CN103685322B - The method and apparatus of transmitting network data bag - Google Patents

The method and apparatus of transmitting network data bag Download PDF

Info

Publication number
CN103685322B
CN103685322B CN201310754860.XA CN201310754860A CN103685322B CN 103685322 B CN103685322 B CN 103685322B CN 201310754860 A CN201310754860 A CN 201310754860A CN 103685322 B CN103685322 B CN 103685322B
Authority
CN
China
Prior art keywords
network packet
replacement treatment
network
logic
executable file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310754860.XA
Other languages
Chinese (zh)
Other versions
CN103685322A (en
Inventor
张志豪
庄礼深
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Boguan Information Technology Co Ltd
Original Assignee
Guangzhou Boguan Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Boguan Information Technology Co Ltd filed Critical Guangzhou Boguan Information Technology Co Ltd
Priority to CN201310754860.XA priority Critical patent/CN103685322B/en
Publication of CN103685322A publication Critical patent/CN103685322A/en
Application granted granted Critical
Publication of CN103685322B publication Critical patent/CN103685322B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Embodiments of the present invention provide the method and apparatus of a kind of transmitting network data bag.Described method includes: a) obtain the first executable file;B) run described first executable file, produce the first replacement Treatment logic;C) call described first replacement Treatment logic and carry out network data bag, described first replacement Treatment logic is for carrying out computing according to the operational rule of self and operational data to the protocol number in described network packet, and result computing obtained is as the protocol number in described network packet, wherein protocol number is for identifying the data structure of network packet;D) described network packet is sent.The method of the present invention can solve the unsafe problem of network data in prior art.Additionally, another aspect provides the equipment of a kind of transmitting network data bag, such as, software server or client installed.

Description

The method and apparatus of transmitting network data bag
Technical field
Embodiments of the present invention relate to network field, more specifically, embodiments of the present invention relate to transmission network number Method and apparatus according to bag.
Background technology
This part is it is intended that the embodiments of the present invention stated in claims provide background or context.Herein Description can include the concept that can probe into, but is not necessarily the concept having contemplated that before or having probed into.Therefore, unless This points out, is not otherwise existing skill for the description and claims of this application in the content described in this part Art, and not because being included in this part just recognize it is prior art.
Realize communicating by intercoursing network packet between client with server.Such as, the visitor of online game Communication between family end and network game server.
Some disabled users can monitor legitimate client and be sent to the network packet of server, or, monitor server It is sent to the network packet of legitimate client, and carries out the structural analysis of packet based on substantial amounts of network packet, thus Crack the procotol between client and server.And then, it is legal that disabled user will pretend to be according to the procotol cracked User end to server sends network packet, and spoofing server is to reach various illegal objective.
Summary of the invention
The present inventor finds in research process, in the prior art, is sent to server or server in client Being sent in the network packet of client in addition to including data, also include protocol number, protocol number is used for district The data structure (in other words for identifying the type of network packet) of subnetwork packet.Such as, if client executing One " walking " operates, and must comprise two parts in client is sent to the network packet of server, and a part is The concrete data relevant with walking such as the final position of the initial point position " walked " and " walking ", another part is to represent this It it is one " walking " protocol number of operating.Clearly for 100 kinds of network packet data structures, can use 100 different Protocol number makes a distinction.If some network packet data structures are identical, then the association that these network packet are comprised View numbering is the most identical.Disabled user would generally search the network number with same protocol numbering from the network packet listened to According to bag, then disabled user carries out packet structure analysis based on the network packet that data structure is identical, thus cracks client Procotol between end and server.
Therefore according to prior art, disabled user will utilize the agreement that the network packet that data structure is identical is comprised Number this feature identical, determine which network packet listened to is the network data that data structure is identical soon Bag, and carry out data packet analysis based on the network packet that data structure is identical, finally realize cracking of procotol, cause net The unsafe problem of network data.
To this end, the method and apparatus being highly desirable to a kind of transmitting network data bag, to solve network data in prior art Unsafe problem.
In the present context, the method and apparatus that embodiments of the present invention expectation provides a kind of transmitting network data bag.
In the first aspect of embodiment of the present invention, it is provided that a kind of method of transmitting network data bag, including: a) obtain Take the first executable file;B) run described first executable file, produce the first replacement Treatment logic;C) described first is called Replacement Treatment logic carrys out network data bag, and described first replacement Treatment logic is used for the operational rule according to self and computing Data carry out computing to the protocol number in described network packet, and result computing obtained is as described network packet In protocol number, wherein protocol number is for identifying the data structure of network packet;D) described network packet is sent.
In the second aspect of embodiment of the present invention, it is provided that the equipment of a kind of transmitting network data bag, including: obtain Unit, for obtaining the first executable file;Running unit, is used for running described first executable file, produces the first displacement Process logic;First call unit, is used for calling described first replacement Treatment logic and carrys out network data bag, and described first puts Change and process logic, according to self operational rule and operational data, the protocol number in described network packet is carried out computing, and Result computing obtained is as the protocol number in described network packet, and wherein said protocol number is used for identifying network number Data structure according to bag;Transmitting element, is used for sending described network packet.
In embodiments of the present invention, owing to the protocol number in network packet to have been carried out replacement Treatment, therefore, increase Add disabled user from the network packet listened to, found the difficulty of protocol number, also increased disabled user and search To the difficulty of the network packet with same protocol numbering, so, illegitimate client the most just cannot determine have identical data The network packet of structure.Finally, add and crack the difficulty of procotol, it is ensured that the safety of network data.
Particularly when the protocol number in different network packet is used different replacement Treatment modes so that tool The protocol number having the network packet of identical network structure also differs, and illegitimate client more cannot utilize data structure identical Identical this feature of the protocol number that comprised of network packet, determine which network packet listened to is data The network packet that structure is identical.
Accompanying drawing explanation
By reading detailed description below, above-mentioned and other mesh of exemplary embodiment of the invention with reference to accompanying drawing , feature and advantage will become prone to understand.In the accompanying drawings, if showing the present invention's by way of example, and not by way of limitation Dry embodiment, wherein:
Fig. 1 schematically shows an exemplary application scene of embodiments of the present invention;
Fig. 2 schematically shows the flow process of the method for the transmitting network data bag according to an embodiment of the invention Figure;
Fig. 3 schematically shows the structure chart that client in prior art is sent to the network packet of server;
Fig. 4 schematically shows the structure chart that client in the present invention is sent to the network packet of server;
Fig. 5 schematically shows the stream of the method for transmitting network data bag according to another implementation of the invention Cheng Tu;
Fig. 6 schematically shows the structural frames of the equipment of the transmitting network data bag according to one embodiment of the present invention Frame figure;
In the accompanying drawings, identical or corresponding label represents identical or corresponding part.
Detailed description of the invention
Principle and the spirit of the present invention are described below with reference to some illustrative embodiments.Should be appreciated that and provide this A little embodiments are only used to make those skilled in the art better understood when and then realize the present invention, and not with any Mode limits the scope of the present invention.On the contrary, it is provided that these embodiments are to make the disclosure more thorough and complete, and energy Enough the scope of the present disclosure is intactly conveyed to those skilled in the art.
One skilled in the art will appreciate that embodiments of the present invention can be implemented as a kind of system, device, equipment, method Or computer program.Therefore, the disclosure can be to be implemented as following form, it may be assumed that hardware, completely software completely (including firmware, resident software, microcode etc.), or the form that hardware and software combines.
According to the embodiment of the present invention, it is proposed that the method and apparatus of a kind of transmitting network data bag.
In this article, it is to be understood that any number of elements in accompanying drawing is used to example and unrestricted and any Name is only used for distinguishing, and does not have any limitation.
Principle and spirit below with reference to some representative embodiments of the present invention, in detail the explaination present invention.
Summary of the invention
The inventors discovered that, the protocol number comprised due to the network packet of same data structure is identical, because of This, disabled user utilizes opposition thinking, first can search the network with same protocol numbering from the network packet listened to Packet, and determine that these network packet are the network packet that data structure is identical.The most further based on data The network packet that structure is identical carries out data packet analysis, and finally cracks the procotol between client and server.Also That is, finding identical protocol number is the breach that disabled user cracks network packet.
If the protocol number in network packet is shielded, disabled user will be increased and know from network packet Do not go out the difficulty of protocol number, and then also increase disabled user and find the network packet with same protocol numbering Difficulty.So, disabled user will be made to be not easy to determine the network packet that data structure is identical, and be not easy based on number The network packet identical according to structure carries out data packet analysis.Finally, add and crack the difficulty of procotol, it is ensured that network number According to safety.
After the ultimate principle describing the present invention, introduce the various non-limiting embodiment party of the present invention in detail below Formula.
Application scenarios overview
An exemplary application scene of embodiments of the present invention is schematically shown with reference first to Fig. 1, Fig. 1.Its In, legitimate client (such as, desktop computer) 10 and server 20 carry out data interaction, and meanwhile, disabled user 30 monitors conjunction Method client 10 is sent to the network packet 11 of server 20, and, monitor server 20 and be sent to legitimate client 10 Network packet 21, and attempt to crack between legitimate client 10 and server 20 according to the network packet 11 and 21 that listens to Procotol, in order to legitimate client 10 can be pretended to be to send network packet to server 20 according to the procotol cracked 31, reach illegal objective with spoofing server 20.In order to reduce the probability even avoiding disabled user 30 to crack procotol, In legitimate client 10 before server 20 sends network packet 11, legitimate client 10 is to the association in network packet 11 View numbering 12 carries out replacement Treatment.At server 20 before legitimate client 10 sends network packet 21, server 20 is right Protocol number 22 in network packet 21 carries out replacement Treatment.It will be understood by those skilled in the art that the schematic diagram shown in Fig. 1 It is only examples can being achieved wherein of embodiments of the present invention.The scope of application of embodiment of the present invention is not subject to Restriction to any aspect of this framework.
Illustrative methods
Below in conjunction with the application scenarios of Fig. 1, be described with reference to Figure 2 according to exemplary embodiment of the invention, for sending out The method of SCN Space Cable Network packet.It should be noted that above-mentioned application scenarios is for only for ease of and understand the spirit of the present invention and former Managing and illustrate, embodiments of the present invention are the most unrestricted.On the contrary, embodiments of the present invention can apply to Any scene being suitable for.
Refer to Fig. 2, that schematically shows transmission network packet according to an embodiment of the invention The flow chart of method, method the most such as may include that
Step 201: obtain the first executable file;
The executive agent of present embodiment both can be client, it is also possible to be server.
If executive agent is client, client downloads the first executable file from server;If executive agent is Server, server finds the first executable file according to store path from local storage disk.
Step 202: run described first executable file, produces the first replacement Treatment logic;
Step 203: call described first replacement Treatment logic and come network data bag, described first replacement Treatment logic For the protocol number in described network packet being carried out computing according to the operational rule of self and operational data, and by computing The result obtained is as the protocol number in described network packet, and wherein protocol number is for identifying the data of network packet Structure;
The first replacement Treatment logic can be called when generating each network packet, the first replacement Treatment logic presses Operational rule and operational data according to self carry out computing to original agreement numbering, and result computing obtained is directly as net The original agreement numbering of network packet.The first replacement Treatment logic can also be called after generating each network packet, by First replacement Treatment logic carries out computing according to self operational rule and operational data to the protocol number in network packet, And result computing obtained replaces the original agreement numbering protocol number as this network packet.
Step 204: send described network packet.
Such as, software developer carries out calculation process according to operational rule and operational data to protocol number by one Method (the method is referred to as " replacement Treatment logic ") is written as software code, and software code is saved in a program In source file.If the development language that software developer uses is lua programming language, it is possible to use the compiling of lua language Source file is compiled into the executable file of binary form by device, is preserved in the server by executable file the most again.Work as conjunction During method client Connection Service device, the executable file of preservation is sent to legitimate client by server.Legitimate client obtains After this executable file, built-in script virtual machine runs executable file, and generates a replacement Treatment logic (that is, the method according to operational rule and operational data, protocol number being carried out calculation process), when legitimate client calls this After replacement Treatment logic, backstage will carry out calculation process according to operational rule and operational data to protocol number.
It should be noted that the operational rule in the first replacement Treatment logic and operational data are not done and are had by present embodiment Body limits.Use any operational rule and operational data can realize technical scheme.
Such as, in a simple examples, if before sending network packet, the agreement in network packet is compiled Number carry out adding 1 process, then, the additive operation carrying out protocol number is one " operational rule ", and " 1 " this numeral is One " operational data ".Certainly, in actual applications, " operational rule " and " operational data " is more complicated, is only more than Schematically illustrate the operation principle that protocol number is carried out calculation process.
The difficulty of procotol is cracked, it is also possible to in different network packet in order to further increase disabled user Protocol number use different computing mode, i.e. dynamically change the computing mode of protocol number in network packet.So Can reach, even the network packet that data structure is identical, its protocol number is it could also be possible that different.Therefore, illegally User more can not find, by protocol number, the network packet that data structure is identical, and then the most more can not pass through The network packet that data structure is identical is carried out data packet analysis to crack procotol.More even, break disabled user Solve incomplete in the case of, service end is it has also been found that the network packet of some mistakes, and then follows the tracks of the network of these malice The forgery behavior of packet also carries out corresponding defence process.
Based on this, according to a preferred embodiment of the present invention, present invention additionally comprises: the network data that statistics has generated The number of bag.Above-mentioned steps 203 is particularly as follows: according to the number of the network packet generated, determine and call described first displacement Process the number of times of logic, and call network packet described in described first replacement Treatment logical process according to the number of times determined, its In, when the number of the network packet generated reaches corresponding present count value, it is increased by calling described first displacement Process the number of times of logic.
Such as, for the 1st to the n-th network packet generated, 1 the first replacement Treatment logic is called to these nets Network packet processes;For N+1 to the 2N the network packet generated, call 2 the first replacement Treatment continuously These network packet are processed by logic;For 2N+1 to the 3N the network packet generated, call 3 times continuously These network packet are processed by the first replacement Treatment logic ... the like.
Below as a example by an actual application scenarios, illustrate how the protocol number in different network packet is adopted By different computing modes.
When player is played by game client, if it occur that continuous moving behavior, it may be assumed that
1. move to A2 point from A1 point;
2. move to A3 point from A2 point;
3. move to A4 point from A3 point;
4....;
5....;
9. move to A10 point from A9 point.
When player moves, game client can be used for representing trip to 9 network packet of game server Play client there occurs continuous moving behavior.
Assume that " walking network packet " only comprises 3 partial contents:
1, represent that this is the protocol number that " walking " operates, for convenience of explanation, it is assumed that this protocol number is " 1 ".
2, the initial point position of walking.
3, the final position of walking.
If not performing technical scheme, then, game client is sent to the network data of game server Wrap shown in Figure 3.For disabled user, it is after listening to these 9 network packet, by contrast it finds that, 9 Individual network packet has the data always " 1 " of a part, the most all does in conjunction with game client meanwhile The operation of " walking ", to be just easy to reason out " 1 " be to represent " walking ", then further according to conventional understanding, " on foot " at least Need " starting point " and " terminal " the two data, then, disabled user will attempt looking in the network packet listened to Look for " starting point " and the data of " terminal ".Certainly, the actual process cracking procotol can be more complicated, and this is only one Exemplary explanation.
From the example above it is found that in network packet " protocol number " breakthrough cracking procotol can be become Mouthful.
If performing technical scheme, game client is sent to the network packet of game server and sees Shown in Fig. 4.Here, the first replacement Treatment logic for adding 1 process to protocol number, for first network number generated According to bag, call 0 the first replacement Treatment logic, i.e. the protocol number in first network packet generated is " 1 ";For Second network data generated, calls 1 the first replacement Treatment logic, i.e. the association in second network packet generated Discuss numbered " 2 ";... for the 9th network packet generated, call 8 the first replacement Treatment logics, i.e. the 9th life Protocol number in the network packet become is " 9 ".Now, after disabled user listens to these network packet, it is impossible to letter Single ground obtains the feature of " network packet on foot " by contrasting the content in these network packet, thus adds and crack net The difficulty of network agreement.Visible, for different network packet, different, just owing to calling the number of times of the first replacement Treatment logic The effect of different computing modes can be used to reach the protocol number in different network packet.So, in whole process During, it is only necessary to a replacement Treatment logic, and without producing multiple replacement Treatment logic, scheme implements more Simple and convenient.
Certainly, the process that protocol number carries out calculation process can be more complicated, above operational rule and operand According to being only schematically explanation.
When the executive agent of the present invention is client, client needs to obtain the first executable file from server, for The first executable file is avoided to be stolen by disabled user in transmitting procedure, in another preferred embodiment of the present invention In, the first executable file is encryption file.Correspondingly, refer to Fig. 5, that schematically shows according to another of the present invention The flow chart of the method for the transmitting network data bag of individual embodiment, method the most such as may include that
Step 501: obtain the first executable file, described first executable file is encryption file;
Step 502: described first executable file is decrypted;
Step 503: run described first executable file after deciphering, produce the first replacement Treatment logic;
Step 504: call described first replacement Treatment logic and come network data bag, described first replacement Treatment logic For the protocol number in described network packet being carried out computing according to the operational rule of self and operational data, and by computing The result obtained is as the protocol number in described network packet;
Step 505: send described network packet.
It addition, for client and server, it is the transmitting terminal of network packet, it also it is network packet Receiving terminal.After client and server receives network packet as receiving terminal, owing to the agreement in network packet is compiled Number being carried out calculation process in transmitting terminal side by the first replacement Treatment logic, therefore, client and server needs to connect Protocol number in each network packet received carries out the inverse operation corresponding with calculation process and processes, say, that client Also to produce the second decommutation process logic by running the second executable file on end and server, and by the second decommutation Process logic the protocol number in network packet to be carried out and computing pair with inverse operation data according to the inverse operation rule of self The inverse operation answered.Obviously, the protocol number obtained by after inverse operation processes is the original agreement numbering before calculation process.Then Call and this original agreement protocol processing logic corresponding to numbering, by protocol processing logic according to self business rule to reception Network packet in user data carry out Business Processing.
In addition to above-mentioned embodiment, client and server can also be no longer in the network packet received Protocol number carries out above-mentioned inverse operation process, but between original agreement numbering and protocol processing logic that receiving terminal is configured Corresponding relation be revised as transmitting terminal calculation process after corresponding relation between the protocol number and the protocol processing logic that obtain.This Sample, after extracting protocol number from the network packet received, (this protocol number obtains after being transmitting terminal calculation process The protocol number arrived), can directly transfer the protocol processing logic corresponding with the protocol number extracted.
Therefore, in another preferred embodiment of the present invention, described method also includes: receiving network data bag;From The described network packet received is extracted protocol number, and according to the described protocol number about extraction pre-set and association View processes the corresponding relation between logic, calls the protocol processing logic corresponding with the described protocol number extracted, described agreement The user data that process logic is used in the described network packet to receiving of the business rule according to self carries out Business Processing.
According to the present invention, owing to the protocol number in network packet being shielded, therefore, disabled user is increased from net Network packet identifies the difficulty of protocol number, and then also increases disabled user and find there is same protocol numbering The difficulty of network packet.Make disabled user be not easy to determine the network packet that data structure is identical, and be not easy base The network packet identical in data structure carries out data packet analysis.Finally, add and crack the difficulty of procotol, it is ensured that net The safety of network data.
Example devices
After describing method, it follows that with reference to Fig. 6, that schematically shows according to one embodiment party of the present invention The structural framing figure of the equipment of the transmitting network data bag of formula, describes the equipment for transmitting network data bag.Specifically, should Equipment such as may include that
Acquiring unit 601, for obtaining the first executable file;
Running unit 602, is used for running described first executable file, produces the first replacement Treatment logic;
First call unit 603, is used for calling described first replacement Treatment logic and carrys out network data bag, and described first Replacement Treatment logic carries out computing according to self operational rule and operational data to the protocol number in described network packet, And result computing obtained is used for identifying network as the protocol number in described network packet, wherein said protocol number The data structure of packet;
Transmitting element 604, is used for sending described network packet.
According to an embodiment of the invention, this equipment also includes: statistic unit, the network number generated for statistics Number according to bag.
According to an embodiment of the invention, described first call unit 603 is configured that according to the network number generated According to the number of bag, call the number of times of described first replacement Treatment logic, and call at described first displacement according to the number of times determined Network packet described in reason logical process, wherein, whenever the number of the network packet generated reaches corresponding predetermined number During value, it is increased by calling the number of times of described first replacement Treatment logic.
According to an embodiment of the invention, described first executable file is encryption file.
According to an embodiment of the invention, this equipment also includes:
Decryption unit, before running described first executable file in described running unit, can hold described first Style of writing part is decrypted;
Described running unit 602 is configured that described first executable file after running deciphering, produces the first replacement Treatment Logic.
According to an embodiment of the invention, described first call unit 603 is configured that
When generating network packet or after generating network packet, call described first replacement Treatment logic Process described network packet.
According to an embodiment of the invention, this equipment also includes:
Receive unit, for receiving network data bag;
Second call unit, for extracting protocol number, and according to pre-setting from the described network packet received About extract described protocol number and protocol processing logic between corresponding relation, the described protocol number called and extract Corresponding protocol processing logic, described protocol processing logic is used for the described network data to receiving of the business rule according to self User data in bag carries out Business Processing.
According to the present invention, owing to the protocol number in network packet being shielded, therefore, disabled user is increased from net Network packet identifies the difficulty of protocol number, and then also increases disabled user and find there is same protocol numbering The difficulty of network packet.Make disabled user be not easy to determine the network packet that data structure is identical, and be not easy base The network packet identical in data structure carries out data packet analysis.Finally, add and crack the difficulty of procotol, it is ensured that net The safety of network data.
If although it should be noted that, being referred to equipment for drying or the son of the equipment of transmitting network data bag in above-detailed Device, but this division is the most enforceable.It practice, according to the embodiment of the present invention, above-described two Or the feature of more device and function can embody in one apparatus.Otherwise, the feature of an above-described device and Function can embody with Further Division for by multiple devices.
Although additionally, describe the operation of the inventive method in the accompanying drawings with particular order, but, this do not require that or Hint must perform these operations according to this particular order, or having to carry out the most shown operation could realize desired Result.Additionally or alternatively, it is convenient to omit some step, multiple steps are merged into a step and performs, and/or by one Step is decomposed into multiple step and performs.
Although describing spirit and principles of the present invention by reference to some detailed description of the invention, it should be appreciated that, this Invention is not limited to disclosed detailed description of the invention, and the division to each side does not means that the feature in these aspects can not yet Combination to be benefited, this division merely to statement convenience.It is contemplated that contain claims spirit and Various amendments included by the range of and equivalent arrangements.

Claims (10)

1. a method for transmitting network data bag, including:
A) the first executable file is obtained;
B) run described first executable file, produce the first replacement Treatment logic;
C) number of the network packet that statistics has generated, according to the number of the network packet generated, determines described in calling The number of times of the first replacement Treatment logic, and call network number described in described first replacement Treatment logical process according to the number of times determined According to bag, wherein, when the number of the network packet generated reaches corresponding present count value, it is increased by calling described The number of times of one replacement Treatment logic, described first replacement Treatment logic is used for the operational rule according to self and operational data to institute State the protocol number in network packet and carry out computing, and result computing obtained is as the agreement in described network packet Numbering, wherein protocol number is for identifying the data structure of network packet;
D) described network packet is sent.
Method the most according to claim 1, wherein, described first executable file is encryption file.
Method the most according to claim 2, before step b), also includes:
Described first executable file is decrypted;
Step b), particularly as follows: run described first executable file after deciphering, produces the first replacement Treatment logic.
Method the most according to claim 1, wherein, at described step c), when generating network packet or in generation After network packet, call described first replacement Treatment logic to process described network packet.
Method the most according to claim 1, also includes:
Receiving network data bag;
From the described network packet received, extract protocol number, and compile about the described agreement extracted according to pre-set Number and protocol processing logic between corresponding relation, call the protocol processing logic corresponding with the described protocol number extracted, institute State protocol processing logic for according to self business rule to receive described network packet in user data at Reason.
6. an equipment for transmitting network data bag, including:
Acquiring unit, for obtaining the first executable file;
Running unit, is used for running described first executable file, produces the first replacement Treatment logic;
Statistic unit, for the number of the network packet that statistics has generated;
First call unit, for the number according to the network packet generated, determines that calling described first replacement Treatment patrols Volume number of times, and call network packet described in described first replacement Treatment logical process according to the number of times determined, wherein, whenever When the number of the network packet generated reaches corresponding present count value, it is increased by calling described first replacement Treatment logic Number of times, described first replacement Treatment logic according to self operational rule and operational data to the association in described network packet View numbering carries out computing, and result computing obtained is as the protocol number in described network packet, wherein said agreement Numbering is for identifying the data structure of network packet;
Transmitting element, is used for sending described network packet.
Equipment the most according to claim 6, wherein, described first executable file is encryption file.
Equipment the most according to claim 7, also includes:
Decryption unit, before running described first executable file in described running unit, can perform literary composition to described first Part is decrypted;
Described running unit is configured that described first executable file after running deciphering, produces the first replacement Treatment logic.
Equipment the most according to claim 6, wherein, described first call unit is configured that
When generating network packet or after generating network packet, call described first replacement Treatment logic and process Described network packet.
Equipment the most according to claim 6, also includes:
Receive unit, for receiving network data bag;
Second call unit, for extracting protocol number, and according to the pass pre-set from the described network packet received Corresponding relation between described protocol number and the protocol processing logic extracted, calls corresponding with the described protocol number extracted Protocol processing logic, described protocol processing logic for according to self business rule to receive described network packet in User data process.
CN201310754860.XA 2013-12-31 2013-12-31 The method and apparatus of transmitting network data bag Active CN103685322B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310754860.XA CN103685322B (en) 2013-12-31 2013-12-31 The method and apparatus of transmitting network data bag

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310754860.XA CN103685322B (en) 2013-12-31 2013-12-31 The method and apparatus of transmitting network data bag

Publications (2)

Publication Number Publication Date
CN103685322A CN103685322A (en) 2014-03-26
CN103685322B true CN103685322B (en) 2016-12-21

Family

ID=50321636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310754860.XA Active CN103685322B (en) 2013-12-31 2013-12-31 The method and apparatus of transmitting network data bag

Country Status (1)

Country Link
CN (1) CN103685322B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1878125A (en) * 2005-06-06 2006-12-13 华为技术有限公司 Realization method for improving backbone network security
CN102035801A (en) * 2009-09-28 2011-04-27 西门子(中国)有限公司 Method and device for preventing attack
CN102098669A (en) * 2011-03-10 2011-06-15 南京邮电大学 Scheme for preventing node attack in Ad Hoc network
CN102957585A (en) * 2012-12-03 2013-03-06 惠州Tcl移动通信有限公司 Data transmission method and data transmission device for Ethernet

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1878125A (en) * 2005-06-06 2006-12-13 华为技术有限公司 Realization method for improving backbone network security
CN102035801A (en) * 2009-09-28 2011-04-27 西门子(中国)有限公司 Method and device for preventing attack
CN102098669A (en) * 2011-03-10 2011-06-15 南京邮电大学 Scheme for preventing node attack in Ad Hoc network
CN102957585A (en) * 2012-12-03 2013-03-06 惠州Tcl移动通信有限公司 Data transmission method and data transmission device for Ethernet

Also Published As

Publication number Publication date
CN103685322A (en) 2014-03-26

Similar Documents

Publication Publication Date Title
RU2485577C1 (en) Method of increasing reliability of detecting malicious software
TWI598765B (en) Data protection methods and devices
Zhang et al. Breaking into the vault: Privacy, security and forensic analysis of Android vault applications
CN104680039B (en) A kind of data guard method and device of application program installation kit
US10007498B2 (en) Application randomization mechanism
US10193927B2 (en) Method of instruction location randomization (ILR) and related system
Chothia et al. Leakwatch: Estimating information leakage from java programs
CN109255234A (en) Processing method, device, medium and the electronic equipment of machine learning model
CN103607402B (en) A kind of online game data encryption and decryption method and equipment
CN104361285B (en) The safety detection method and device of mobile device application program
Rahimian et al. On the reverse engineering of the citadel botnet
Chen et al. Mass discovery of android traffic imprints through instantiated partial execution
CN107979581A (en) The detection method and device of corpse feature
CN108184146B (en) Method for calculating popularity of live broadcast platform and related equipment
CN112286896B (en) Log file processing method and device, computer equipment and storage medium
CN111212033A (en) Page display method and device based on combined web crawler defense technology and electronic equipment
CN112115427A (en) Code obfuscation method, device, electronic device and storage medium
US10242200B1 (en) Static analysis of vulnerabilities in application packages
CN110457869B (en) Program compiling and encrypting method and device, storage medium and electronic equipment
CN114115903A (en) Method and device for reinforcing small program and operating small program
Masid et al. Application of the SAMA methodology to Ryuk malware
CN103034811A (en) File processing method and system and device
CN106411923B (en) Network risk assessment method based on ontology modeling
CN103685322B (en) The method and apparatus of transmitting network data bag
Gonzalez et al. Measuring code reuse in Android apps

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant