CN105828352A - Flow use abnormity detection method, wireless network type recognition method and device - Google Patents

Flow use abnormity detection method, wireless network type recognition method and device Download PDF

Info

Publication number
CN105828352A
CN105828352A CN201510005250.9A CN201510005250A CN105828352A CN 105828352 A CN105828352 A CN 105828352A CN 201510005250 A CN201510005250 A CN 201510005250A CN 105828352 A CN105828352 A CN 105828352A
Authority
CN
China
Prior art keywords
wireless network
title
verification
flow
described wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510005250.9A
Other languages
Chinese (zh)
Other versions
CN105828352B (en
Inventor
湛滨瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510005250.9A priority Critical patent/CN105828352B/en
Publication of CN105828352A publication Critical patent/CN105828352A/en
Application granted granted Critical
Publication of CN105828352B publication Critical patent/CN105828352B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a flow use abnormity detection method, a wireless network type recognition method, a device and a terminal. The flow use abnormity detection method comprises the steps of acquiring the name of a wireless network to which the terminal is connected, verifying the name of the wireless network so as to judge the type of the wireless network, and carrying out monitoring on the flow used by the terminal if the wireless network is a mobile data conversion type wireless network, and determining that flow use of the terminal for a hotspot is abnormal when the flow used by the terminal is greater than a preset flow threshold within the preset time. The flow use abnormity detection method provided by the invention can accurately recognize the type of the wireless network, and flow analysis and statistics are carried out on the mobile data conversion type wireless network in a targeted mode, thereby being capable of carrying out flow protection on a mobile terminal providing the wireless network accordingly, and being high in reliability.

Description

Flow uses abnormal detection method, wireless network type recognition methods and device
Technical field
The application relates to networking technology area, uses abnormal detection method, device and terminal and wireless network type recognition methods, device and terminal particularly to a kind of flow.
Background technology
Along with the development of mobile terminal technology, mobile focus has a wide range of applications the most in the terminal.There is the mobile terminal of focus function, by the GPRS (GeneralPacketRadioService of mobile terminal, general packet radio service), 2G (Generation Mobile Telecommunication System technology), 3G (G mobile communication) or 4G (forth generation mobile communication technology) flow be converted to stable WIFI (WirelessFidelity, Wireless Fidelity) signal, connect internet use for remaining terminal unit in WIFI signal coverage.Although this brings huge help to the routine work of people and life, but, when the terminal unit accessing mobile focus opens Online Video, when audio frequency etc. use flow the biggest application program, the flow providing the mobile terminal of WIFI signal can be caused to use too much, cause the consequence wasting even flow snowslide, it is thus desirable to the wireless network in terminal unit access is that mobile data conversion class wireless network is (namely by mobile terminal by GPRS, 2G, the WIFI network obtained after the conversion of 3G or 4G network) time, the use flow of terminal unit is monitored, and when the use Traffic Anomaly of terminal unit, take the measure of necessity.
At present, whether the wireless network that can identify access in the following manner is mobile data conversion class wireless network.The first is the mode that credit confirms.When mobile terminal accesses a WIFI signal, password and WIFI type can be authorized by mode manually;The second is when mobile terminal accesses wireless network, whether the IP address of the wireless network that can inquire about access belongs to the IP (InternetProtocol of the mobile data conversion class wireless network of pre-collecting, the agreement of interconnection between network) address, if belonged to, then what explanation mobile terminal accessed is mobile data conversion class wireless network.
But; by above-mentioned first kind of way; when in the terminal unit of the focus that multiple connection mobile terminals are set up because open Online Video or audio frequency and during transition consumed flow; the use Expenditure Levels of flow cannot be obtained in real time as the mobile terminal providing focus; when flow uses and occurs abnormal, flow cannot be automatically cut off, thus be difficult to reach the defencive function to flow, and credit process needs to pass through manual operation; the automatization of flow process cannot be realized, the most inconvenient.And by the above-mentioned second way, owing to the IP address of pre-collecting is difficult to include the IP address of whole mobile data conversion class wireless networks, and, the IP address of wireless network also can often change, thus whether can cause the wireless network being accessed terminal unit is that the judgement of mobile data conversion class wireless network is inaccurate, reliability is low.
Summary of the invention
The application is intended to solve above-mentioned technical problem the most to a certain extent.
For this; first purpose of the application is that proposing a kind of flow uses abnormal detection method; the type of wireless network can be identified exactly; targetedly mobile data conversion class wireless network is carried out flow analysis and statistics such that it is able to accordingly the mobile terminal providing wireless network is carried out traffic protection.
Second purpose of the application is that proposing a kind of flow uses abnormal detection device.
3rd purpose of the application is to propose a kind of terminal.
4th purpose of the application is to propose a kind of wireless network type recognition methods.
5th purpose of the application is to propose a kind of wireless network type identification device.
6th purpose of the application is to propose another kind of terminal.
For reaching above-mentioned purpose, propose a kind of flow according to the application first aspect embodiment and use abnormal detection method, comprise the following steps: obtain the title of the wireless network that terminal is accessed;The title of described wireless network is verified, to judge the type of described wireless network;If described wireless network is mobile data conversion class wireless network, then the flow used described terminal is monitored;When the flow that described terminal uses in Preset Time is more than preset flow threshold value, it is determined that the flow of described focus is used abnormal by described terminal.
The flow of the embodiment of the present application uses abnormal detection method, by obtaining the title of the wireless network that terminal is accessed, and the title of this wireless network is verified, to judge the type of wireless network, and be monitored by moving flow when data change class wireless network, terminal used at wireless network, when being more than preset flow threshold value with the flow used in Preset Time in terminal, judge that the flow of terminal uses abnormal, the type of wireless network can be identified exactly, targetedly mobile data conversion class wireless network is carried out flow analysis and statistics, it is thus possible to accordingly the mobile terminal providing wireless network is carried out traffic protection.The program is high to the identification certainty of the type of wireless network such that it is able to effectively prevent flow waste or the consequence of snowslide excessively using flow to cause because mobile data conversion class wireless network cannot be recognized accurately.
The application second aspect embodiment provides a kind of flow and uses abnormal detection device, including: the first acquisition module, for obtaining the title of the wireless network that terminal is accessed;Correction verification module, for verifying the title of described wireless network, to judge the type of described wireless network;Monitoring modular, when described wireless network changes class wireless network for mobile data, the flow being used described terminal is monitored;Determination module, for when the flow that described terminal uses in Preset Time is more than preset flow threshold value, it is determined that the flow of described focus is used abnormal by described terminal.
The flow of the embodiment of the present application uses abnormal detection device, by obtaining the title of the wireless network that terminal is accessed, and the title of this wireless network is verified, to judge the type of wireless network, and be monitored by moving flow when data change class wireless network, terminal used at wireless network, when being more than preset flow threshold value with the flow used in Preset Time in terminal, judge that the flow of terminal uses abnormal, the type of wireless network can be identified exactly, targetedly mobile data conversion class wireless network is carried out flow analysis and statistics, it is thus possible to accordingly the mobile terminal providing wireless network is carried out traffic protection.The program is high to the identification certainty of the type of wireless network such that it is able to effectively prevent flow waste or the consequence of snowslide excessively using flow to cause because mobile data conversion class wireless network cannot be recognized accurately.
The application third aspect embodiment provides a kind of terminal, and the flow including the application second aspect embodiment uses abnormal detection device.
The terminal of the embodiment of the present application, by obtaining the title of the wireless network that terminal is accessed, and the title of this wireless network is verified, to judge the type of wireless network, and be monitored by moving flow when data change class wireless network, terminal used at wireless network, when being more than preset flow threshold value with the flow used in Preset Time in terminal, judge that the flow of terminal uses abnormal, the type of wireless network can be identified exactly, targetedly mobile data conversion class wireless network is carried out flow analysis and statistics, it is thus possible to accordingly the mobile terminal providing wireless network is carried out traffic protection.The program is high to the identification certainty of the type of wireless network such that it is able to effectively prevent flow waste or the consequence of snowslide excessively using flow to cause because mobile data conversion class wireless network cannot be recognized accurately.
The application fourth aspect embodiment proposes a kind of wireless network type recognition methods, comprises the following steps: obtain the title of the wireless network that terminal is accessed;Judge whether the title of described wireless network meets the verification rule preset;If the title of described wireless network meets described default verification rule, then judge that described wireless network is as mobile data conversion class wireless network.
The wireless network type recognition methods of the embodiment of the present application, by obtaining the title of the wireless network that terminal is accessed, and judge whether the title of described wireless network meets the verification rule preset, if meeting this verification preset rule, then can determine that described wireless network is for mobile data conversion class wireless network, can identify the type of wireless network exactly, fault-tolerance is strong, and reliability is high.
The application the 5th aspect embodiment provides a kind of wireless network type identification device, including: acquisition module, for obtaining the title of the wireless network that terminal is accessed;Judge module, for judging whether the title of described wireless network meets the verification rule preset;Determination module, for when the title of described wireless network meets described default verification rule, it is determined that described wireless network is mobile data conversion class wireless network.
The wireless network type identification device of the embodiment of the present application, by obtaining the title of the wireless network that terminal is accessed, and judge whether the title of described wireless network meets the verification rule preset, if meeting this verification preset rule, then can determine that described wireless network is for mobile data conversion class wireless network, can identify the type of wireless network exactly, fault-tolerance is strong, and reliability is high.
The application the 6th aspect embodiment provides another kind of terminal, including the wireless network type identification device of the application the 5th aspect embodiment.
The terminal of the embodiment of the present application, by obtaining the title of the wireless network that terminal is accessed, and judge whether the title of described wireless network meets the verification rule preset, if meeting this verification preset rule, then can determine that described wireless network is for mobile data conversion class wireless network, can identify the type of wireless network exactly, fault-tolerance is strong, and reliability is high.
The additional aspect of the application and advantage will part be given in the following description, and part will become apparent from the description below, or is recognized by the practice of the application.
Accompanying drawing explanation
Above-mentioned and/or the additional aspect of the application and advantage will be apparent from easy to understand, wherein from combining the accompanying drawings below description to embodiment:
Fig. 1 is the flow chart that the flow according to one embodiment of the application uses abnormal detection method;
Fig. 2 is the method flow diagram whether title judging wireless network according to one embodiment of the application meets the verification rule preset;
Fig. 3 is the method flow diagram of the acquisition preset flow threshold value according to one embodiment of the application;
Fig. 4 is the most too distribution schematic diagram that the terminal according to one embodiment of the application uses flow;
Fig. 5 is the structural representation that the flow according to one embodiment of the application uses abnormal detection device;
Fig. 6 is the structural representation that the flow according to one specific embodiment of the application uses abnormal detection device;
Fig. 7 is the structural representation that the flow according to another embodiment of the application uses abnormal detection device;
Fig. 8 is the wireless network type recognition methods flow chart according to one embodiment of the application;
Fig. 9 is the structural representation of the wireless network type identification device according to one embodiment of the application;
Figure 10 is the structural representation of the wireless network type identification device according to one specific embodiment of the application.
Detailed description of the invention
Embodiments herein is described below in detail, and the example of described embodiment is shown in the drawings, and the most same or similar label represents same or similar element or has the element of same or like function.The embodiment described below with reference to accompanying drawing is exemplary, is only used for explaining the application, and it is not intended that restriction to the application.
In the description of the present application, it will be appreciated that, term " " center ", " longitudinally ", " laterally ", on " ", D score, " front ", " afterwards ", " left ", " right ", " vertically ", " level ", " push up ", " end ", " interior ", orientation or the position relationship of the instruction such as " outward " are based on orientation shown in the drawings or position relationship, it is for only for ease of description the application and simplifies description, rather than indicate or imply that the device of indication or element must have specific orientation, with specific azimuth configuration and operation, therefore it is not intended that restriction to the application.Additionally, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance.
In the description of the present application, it should be noted that unless otherwise clearly defined and limited, term " is installed ", " being connected ", " connection " should be interpreted broadly, and connects for example, it may be fixing, it is also possible to be to removably connect, or be integrally connected;Can be to be mechanically connected, it is also possible to be electrical connection;Can be to be joined directly together, it is also possible to be indirectly connected to by intermediary, can be the connection of two element internals.For the ordinary skill in the art, above-mentioned term concrete meaning in this application can be understood with concrete condition.
Below with reference to the accompanying drawings describe the flow according to the embodiment of the present application and use abnormal detection method, device and terminal.
Fig. 1 is the flow chart that the flow according to one embodiment of the application uses abnormal detection method.As it is shown in figure 1, use abnormal detection method according to the flow of the embodiment of the present application, including:
S101, obtains the title of the wireless network that terminal is accessed.
Specifically, when terminal accesses wireless network, the title of the current wireless network connected can be obtained by the operating system interface of terminal.
S102, verifies the title of wireless network, to judge the type of wireless network.
In an embodiment of the application, user can set up focus by inputting hotspot name and focus credit password in the mobile terminal with focus function, opens focus function, provides wireless network for other-end equipment.The hotspot name (the namely original title of the wireless network that this focus provides) of user setup can be obtained by the operating system interface of mobile terminal, and in hotspot name, add check bit according to default verification rule, obtain new hotspot name, and new hotspot name is supplied to other-end equipment as the title of wireless network.Other-end equipment can access this wireless network according to this wireless network name and corresponding credit password.Thus, the type of wireless network can be judged according to whether the title of wireless network has check bit, if there being check bit, then show during this wireless network, to move data conversion class wireless network, i.e. by the focus function of mobile terminal, GPRS, 2G, 3G or 4G network signal is converted to the wireless network that WIFI signal obtains.
Wherein, preset rules includes when original title according to wireless network generates the rule (such as the quantity of check code in the check bit that generates, the algorithm etc. that generates check code) of check bit and generates the verification title of wireless network, the original title of wireless network and the compound mode of check bit.Such as, the quantity of check code can be set to random natural number, such as 3,4,5 etc., the original title of wireless network and the compound mode of check bit can be combination front and back (original title in front check bit rear), rear before combination (original title in rear check bit front) or combined crosswise or other modes, this is not limited by the application.
Thus, in embodiments herein, can determine whether whether the title of wireless network meets the verification rule preset, if the title of wireless network meets default verification rule, then judge that wireless network is as mobile data conversion class wireless network.
Wherein, as shown in Figure 2, it is judged that whether the title of wireless network meets the verification rule preset includes:
S201, extracts the original title of wireless network from the title of wireless network according to default verification rule.
Specifically, in an embodiment of the application, the original title extracting wireless network according to default verification rule from the title of wireless network includes: determine the quantity of the check code that check bit comprises in the title of wireless network and the position relationship of the original title of check bit and wireless network according to default verification rule;Quantity according to check code and position relationship determine non-check code character string in the title of wireless network, and using non-check code character string as the original title of wireless network.
For example, in the verification rule settings check bit preset, the quantity of check code is 3, the original title of wireless network and the compound mode of check bit are that (original title is front in combination front and back, check bit is rear), then for title ABCC6R of wireless network, the primitive name that can extract wireless network is referred to as ABC.
S202, verification rule and wireless network original title generate verification title.
Specifically, in an embodiment of the application, first using n character in original title successively as front n the character in verification title, then by the check bit in following cyclic check rule-based algorithm calculating verification title:
R n + k = ( Σ i = 1 n + k - 1 R i × 2 i - 1 ) % Q - - - ( 1 )
Wherein, k ∈ 1 ... N, N are the quantity of check code in check bit, n is the string length of original title, Rn+kFor kth check bit in verification title, Q is the number of default available check code, and wherein, the number of available check code is prime number.
For example, the available check code preset can be 37 shown in table 1, as shown in table 1 including 10 Arabic numerals, 26 English alphabets and " * ", i.e. Q=37, each available check code and numerical value corresponding during calculating thereof.
Table 1
0(0) 1(1) 2(2) 3(3) 4(4) 5(5) 6(6) 7(7) 8(8) 9(9)
10(*) 11(A) 12(B) 13(C) 14(D) 15(E) 16(F) 17(G) 18(H) 19(I)
20(G) 21(K) 22(L) 23(M) 24(N) 25(O) 26(P) 27(Q) 28(R) 29(S)
30(T) 31(U) 32(V) 33(W) 34(X) 35(Y) 36(Z)
S203, it is judged that the title of wireless network is the most consistent with verification title.
S204, if the title of wireless network is consistent with verification title, then judges that the title of wireless network meets default verification rule.
S205, if the title of wireless network is inconsistent with verification title, then judges the verification rule that the title of wireless network is unsatisfactory for presetting.
For example, default verification rule to set in check bit the quantity of check code as 3, i.e. N=3, and as a example by the compound mode of the original title of wireless network and check bit is combination front and back: for original title ABC of a wireless network, according to available check bit C6R of the algorithmic formula (1) in above-mentioned verification rule, the then entitled ABCC6R of the wireless network finally given.In like manner, as the entitled ABCC6R of the wireless network that terminal unit accesses, can according to default verification Rule Extraction go out wireless network original title ABC (according to default verification rule remove below 3 obtain), can pass through formula (1) being calculated check bit corresponding to original title ABC is C6R, and be combined as verifying title ABCC6R by check bit and original title, consistent with the title of the wireless network accessed, then judge that the title of wireless network meets default verification rule, and can determine that wireless network is mobile data conversion class wireless network.
It is to be understood that, above-mentioned default verification rule once sets, the hotspot name that all terminals all set according to user according to this verification rule when creating wireless network focus (i.e. WIFI hot spot) generates a new wireless network name, the wireless network accessed, when accessing a wireless network, is all identified by all terminals by this verification rule.Wherein, in check bit, quantity N of check code may be set to random natural number, and fault-tolerance when the type of wireless network is carried out the most greatly by the numerical value of N by this verification rule, reliability are the highest.For example, if N is set as 5, i.e. preset verification 5 check bit of rule settings, then the title of a random wireless network meets this probability presetting verification rule is 1/375≈2/100000000.This shows by this verification rule by the mobile data that are mistakenly identified as of the type of wireless network, to change the probability of class be 2/100000000ths.Therefore, the embodiment of the present application can automatically identify the type of the wireless network being currently accessed when terminal accesses wireless network, and fault-tolerance be very strong, reliability is the highest.
S103, if wireless network is mobile data conversion class wireless network, then the flow used terminal is monitored.
Specifically, in embodiments herein, can the flow that used in each Preset Time of real-time monitoring terminal.Wherein, Preset Time can be 10 seconds, 1 second, 1 millisecond etc., can be according to monitoring accuracy demand and terminator requirements set, and this is not limited by the application.
S104, when the flow that terminal uses in Preset Time is more than preset flow threshold value, it is determined that the flow of terminal uses abnormal.
In an embodiment of the application; if it is determined that the flow of terminal uses abnormal; then can carry out Traffic Anomaly prompting or disconnection of wireless network connects; can the user of prompt terminal timely; so that user takes appropriate measures (as disconnected flow or closing big flow application etc.); or disconnection of wireless network connects automatically, thus avoid excessively using or waste of flow, it is achieved that the traffic protection to the mobile terminal providing wireless network.
The flow of the embodiment of the present application uses abnormal detection method, by obtaining the title of the wireless network that terminal is accessed, and the title of this wireless network is verified, to judge the type of wireless network, and be monitored by moving flow when data change class wireless network, terminal used at wireless network, when being more than preset flow threshold value with the flow used in Preset Time in terminal, judge that the flow of terminal uses abnormal, the type of wireless network can be identified exactly, targetedly mobile data conversion class wireless network is carried out flow analysis and statistics, it is thus possible to accordingly the mobile terminal providing wireless network is carried out traffic protection.The program is high to the identification certainty of the type of wireless network such that it is able to effectively prevent flow waste or the consequence of snowslide excessively using flow to cause because mobile data conversion class wireless network cannot be recognized accurately.
Further, the scheme of the embodiment of the present application and correlation technique identify that whether the wireless network of access is that the contrast of mobile data conversion class wireless network can be as shown in table 2 by the way of credit confirms and with the mode of mobile phone wireless network ip address.It can thus be seen that the scheme of the embodiment of the present application is for the scheme in correlation technique, can automatically identify the type of wireless network, and reliability participation high, artificial is low, be relatively easy realization.
The scheme of table 2 the embodiment of the present application and the scheme comparison's relation table in correlation technique
Alternatively, in an embodiment of the application, may also include the step obtaining preset flow threshold value.Specifically, as it is shown on figure 3, obtain preset flow threshold value and include:
S301, obtains the flow confidence interval of terminal according to the confidence interval monitoring model pre-build.
Owing to terminal is when accessing the wireless network that focus provides, the consumption to flow is generally focused in the interval range of, and use flow is crossed high situation and seldom occurred.From overall angle, terminal uses flow to substantially conform to a normal distribution when accessing the wireless network that focus provides.The schematic diagram of the curve of this normal distribution can as shown in Figure 4, and wherein, transverse axis x represents the use flow of terminal, and longitudinal axis f (x) represents the probability density using flow of terminal, and α is this scale parameter being distributed the most very much.
Therefore, the population mean of sample variance and normal distribution on the basic model of normal distribution, can be utilized, obtain a confidence interval monitoring model according to confidence level.Then, the flow confidence interval of terminal is obtained according to this confidence interval monitoring model.
Specifically, if the data traffic that terminal uses in i-th Preset Time is Qi, the total flow used in front i Preset Time is Ti, then the average discharge used in front i Preset Time isThen,
When through n Preset Time, in a new Preset Time, there is following discharge relation:
Tn+1=Tn+Qi, and
From the foregoing, it will be observed that the sample variance for the flow in n Preset Time is:
S n 2 = 1 n - 1 Σ i = 1 n ( T i - T ‾ n ) 2 = 1 n - 1 ( Σ i = 1 n T i 2 - n T ‾ n 2 )
Definition according to sample variance with sample standard deviation can obtain, and the sample standard deviation of the flow in n Preset Time is:
S n = 1 n - 1 ( Σ i = 1 n T i 2 - n T ‾ n 2 )
And then the standard deviation of sample average can be can get according to normal distribution mean value computation relation and be
Then according to sample average standard deviation and normal distribution, obtaining confidence interval monitoring model is:
( T ‾ n - Z 1 - α 2 S n n , T ‾ n + Z 1 - α 2 S n n )
Wherein, α is confidence level,Can be obtained by the standard normal distribution table inquiry that inquiry confidence alpha is corresponding.
Thus, can according to actual monitoring to terminal access wireless network time flow service condition obtain terminal flow use sample average and sample average standard deviation, and bring in the monitoring model of above-mentioned confidence interval, obtain the flow confidence interval of the different confidence levels of terminal.
S302, determines preset flow threshold value according to the upper limit of flow confidence interval.
For example, preset flow threshold value can be that the terminal arrived according to the actual monitoring flow service condition when accessing wireless network is calculatedValue.
If the flow that terminal uses is more than preset flow threshold value, then shows that flow service condition now is the small probability time, belong to abnormal conditions, therefore, can determine that and use extremely into flow.
Thus, according to determined by said method flow threshold to judge whether to occur that flow uses abnormal, improve flow and use accuracy and the reliability of abnormality detection.
In order to realize above-described embodiment, the application also proposes a kind of flow and uses abnormal detection device.
Fig. 5 is the structural representation that the flow according to one embodiment of the application uses abnormal detection device.
As it is shown in figure 5, use abnormal detection device according to the flow of the embodiment of the present application, including: the first acquisition module 10, correction verification module 20, monitoring modular 30 and determination module 40.
Specifically, the first acquisition module 10 is for obtaining the title of the wireless network that terminal is accessed.More specifically, when terminal accesses wireless network, the first acquisition module 10 can obtain the title of the current wireless network connected by the operating system interface of terminal.
Correction verification module 20 is for verifying the title of wireless network, to judge the type of wireless network.
In an embodiment of the application, user can set up focus by inputting hotspot name and focus credit password in the mobile terminal with focus function, opens focus function, provides wireless network for other-end equipment.The hotspot name (the namely original title of the wireless network that this focus provides) of user setup can be obtained by the operating system interface of mobile terminal, and in hotspot name, add check bit according to default verification rule, obtain new hotspot name, and new hotspot name is supplied to other-end equipment as the title of wireless network.Other-end equipment can access this wireless network according to this wireless network name and corresponding credit password.Thus, the type of wireless network can be judged according to whether the title of wireless network has check bit, if there being check bit, then show during this wireless network, to move data conversion class wireless network, i.e. by the focus function of mobile terminal, GPRS, 2G, 3G or 4G network signal is converted to the wireless network that WIFI signal obtains.
Wherein, preset rules includes when original title according to wireless network generates the rule (such as the quantity of check code in the check bit that generates, the algorithm etc. that generates check code) of check bit and generates the verification title of wireless network, the original title of wireless network and the compound mode of check bit.Such as, the quantity of check code can be set to random natural number, such as 3,4,5 etc., the original title of wireless network and the compound mode of check bit can be combination front and back (original title in front check bit rear), rear before combination (original title in rear check bit front) or combined crosswise or other modes, this is not limited by the application.
Thus, in embodiments herein, as shown in Figure 6, correction verification module 20 may particularly include: judging unit 21 and identifying unit 22.
Whether judging unit 21 meets the verification rule preset for the title judging wireless network.Judging unit 21 is specifically for performing the step shown in the application embodiment illustrated in fig. 2.From the title of wireless network, the original title of wireless network is i.e. extracted according to the verification rule preset;Verification title is generated by the original title of default verification rule and wireless network;Judge that the title of wireless network is the most consistent with verification title;If the title of wireless network is consistent with verification title, then judge that the title of wireless network meets default verification rule;If the title of wireless network is inconsistent with verification title, then judge the verification rule that the title of wireless network is unsatisfactory for presetting.
Wherein, in an embodiment of the application, judging unit 21 is when the original title of the verification rule by presetting and wireless network generates verification title, first using n character in original title successively as front n the character in verification title, then by the check bit in following cyclic check rule-based algorithm calculating verification title:
R n + k = ( Σ i = 1 n + k - 1 R i × 2 i - 1 ) % Q - - - ( 1 )
Wherein, k ∈ 1 ... N, N are the quantity of check code in check bit, n is the string length of original title, Rn+kFor kth check bit in verification title, Q is the number of default available check code, and wherein, the number of available check code is prime number.
For example, the available check code preset can be 37 shown in table 1, as shown in table 1 including 10 Arabic numerals, 26 English alphabets and " * ", i.e. Q=37, each available check code and numerical value corresponding during calculating thereof.
Identifying unit 22 for meeting default verification rule when the title of wireless network, then judges that wireless network is as mobile data conversion class wireless network.
It is to be understood that, above-mentioned default verification rule once sets, the hotspot name that all terminals all set according to user according to this verification rule when creating wireless network focus (i.e. WIFI hot spot) generates a new wireless network name, the wireless network accessed, when accessing a wireless network, is all identified by all terminals by this verification rule.Wherein, in check bit, quantity N of check code may be set to random natural number, and fault-tolerance when the type of wireless network is carried out the most greatly by the numerical value of N by this verification rule, reliability are the highest.For example, if N is set as 5, i.e. preset verification 5 check bit of rule settings, then the title of a random wireless network meets this probability presetting verification rule is 1/375≈2/100000000.This shows by this verification rule by the mobile data that are mistakenly identified as of the type of wireless network, to change the probability of class be 2/100000000ths.Therefore, the embodiment of the present application can automatically identify the type of the wireless network being currently accessed when terminal accesses wireless network, and fault-tolerance be very strong, reliability is the highest.
Monitoring modular 30 is when wireless network changes class wireless network for mobile data, and the flow being used terminal is monitored.
More specifically, in embodiments herein, monitoring modular 30 can the flow that used in each Preset Time of real-time monitoring terminal.Wherein, Preset Time can be 10 seconds, 1 second, 1 millisecond etc., can be according to monitoring accuracy demand and terminator requirements set, and this is not limited by the application.
Determination module 40 is for when the flow that terminal uses in Preset Time is more than preset flow threshold value, it is determined that the flow of focus is used abnormal by terminal.
The flow of the embodiment of the present application uses abnormal detection device, by obtaining the title of the wireless network that terminal is accessed, and the title of this wireless network is verified, to judge the type of wireless network, and be monitored by moving flow when data change class wireless network, terminal used at wireless network, when being more than preset flow threshold value with the flow used in Preset Time in terminal, judge that the flow of terminal uses abnormal, the type of wireless network can be identified exactly, targetedly mobile data conversion class wireless network is carried out flow analysis and statistics, it is thus possible to accordingly the mobile terminal providing wireless network is carried out traffic protection.The program is high to the identification certainty of the type of wireless network such that it is able to effectively prevent flow waste or the consequence of snowslide excessively using flow to cause because mobile data conversion class wireless network cannot be recognized accurately.
Alternatively, the flow of the embodiment of the present application uses abnormal detection device to may also include the second acquisition module and control module.Fig. 7 is the structural representation that the flow according to another embodiment of the application uses abnormal detection device.As it is shown in fig. 7, this flow uses abnormal detection device, including: the first acquisition module 10, correction verification module 20, monitoring modular 30, determination module the 40, second acquisition module 50 and control module 60.
Specifically, the first acquisition module 10, correction verification module 20, monitoring modular 30 and determination module 40 can not repeat them here as shown in Fig. 5 or Fig. 6 any embodiment.
Second acquisition module 50 is used for obtaining preset flow threshold value.
More specifically, the second acquisition module 50 specifically for: obtain the flow confidence interval of terminal according to the confidence interval monitoring model pre-build;The upper limit according to flow confidence interval determines preset flow threshold value.
Owing to terminal is when accessing the wireless network that focus provides, the consumption to flow is generally focused in the interval range of, and use flow is crossed high situation and seldom occurred.From overall angle, terminal uses flow to substantially conform to a normal distribution when accessing the wireless network that focus provides.The schematic diagram of the curve of this normal distribution can as shown in Figure 4, and wherein, transverse axis x represents the use flow of terminal, and longitudinal axis f (x) represents the probability density using flow of terminal, and α is this scale parameter being distributed the most very much.
Therefore, the population mean of sample variance and normal distribution on the basic model of normal distribution, can be utilized, obtain a confidence interval monitoring model according to confidence level.Then, the flow confidence interval of terminal is obtained according to this confidence interval monitoring model.
If more specifically, the data traffic that terminal uses in i-th Preset Time is Qi, the total flow used in front i Preset Time is Ti, then the average discharge used in front i Preset Time isThen,
When through n Preset Time, in a new Preset Time, there is following discharge relation:
Tn+1=Tn+Qi, and
From the foregoing, it will be observed that the sample variance for the flow in n Preset Time is:
S n 2 = 1 n - 1 Σ i = 1 n ( T i - T ‾ n ) 2 = 1 n - 1 ( Σ i = 1 n T i 2 - n T ‾ n 2 )
Definition according to sample variance with sample standard deviation can obtain, and the sample standard deviation of the flow in n Preset Time is:
S n = 1 n - 1 ( Σ i = 1 n T i 2 - n T ‾ n 2 )
And then the standard deviation of sample average can be can get according to normal distribution mean value computation relation and be
Then according to sample average standard deviation and normal distribution, obtaining confidence interval monitoring model is:
( T ‾ n - Z 1 - α 2 S n n , T ‾ n + Z 1 - α 2 S n n )
Wherein, α is confidence level,Can be obtained by the standard normal distribution table inquiry that inquiry confidence alpha is corresponding.
Thus, can according to actual monitoring to terminal access wireless network time flow service condition obtain terminal flow use sample average and sample average standard deviation, and bring in the monitoring model of above-mentioned confidence interval, obtain the flow confidence interval of the different confidence levels of terminal.
Wherein, for example, preset flow threshold value can be that the terminal arrived according to the actual monitoring flow service condition when accessing wireless network is calculatedValue.
If the flow that terminal uses is more than preset flow threshold value, then shows that flow service condition now is the small probability time, belong to abnormal conditions, therefore, can determine that and use extremely into flow.
Thus, according to determined by said method flow threshold to judge whether to occur that flow uses abnormal, improve flow and use accuracy and the reliability of abnormality detection.
Control module 60, for when judging that the flow of focus is used abnormal by terminal, carries out Traffic Anomaly prompting or disconnection of wireless network connects.
In an embodiment of the application; if it is determined that the flow of terminal uses abnormal; then control module 60 can carry out Traffic Anomaly prompting or disconnection of wireless network connects; can the user of prompt terminal timely; so that user takes appropriate measures (as disconnected flow or closing big flow application etc.); or disconnection of wireless network connects automatically, thus avoid excessively using or waste of flow, it is achieved that the traffic protection to the mobile terminal providing wireless network.
As a example by realize above-described embodiment, the application also proposes a kind of terminal.
The terminal of the embodiment of the present application includes that the flow shown in the application any embodiment uses abnormal detection device, by obtaining the title of the wireless network that terminal is accessed, and the title of this wireless network is verified, to judge the type of wireless network, and be monitored by moving flow when data change class wireless network, terminal used at wireless network, when being more than preset flow threshold value with the flow used in Preset Time in terminal, judge that the flow of terminal uses abnormal, the type of wireless network can be identified exactly, targetedly mobile data conversion class wireless network is carried out flow analysis and statistics, it is thus possible to accordingly the mobile terminal providing wireless network is carried out traffic protection.The program is high to the identification certainty of the type of wireless network such that it is able to effectively prevent flow waste or the consequence of snowslide excessively using flow to cause because mobile data conversion class wireless network cannot be recognized accurately.
Below with reference to the accompanying drawings wireless network type recognition methods, device and terminal according to the embodiment of the present application described.
Fig. 8 is the wireless network type recognition methods flow chart according to one embodiment of the application.
As shown in Figure 8, this wireless network type recognition methods, comprise the following steps:
S801, obtains the title of the wireless network that terminal is accessed.
Specifically, when terminal accesses wireless network, the title of the current wireless network connected can be obtained by the operating system interface of terminal.
S802, it is judged that whether the title of wireless network meets the verification rule preset.
In an embodiment of the application, user can set up focus by inputting hotspot name and focus credit password in the mobile terminal with focus function, opens focus function, provides wireless network for other-end equipment.The hotspot name (the namely original title of the wireless network that this focus provides) of user setup can be obtained by the operating system interface of mobile terminal, and in hotspot name, add check bit according to default verification rule, obtain new hotspot name, and new hotspot name is supplied to other-end equipment as the title of wireless network.Other-end equipment can access this wireless network according to this wireless network name and corresponding credit password.Thus, the type of wireless network can be judged according to whether the title of wireless network has check bit, if there being check bit, then show during this wireless network, to move data conversion class wireless network, i.e. by the focus function of mobile terminal, GPRS, 2G, 3G or 4G network signal is converted to the wireless network that WIFI signal obtains.
Wherein, preset rules includes when original title according to wireless network generates the rule (such as the quantity of check code in the check bit that generates, the algorithm etc. that generates check code) of check bit and generates the verification title of wireless network, the original title of wireless network and the compound mode of check bit.Such as, the quantity of check code can be set to random natural number, such as 3,4,5 etc., the original title of wireless network and the compound mode of check bit can be combination front and back (original title in front check bit rear), rear before combination (original title in rear check bit front) or combined crosswise or other modes, this is not limited by the application.
Thus, in embodiments herein, whether can meet, by the title judging wireless network, the verification rule preset and identify the type of wireless network.
Specifically, it is judged that whether the title of wireless network meets the verification rule preset includes the step of the application embodiment as shown in Figure 2.
S201, extracts the original title of wireless network from the title of wireless network according to default verification rule.
For example, in the verification rule settings check bit preset, the quantity of check code is 3, and the original title of wireless network is front and back to combine with the compound mode of check bit, then for title ABCC6R of wireless network, the primitive name that can extract wireless network is referred to as ABC.
S202, generates verification title by the original title of default verification rule and wireless network.
Specifically, in an embodiment of the application, first using n character in original title successively as front n the character in verification title, then by the check bit in following cyclic check rule-based algorithm calculating verification title:
R n + k = ( Σ i = 1 n + k - 1 R i × 2 i - 1 ) % Q - - - ( 1 )
Wherein, k ∈ 1 ... N, N are the quantity of check code in check bit, n is the string length of original title, Rn+kFor kth check bit in verification title, Q is the number of default available check code, and wherein, the number of available check code is prime number.
For example, the available check code preset can be 37 shown in table 1, as shown in table 1 including 10 Arabic numerals, 26 English alphabets and " * ", i.e. Q=37, each available check code and numerical value corresponding during calculating thereof.
S203, it is judged that the title of wireless network is the most consistent with verification title.
S204, if the title of wireless network is consistent with verification title, then judges that the title of wireless network meets default verification rule.
S205, if the title of wireless network is inconsistent with verification title, then judges the verification rule that the title of wireless network is unsatisfactory for presetting.
For example, default verification rule to set in check bit the quantity of check code as 3, i.e. N=3, and as a example by the compound mode of the original title of wireless network and check bit is combination front and back: for original title ABC of a wireless network, according to available check bit C6R of the algorithmic formula (1) in above-mentioned verification rule, the then entitled ABCC6R of the wireless network finally given.In like manner, as the entitled ABCC6R of the wireless network that terminal unit accesses, can according to default verification Rule Extraction go out wireless network original title ABC (according to default verification rule remove below 3 obtain), can pass through formula (1) being calculated check bit corresponding to original title ABC is C6R, and be combined as verifying title ABCC6R by check bit and original title, consistent with the title of the wireless network accessed, then judge that the title of wireless network meets default verification rule, and can determine that wireless network is mobile data conversion class wireless network.
It is to be understood that, above-mentioned default verification rule once sets, the hotspot name that all terminals all set according to user according to this verification rule when creating wireless network focus (i.e. WIFI hot spot) generates a new wireless network name, the wireless network accessed, when accessing a wireless network, is all identified by all terminals by this verification rule.Wherein, in check bit, quantity N of check code may be set to random natural number, and fault-tolerance when the type of wireless network is carried out the most greatly by the numerical value of N by this verification rule, reliability are the highest.For example, if N is set as 5, i.e. preset verification 5 check bit of rule settings, then the title of a random wireless network meets this probability presetting verification rule is 1/375≈2/100000000.This shows by this verification rule by the mobile data that are mistakenly identified as of the type of wireless network, to change the probability of class be 2/100000000ths.Therefore, the embodiment of the present application can automatically identify the type of the wireless network being currently accessed when terminal accesses wireless network, and fault-tolerance be very strong, reliability is the highest.
S803, if the title of wireless network meets default verification rule, then judges that wireless network is as mobile data conversion class wireless network.
S804, if the title of wireless network is unsatisfactory for the verification rule preset, then judges that wireless network changes class wireless network as non-moving data.
The wireless network type recognition methods of the embodiment of the present application, by obtaining the title of the wireless network that terminal is accessed, and judge whether the title of wireless network meets the verification rule preset, if meeting this verification preset rule, then can determine that wireless network is mobile data conversion class wireless network, can identify the type of wireless network exactly, fault-tolerance is strong, and reliability is high.
As a example by realize above-described embodiment, the application also proposes a kind of wireless network type identification device.
Fig. 9 is the structural representation of the wireless network type identification device according to one embodiment of the application.
As it is shown in figure 9, this wireless network type identification device, including: acquisition module 210, judge module 220 and determination module 230.
Specifically, acquisition module 210 is for obtaining the title of the wireless network that terminal is accessed.More specifically, when terminal accesses wireless network, acquisition module 210 can obtain the title of the current wireless network connected by the operating system interface of terminal.
Whether judge module 220 meets the verification rule preset for the title judging wireless network.
In an embodiment of the application, user can set up focus by inputting hotspot name and focus credit password in the mobile terminal with focus function, opens focus function, provides wireless network for other-end equipment.The hotspot name (the namely original title of the wireless network that this focus provides) of user setup can be obtained by the operating system interface of mobile terminal, and in hotspot name, add check bit according to default verification rule, obtain new hotspot name, and new hotspot name is supplied to other-end equipment as the title of wireless network.Other-end equipment can access this wireless network according to this wireless network name and corresponding credit password.Thus, the type of wireless network can be judged according to whether the title of wireless network has check bit, if there being check bit, then show during this wireless network, to move data conversion class wireless network, i.e. by the focus function of mobile terminal, GPRS, 2G, 3G or 4G network signal is converted to the wireless network that WIFI signal obtains.
Wherein, preset rules includes when original title according to wireless network generates the rule (such as the quantity of check code in the check bit that generates, the algorithm etc. that generates check code) of check bit and generates the verification title of wireless network, the original title of wireless network and the compound mode of check bit.Such as, the quantity of check code can be set to random natural number, such as 3,4,5 etc., the original title of wireless network and the compound mode of check bit can be combination front and back (original title in front check bit rear), rear before combination (original title in rear check bit front) or combined crosswise or other modes, this is not limited by the application.
Thus, in embodiments herein, it is judged that module 220 specifically includes: extraction unit 221, signal generating unit 222, judging unit 223 and identifying unit 224.
More specifically, extraction unit 221 for extracting the original title of wireless network from the title of wireless network according to the verification rule preset.For example, in the verification rule settings check bit preset, the quantity of check code is 3, and the original title of wireless network is front and back to combine with the compound mode of check bit, then for title ABCC6R of wireless network, the primitive name that can extract wireless network is referred to as ABC.
Signal generating unit 222 is for generating verification title by the original title of default verification rule and wireless network.
In an embodiment of the application, signal generating unit 222 specifically for: using n character in original title successively as verification title in front n character;Check bit by following cyclic check rule-based algorithm calculating verification title:
R n + k = ( Σ i = 1 n + k - 1 R i × 2 i - 1 ) % Q
Wherein, k ∈ 1 ... N, N are the quantity of check code in check bit, n is the string length of original title, Rn+kFor kth check bit in verification title, Q is the number of default available check code, and wherein, the number of available check code is prime number.
Judging unit 223 is the most consistent with verification title for the title judging wireless network;
If identifying unit 224 is consistent with verification title for the title of wireless network, then judge that the title of wireless network meets default verification rule.Identifying unit is additionally operable to when the title of wireless network is inconsistent with verification title, it is determined that the title of wireless network is unsatisfactory for the verification rule preset.
For example, default verification rule to set in check bit the quantity of check code as 3, i.e. N=3, and as a example by the compound mode of the original title of wireless network and check bit is combination front and back: for original title ABC of a wireless network, according to available check bit C6R of the algorithmic formula (1) in above-mentioned verification rule, the then entitled ABCC6R of the wireless network finally given.In like manner, as the entitled ABCC6R of the wireless network that terminal unit accesses, can according to default verification Rule Extraction go out wireless network original title ABC (according to default verification rule remove below 3 obtain), can pass through formula (1) being calculated check bit corresponding to original title ABC is C6R, and be combined as verifying title ABCC6R by check bit and original title, consistent with the title of the wireless network accessed, then judge that the title of wireless network meets default verification rule, and can determine that wireless network is mobile data conversion class wireless network.
It is to be understood that, above-mentioned default verification rule once sets, the hotspot name that all terminals all set according to user according to this verification rule when creating wireless network focus (i.e. WIFI hot spot) generates a new wireless network name, the wireless network accessed, when accessing a wireless network, is all identified by all terminals by this verification rule.Wherein, in check bit, quantity N of check code may be set to random natural number, and fault-tolerance when the type of wireless network is carried out the most greatly by the numerical value of N by this verification rule, reliability are the highest.For example, if N is set as 5, i.e. preset verification 5 check bit of rule settings, then the title of a random wireless network meets this probability presetting verification rule is 1/375≈2/100000000.This shows by this verification rule by the mobile data that are mistakenly identified as of the type of wireless network, to change the probability of class be 2/100000000ths.Therefore, the embodiment of the present application can automatically identify the type of the wireless network being currently accessed when terminal accesses wireless network, and fault-tolerance be very strong, reliability is the highest.
Determination module 230 is for when the title of wireless network meets default verification rule, it is determined that wireless network is mobile data conversion class wireless network.Determination module 230 is additionally operable to when the title of wireless network is unsatisfactory for the verification rule preset, it is determined that wireless network is that non-moving data change class wireless network.
The wireless network type identification device of the embodiment of the present application, by obtaining the title of the wireless network that terminal is accessed, and judge whether the title of wireless network meets the verification rule preset, if meeting this verification preset rule, then can determine that wireless network is mobile data conversion class wireless network, can identify the type of wireless network exactly, fault-tolerance is strong, and reliability is high.
As a example by realize above-described embodiment, the application also proposes another kind of terminal.
The terminal of the embodiment of the present application, wireless network type identification device including the application any embodiment, by obtaining the title of the wireless network that terminal is accessed, and judge whether the title of wireless network meets the verification rule preset, if meeting this verification preset rule, then can determine that wireless network is mobile data conversion class wireless network, it is possible to identify the type of wireless network exactly, fault-tolerance is strong, and reliability is high.
In flow chart or at this, any process described otherwise above or method description are construed as, represent and include one or more module of code, fragment or part for the executable instruction of the step that realizes specific logical function or process, and the scope of the preferred implementation of the application includes other realization, wherein can not be by order that is shown or that discuss, including according to involved function by basic mode simultaneously or in the opposite order, performing function, this should be understood by embodiments herein person of ordinary skill in the field.
Represent in flow charts or the logic described otherwise above at this and/or step, such as, it is considered the sequencing list of executable instruction for realizing logic function, may be embodied in any computer-readable medium, use for instruction execution system, device or equipment (system such as computer based system, including processor or other can be from instruction execution system, device or equipment instruction fetch the system performing instruction), or combine these instruction execution systems, device or equipment and use.For the purpose of this specification, " computer-readable medium " can be any can to comprise, store, communicate, propagate or transmission procedure for instruction execution system, device or equipment or combines these instruction execution systems, device or equipment and the device that uses.The more specifically example (non-exhaustive list) of computer-readable medium includes following: have the electrical connection section (electronic installation) of one or more wiring, portable computer diskette box (magnetic device), random access memory (RAM), read only memory (ROM), erasable edit read only memory (EPROM or flash memory), fiber device, and portable optic disk read only memory (CDROM).Additionally, computer-readable medium can even is that paper or other the suitable media that can print described program thereon, because can be such as by paper or other media be carried out optical scanning, then carry out editing, interpreting or be processed to electronically obtain described program with other suitable methods if desired, be then stored in computer storage.
Should be appreciated that each several part of the application can realize by hardware, software, firmware or combinations thereof.In the above-described embodiment, multiple steps or method can realize with software or the firmware that storage in memory and is performed by suitable instruction execution system.Such as, if realized with hardware, as in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic of logic gates for data signal realizes logic function, there is the special IC of suitable combination logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries can be by program and complete to instruct relevant hardware, described program can be stored in a kind of computer-readable recording medium, this program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the application can be integrated in a processing module, it is also possible to be that unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated module both can realize to use the form of hardware, it would however also be possible to employ the form of software function module realizes.If described integrated module is using the form realization of software function module and as independent production marketing or use, it is also possible to be stored in a computer read/write memory medium.
Storage medium mentioned above can be read only memory, disk or CD etc..
In the description of this specification, the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means that the specific features, structure, material or the feature that combine this embodiment or example description are contained at least one embodiment or the example of the application.In this manual, the schematic representation to above-mentioned term is not necessarily referring to identical embodiment or example.And, the specific features of description, structure, material or feature can combine in any one or more embodiments or example in an appropriate manner.
While there has been shown and described that embodiments herein, it will be understood by those skilled in the art that: these embodiments can carry out in the case of without departing from the principle of the application and objective multiple change, revise, replace and modification, scope of the present application is limited by claim and equivalent thereof.

Claims (32)

1. a flow uses abnormal detection method, it is characterised in that comprise the following steps:
Obtain the title of the wireless network that terminal is accessed;
The title of described wireless network is verified, to judge the type of described wireless network;
If described wireless network is mobile data conversion class wireless network, then the flow used described terminal is monitored;
When the flow that described terminal uses in Preset Time is more than preset flow threshold value, it is determined that the flow of described terminal uses abnormal.
2. flow as claimed in claim 1 uses abnormal detection method, it is characterised in that the described title to described wireless network verifies, to judge that the type of described wireless network includes:
Judge whether the title of described wireless network meets the verification rule preset;
If the title of described wireless network meets described default verification rule, then judge that described wireless network is as mobile data conversion class wireless network.
3. flow as claimed in claim 2 uses abnormal detection method, it is characterised in that whether the described title judging described wireless network meets the verification rule preset includes:
From the title of described wireless network, the original title of described wireless network is extracted according to described default verification rule;
Verification title is generated by the described default original title verifying regular and described wireless network;
Judge that the title of described wireless network is the most consistent with described verification title;
If the title of described wireless network is consistent with described verification title, then judge that the title of described wireless network meets described default verification rule.
4. flow as claimed in claim 3 uses abnormal detection method, it is characterised in that the described original title extracting described wireless network from the title of described wireless network according to described default verification rule includes:
The quantity of the check code that check bit comprises in the title of described wireless network and the position relationship of the original title of described check bit and described wireless network is determined according to described default verification rule;
Quantity according to described check code and described position relationship determine non-check code character string in the title of described wireless network, and using described non-check code character string as the original title of described wireless network.
5. flow as claimed in claim 3 uses abnormal detection method, it is characterised in that the described original title by the described default regular and described wireless network of verification generates verification title and includes:
Using n character in described original title successively as front n the character in described verification title;
Check bit by the following cyclic check rule-based algorithm described verification title of calculating:
R n + k = ( Σ i = 1 n + k - 1 R i × 2 i - 1 ) % Q
Wherein, k ∈ 1...N, N are the quantity of check code in described check bit, and n is the string length of described original title, Rn+kFor kth check bit in described verification title, Q is the number of default available check code, and wherein, the number of described available check code is prime number.
6. flow as claimed in claim 3 uses abnormal detection method, it is characterised in that also include:
If the title of described wireless network is inconsistent with described verification title, then judge that the title of described wireless network is unsatisfactory for described default verification rule.
7. flow as claimed in claim 1 uses abnormal detection method, it is characterised in that also include:
Obtain described preset flow threshold value.
8. flow as claimed in claim 7 uses abnormal detection method, it is characterised in that described acquisition described preset flow threshold value includes:
The flow confidence interval of described terminal is obtained according to the confidence interval monitoring model pre-build;
The upper limit according to described flow confidence interval determines described preset flow threshold value.
9. the flow as described in any one of claim 1-8 uses abnormal detection method, it is characterised in that also include:
If it is determined that the flow of described terminal uses abnormal, then carry out Traffic Anomaly prompting or disconnect the connection of described wireless network.
10. a flow uses abnormal detection device, it is characterised in that including:
First acquisition module, for obtaining the title of the wireless network that terminal is accessed;
Correction verification module, for verifying the title of described wireless network, to judge the type of described wireless network;
Monitoring modular, when described wireless network changes class wireless network for mobile data, the flow being used described terminal is monitored;
Determination module, for when the flow that described terminal uses in Preset Time is more than preset flow threshold value, it is determined that the flow of described focus is used abnormal by described terminal.
11. flows as claimed in claim 10 use abnormal detection device, it is characterised in that described correction verification module specifically includes:
Judging unit, for judging whether the title of described wireless network meets the verification rule preset;
Identifying unit, for meeting described default verification rule when the title of described wireless network, it is determined that described wireless network is mobile data conversion class wireless network.
12. flows as claimed in claim 11 use abnormal detection device, it is characterised in that described judging unit specifically for:
From the title of described wireless network, the original title of described wireless network is extracted according to described default verification rule;
Verification title is generated by the described default original title verifying regular and described wireless network;
Judge that the title of described wireless network is the most consistent with described verification title;
If the title of described wireless network is consistent with described verification title, then judge that the title of described wireless network meets described default verification rule.
13. flows as claimed in claim 12 use abnormal detection device, it is characterised in that the described original title extracting described wireless network from the title of described wireless network according to described default verification rule includes:
The quantity of the check code that check bit comprises in the title of described wireless network and the position relationship of the original title of described check bit and described wireless network is determined according to described default verification rule;
Quantity according to described check code and described position relationship determine non-check code character string in the title of described wireless network, and using described non-check code character string as the original title of described wireless network.
14. flows as claimed in claim 12 use abnormal detection device, it is characterised in that the described original title by the described default regular and described wireless network of verification generates verification title and includes:
Using n character in described original title successively as front n the character in described verification title;
Check bit by the following cyclic check rule-based algorithm described verification title of calculating:
R n + k = ( Σ i = 1 n + k - 1 R i × 2 i - 1 ) % Q
Wherein, k ∈ 1...N, N are the quantity of check code in described check bit, and n is the string length of described original title, Rn+kFor kth check bit in described verification title, Q is the number of default available check code, and wherein, the number of described available check code is prime number.
15. flows as claimed in claim 12 use abnormal detection device, it is characterised in that described judging unit is additionally operable to
If the title of described wireless network is inconsistent with described verification title, then judge that the title of described wireless network is unsatisfactory for described default verification rule.
16. flows as claimed in claim 10 use abnormal detection device, it is characterised in that also include:
Second acquisition module, is used for obtaining described preset flow threshold value.
17. flows as claimed in claim 16 use abnormal detection device, it is characterised in that described second acquisition module specifically for:
The flow confidence interval of described terminal is obtained according to the confidence interval monitoring model pre-build;
The upper limit according to described flow confidence interval determines described preset flow threshold value.
18. flows as described in any one of claim 10-17 use abnormal detection device, it is characterised in that also include:
Control module, for when judging that the flow of described focus is used abnormal by described terminal, carries out Traffic Anomaly prompting or disconnects the connection of described wireless network.
19. 1 kinds of terminals, it is characterised in that include that the flow as described in any one of claim 10-18 uses abnormal detection device.
20. 1 kinds of wireless network type recognition methodss, it is characterised in that comprise the following steps:
Obtain the title of the wireless network that terminal is accessed;
Judge whether the title of described wireless network meets the verification rule preset;
If the title of described wireless network meets described default verification rule, then judge that described wireless network is as mobile data conversion class wireless network.
21. wireless network type recognition methodss as claimed in claim 20, it is characterised in that whether the described title judging described wireless network meets the verification rule preset includes:
From the title of described wireless network, the original title of described wireless network is extracted according to described default verification rule;
Verification title is generated by the described default original title verifying regular and described wireless network;
Judge that the title of described wireless network is the most consistent with described verification title;
If the title of described wireless network is consistent with described verification title, then judge that the title of described wireless network meets described default verification rule.
22. wireless network type recognition methodss as claimed in claim 21, it is characterised in that the described original title extracting described wireless network from the title of described wireless network according to described default verification rule includes:
The quantity of the check code that check bit comprises in the title of described wireless network and the position relationship of the original title of described check bit and described wireless network is determined according to described default verification rule;
Quantity according to described check code and described position relationship determine non-check code character string in the title of described wireless network, and using described non-check code character string as the original title of described wireless network.
23. wireless network type recognition methodss as claimed in claim 21, it is characterised in that the described original title by the described default regular and described wireless network of verification generates verification title and includes:
Using n character in described original title successively as front n the character in described verification title;
Check bit by the following cyclic check rule-based algorithm described verification title of calculating:
R n + k = ( Σ i = 1 n + k - 1 R i × 2 i - 1 ) % Q
Wherein, k ∈ 1...N, N are the quantity of check code in described check bit, and n is the string length of described original title, Rn+kFor kth check bit in described verification title, Q is the number of default available check code, and wherein, the number of described available check code is prime number.
24. wireless network type recognition methodss as claimed in claim 21, it is characterised in that also include:
If the title of described wireless network is inconsistent with described verification title, then judge that the title of described wireless network is unsatisfactory for described default verification rule.
The 25. wireless network type recognition methodss as described in any one of claim 20-24, it is characterised in that also include:
If the title of described wireless network is unsatisfactory for the verification rule preset, then judge that described wireless network changes class wireless network as non-moving data.
26. 1 kinds of wireless network type identification devices, it is characterised in that including:
Acquisition module, for obtaining the title of the wireless network that terminal is accessed;
Judge module, for judging whether the title of described wireless network meets the verification rule preset;
Determination module, for when the title of described wireless network meets described default verification rule, it is determined that described wireless network is mobile data conversion class wireless network.
27. wireless network type identification devices as claimed in claim 26, it is characterised in that described judge module includes:
Extraction unit, for extracting the original title of described wireless network from the title of described wireless network according to described default verification rule;
Signal generating unit, for generating verification title by the described default original title verifying regular and described wireless network;
Judging unit, for judging that the title of described wireless network is the most consistent with described verification title;
Identifying unit, if the title for described wireless network is consistent with described verification title, then judges that the title of described wireless network meets described default verification rule.
28. wireless network type identification devices as claimed in claim 27, it is characterised in that described wireless network type identification device as claimed in claim 27, it is characterised in that described be used for:
The quantity of the check code that check bit comprises in the title of described wireless network and the position relationship of the original title of described check bit and described wireless network is determined according to described default verification rule;
Quantity according to described check code and described position relationship determine non-check code character string in the title of described wireless network, and using described non-check code character string as the original title of described wireless network.
29. wireless network type identification devices as claimed in claim 27, it is characterised in that described signal generating unit specifically for:
Using n character in described original title successively as front n the character in described verification title;
Check bit by the following cyclic check rule-based algorithm described verification title of calculating:
R n + k = ( Σ i = 1 n + k - 1 R i × 2 i - 1 ) % Q
Wherein, k ∈ 1...N, N are the quantity of check code in described check bit, and n is the string length of described original title, Rn+kFor kth check bit in described verification title, Q is the number of default available check code, and wherein, the number of described available check code is prime number.
30. wireless network type identification devices as claimed in claim 27, it is characterised in that
Described identifying unit is additionally operable to when the title of described wireless network is inconsistent with described verification title, it is determined that the title of described wireless network is unsatisfactory for described default verification rule.
The 31. wireless network type identification devices as described in any one of claim 26-30, it is characterised in that
Determination module is additionally operable to when the title of described wireless network is unsatisfactory for the verification rule preset, it is determined that described wireless network is that non-moving data change class wireless network.
32. 1 kinds of terminals, it is characterised in that include the wireless network type identification device as described in any one of claim 26-31.
CN201510005250.9A 2015-01-06 2015-01-06 Flow uses abnormal detection method, wireless network type recognition methods and device Active CN105828352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510005250.9A CN105828352B (en) 2015-01-06 2015-01-06 Flow uses abnormal detection method, wireless network type recognition methods and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510005250.9A CN105828352B (en) 2015-01-06 2015-01-06 Flow uses abnormal detection method, wireless network type recognition methods and device

Publications (2)

Publication Number Publication Date
CN105828352A true CN105828352A (en) 2016-08-03
CN105828352B CN105828352B (en) 2019-11-15

Family

ID=56513854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510005250.9A Active CN105828352B (en) 2015-01-06 2015-01-06 Flow uses abnormal detection method, wireless network type recognition methods and device

Country Status (1)

Country Link
CN (1) CN105828352B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106332225A (en) * 2016-09-23 2017-01-11 依偎科技(南昌)有限公司 Method for freezing application based on WIFI and related device
CN107819592A (en) * 2017-10-31 2018-03-20 北京拓通信科技有限公司 A kind of three net mobile phone flows use monitoring system and monitoring method
CN108112031A (en) * 2016-11-24 2018-06-01 腾讯科技(深圳)有限公司 Network type determines method and device
CN108551429A (en) * 2018-04-23 2018-09-18 Oppo广东移动通信有限公司 Flow control methods, electronic device and the computer readable storage medium of application program
CN109557995A (en) * 2018-11-21 2019-04-02 Tcl移动通信科技(宁波)有限公司 A kind of application program interrupt control method, mobile terminal and storage medium
CN113692015A (en) * 2021-09-03 2021-11-23 四川英得赛克科技有限公司 Terminal equipment identification method and system for simultaneously accessing wired network and wireless network

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8195659B2 (en) * 2005-08-23 2012-06-05 Ricoh Co. Ltd. Integration and use of mixed media documents
CN102707789A (en) * 2012-04-28 2012-10-03 厦门市凌拓通信科技有限公司 Method for saving power for mobile data card based on traffic monitoring
CN103052066A (en) * 2013-01-05 2013-04-17 宋梁 Method for performing data exchanging or authorizing based on wireless hotspot identification names
CN103117906A (en) * 2013-02-27 2013-05-22 广东欧珀移动通信有限公司 Flow control method for process of sharing WiFi (wireless fidelity) hot spot for mobile terminals
CN103561470A (en) * 2013-10-22 2014-02-05 中国联合网络通信集团有限公司 Service operation control method and device
CN103813356A (en) * 2014-02-28 2014-05-21 宇龙计算机通信科技(深圳)有限公司 Flow management device and flow management method thereof
CN104253722A (en) * 2014-09-24 2014-12-31 百度在线网络技术(北京)有限公司 Dataflow monitoring method and dataflow monitoring device for remote mobile phone management

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8195659B2 (en) * 2005-08-23 2012-06-05 Ricoh Co. Ltd. Integration and use of mixed media documents
CN102707789A (en) * 2012-04-28 2012-10-03 厦门市凌拓通信科技有限公司 Method for saving power for mobile data card based on traffic monitoring
CN103052066A (en) * 2013-01-05 2013-04-17 宋梁 Method for performing data exchanging or authorizing based on wireless hotspot identification names
CN103117906A (en) * 2013-02-27 2013-05-22 广东欧珀移动通信有限公司 Flow control method for process of sharing WiFi (wireless fidelity) hot spot for mobile terminals
CN103561470A (en) * 2013-10-22 2014-02-05 中国联合网络通信集团有限公司 Service operation control method and device
CN103813356A (en) * 2014-02-28 2014-05-21 宇龙计算机通信科技(深圳)有限公司 Flow management device and flow management method thereof
CN104253722A (en) * 2014-09-24 2014-12-31 百度在线网络技术(北京)有限公司 Dataflow monitoring method and dataflow monitoring device for remote mobile phone management

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106332225A (en) * 2016-09-23 2017-01-11 依偎科技(南昌)有限公司 Method for freezing application based on WIFI and related device
CN108112031A (en) * 2016-11-24 2018-06-01 腾讯科技(深圳)有限公司 Network type determines method and device
CN108112031B (en) * 2016-11-24 2020-01-10 腾讯科技(深圳)有限公司 Network type determination method and device
CN107819592A (en) * 2017-10-31 2018-03-20 北京拓通信科技有限公司 A kind of three net mobile phone flows use monitoring system and monitoring method
CN107819592B (en) * 2017-10-31 2020-11-27 一拓通信集团股份有限公司 Three-network mobile phone flow use monitoring system and monitoring method
CN108551429A (en) * 2018-04-23 2018-09-18 Oppo广东移动通信有限公司 Flow control methods, electronic device and the computer readable storage medium of application program
CN109557995A (en) * 2018-11-21 2019-04-02 Tcl移动通信科技(宁波)有限公司 A kind of application program interrupt control method, mobile terminal and storage medium
CN113692015A (en) * 2021-09-03 2021-11-23 四川英得赛克科技有限公司 Terminal equipment identification method and system for simultaneously accessing wired network and wireless network

Also Published As

Publication number Publication date
CN105828352B (en) 2019-11-15

Similar Documents

Publication Publication Date Title
CN105828352A (en) Flow use abnormity detection method, wireless network type recognition method and device
CN110166462B (en) Access control method, system, electronic device and computer storage medium
US8140920B2 (en) Method and system for providing bit error rate characterization
CN103778044B (en) Method and device for diagnosing system faults
CN111578444A (en) Air conditioner fault prediction method and device, storage medium and air conditioner
US20220305934A1 (en) Charging station monitoring method and device
CN108255725B (en) Test method and device
CN107333292A (en) A kind of SIM card state judging method and device
CN101170447A (en) Service failure diagnosis system based on active probe and its method
CN104123496B (en) The hold-up interception method and device of a kind of rogue software, terminal
CN110798426A (en) Method and system for detecting flood DoS attack behavior and related components
CN112712902A (en) Infectious disease infection probability prediction method and device, storage medium, and electronic device
CN113191074B (en) Machine room power supply parameter detection method for data center
CN103713998A (en) Extensible online static code defect analytical method
AU2014350667B2 (en) System and method for localization and traffic density estimation via segmentation and calibration sampling
Zhang et al. Submodularity and optimality of fusion rules in balanced binary relay trees
CN112749410A (en) Database security protection method and device
CN110460593B (en) Network address identification method, device and medium for mobile traffic gateway
CN108307414A (en) Wi-Fi connection abnormality eliminating method, device, terminal and the storage medium of application program
Heydari et al. Quickest search and learning over correlated sequences: Theory and application
CN107517474B (en) Network analysis optimization method and device
CN108429659A (en) Remote failure monitoring method, device and the router of router
JP2007334589A (en) Decision tree construction method, equipment, and status determination equipment
CN111787490A (en) Pseudo base station track identification method, device, equipment and storage medium
CN106612278B (en) Data validity verification method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200925

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.