medium and the electronic equipment of machine learning model | |
CN103607402B (en) | A kind of online game data encryption and decryption method and equipment | |
CN104361285B (en) | The safety detection method and device of mobile device application program | |
Rahimian et al. | On the reverse engineering of the citadel botnet | |
Chen et al. | Mass discovery of android traffic imprints through instantiated partial execution | |
CN107979581A (en) | The detection method and device of corpse feature | |
CN108184146B (en) | Method for calculating popularity of live broadcast platform and related equipment | |
CN112286896B (en) | Log file processing method and device, computer equipment and storage medium | |
CN111212033A (en) | Page display method and device based on combined web crawler defense technology and electronic equipment | |
CN112115427A (en) | Code obfuscation method, device, electronic device and storage medium | |
US10242200B1 (en) | Static analysis of vulnerabilities in application packages | |
CN110457869B (en) | Program compiling and encrypting method and device, storage medium and electronic equipment | |
CN114115903A (en) | Method and device for reinforcing small program and operating small program | |
Masid et al. | Application of the SAMA methodology to Ryuk malware | |
CN103034811A (en) | File processing method and system and device | |
CN106411923B (en) | Network risk assessment method based on ontology modeling | |
CN103685322B (en) | The method and apparatus of transmitting network data bag | |
Gonzalez et al. | Measuring code reuse in Android apps |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |