CN106453358A - MAC protocol realization method and device for adjusting working cycles based on energy states - Google Patents

MAC protocol realization method and device for adjusting working cycles based on energy states Download PDF

Info

Publication number
CN106453358A
CN106453358A CN201610943700.3A CN201610943700A CN106453358A CN 106453358 A CN106453358 A CN 106453358A CN 201610943700 A CN201610943700 A CN 201610943700A CN 106453358 A CN106453358 A CN 106453358A
Authority
CN
China
Prior art keywords
file
data
network
send
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610943700.3A
Other languages
Chinese (zh)
Inventor
黄旭
李森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN MWH INFORMATION SAFETY TECHNOLOGY Co Ltd
Original Assignee
SICHUAN MWH INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN MWH INFORMATION SAFETY TECHNOLOGY Co Ltd filed Critical SICHUAN MWH INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority to CN201610943700.3A priority Critical patent/CN106453358A/en
Publication of CN106453358A publication Critical patent/CN106453358A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/308Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content

Abstract

The invention discloses an MAC protocol realization method and device for adjusting working cycles based on energy states. The method comprises the steps that when polling is carried out each time, a sink node sends polling packets to all sensor nodes; wherein data in the polling packets comprises the number of the energy collection type sensor nodes, the number of battery power supply type sensor nodes and the residual energy of all sensor nodes before the polling is started this time; and after receiving the polling packets, the active senor nodes update sleep duration in own working cycles according to the polling packets. According to the MAC protocol realization method and device for adjusting the working cycles based on the energy states disclosed by the invention, the battery power supply type sensor nodes are enabled to integrally have relatively long sleep duration proportions, the energy collection type sensor nodes with relatively poor energy states are enabled to have relatively long sleep proportions, so the energy consumption of the whole network is balanced, the reliability of the network in the relatively long time is ensured, and the transmission performance is improved.

Description

A kind of method that monitoring QQ sends file data
Technical field
The present invention relates to field of information security technology, a kind of method sending file data particularly to monitoring QQ.
Background technology
With scientific and technological development, people are also increasing to the dependence of network, and secrets disclosed by net problem also displays therewith, Each major company:Various departments also have to the Internet Use to office worker and carry out management and control, prevent office worker from revealing some secret letters Breath.
Also there are a lot of network administration tool on the market at present, great majority are all to carry out management and control to computer, and need to be in computer Upper installation client, collects data is activation by client and realizes monitoring to monitoring client.This mode just necessarily has a lot of problems: 1:Client needs to install in every equipment to be monitored, and operation is excessively loaded down with trivial details;2:Client unloaded or disabling after just not Can be recurred supervisory function bit;3:Client is installed and itself is subject to the control of authority of operating system and protecting of antivirus software in systems After shield, it is unfavorable for the crawl 4 of data:Because client needs in running background, constantly sending data to server will necessarily make Power consumption increases it is clear that being inapplicable on the mobile apparatus.
QQ is a very fiery social tool, also often act as transmitting the instrument of file, but most management and control work Tool is not all monitored to QQ file transfer data, and this is also a breach in network management and control.
Content of the invention
The present invention is directed to the defect of prior art, there is provided a kind of method that monitoring QQ sends file data, can be effectively Solve the problems, such as above-mentioned prior art.
A kind of method that monitoring QQ sends file data, comprises the following steps:
S1:Network packet is obtained by network packet capturing mode, detailed step is as follows;
S11:Network data packet capturing, carries out packet crawl according to Wireshark;
S12:Protocol header is analyzed, and obtains protocol type and port, and protocol type is TCP, and port is 80 or 443;
S13:Network sends, and detailed step is as follows:
S131:Set up and connect, 443 or 80 ports are opened in user end to server application, and then server end beams back one ACK message notifying client request message receives, and client sends confirmation message again and confirms just now after receiving confirmation message The confirmation message that server end sends, completes to connect;
S132:Client basic parameter sends;After the completion of connection establishment, client can send multiple POST request, point Analyse this request bag and obtain http protocol information, content includes:The network type of transmission data is, send the QQ client release of data And send the length etc. of data segment, after request success, service end will respond, client then start to send data head and File data;
S2:Network data Packet analyzing, judges to send file data with the presence or absence of QQ in packet, comprises the following steps that:
S21:Monitor and scan network packet and whether there is file attribute packet header feature;The head of skew place value 0x00 Feature " 0xABCD9876 ", if existing, executes S22, if not existing, continues monitoring;
S22:Continuing to monitor downwards, if the single bag data continuously transmitting is more than 368 bytes, executing S23, if not depositing Then executing S21;
S23:Continue to monitor downwards, 4 byte lengths starting from 344 bytes are the total length of file data, afterwards ten Six bytes are other information data, start as file data section, the length of file data is POST information after 16 words knots The length of middle data segment deducts 368, preserves this segment file data execution S24;
S24:Continue to monitor downwards, circulation execution S132 to S23, until continuous POST request no longer occurs, complete to send out Send the splicing of file data, and splice the heavy length of data and then execute equal to the total length of the file data of record in data head S3, otherwise executes S21;
S3:Judge file type and change file suffixes name, its step is as follows:
S31:Open the file data of splicing;
S32:Judge that File header information identifies, the file being typically different type has different file headers, for example:.Jpg literary composition Part head is 0xFFD8FF;.png file header is 0x89PNG etc., just can determine that file type by file header;
S33:The file suffixes name of the file type after will confirm that is modified as the suffix name of respective file type;
S4:The file data extracting is carried out processing and presenting of respective file form.
Compared with prior art it is an advantage of the current invention that:The QQ software of mobile phone and computer can be monitored, effectively Prevent and follow the trail of and send the loss that internal confidential file brings, the information security of protection enterprise or national sector because of QQ.
Specific embodiment
For making the purpose of the present invention:Technical scheme and advantage become more apparent, by the following examples, the present invention is done into One step describes in detail.
A kind of method that monitoring QQ sends file data, comprises the following steps:
S1:Network packet is obtained by network packet capturing mode, detailed step is as follows;
S11:Network data packet capturing, carries out packet crawl according to Wireshark;
S12:Protocol header is analyzed, and obtains protocol type and port, and protocol type is TCP, and port is 80 or 443;
S13:Network sends, and detailed step is as follows:
S131:Set up and connect, 443 or 80 ports are opened in user end to server application(It is equal to 1 TCP report with SYN segment Literary composition), then server end beam back an ACK message notifying client request message and receive, after client receives confirmation message Send the confirmation message confirmation confirmation message that server end sends just now again, complete to connect;Namely do three-way handshake;Need It is to be noted that all can re-establish when sending file every time once connecting;
S132:Client basic parameter sends;After the completion of connection establishment, client can send multiple POST request, point Analyse this request bag and obtain http protocol information, content includes:The network type of transmission data is, send the QQ client release of data And send the length etc. of data segment, after request success, service end will respond, client then start to send data head and File data.
S2:Network data Packet analyzing, judges to send file data with the presence or absence of QQ in packet, comprises the following steps that:
S21:Monitor and scan network packet and whether there is file attribute packet header feature;The head of skew place value 0x00 Feature " 0xABCD9876 ", if existing, executes S22, if not existing, continues monitoring;
S22:Continuing to monitor downwards, if the single bag data continuously transmitting is more than 368 bytes, executing S23, if not depositing Then executing S21;
S23:Continue to monitor downwards, 4 byte lengths starting from 344 bytes are the total length of file data, afterwards ten Six bytes are other information data, start as file data section, the length of file data is POST information after 16 words knots The length of middle data segment deducts 368, preserves this segment file data execution S24
S24:Continue to monitor downwards, circulation execution S132 to S23, until continuous POST request no longer occurs, complete to send out Send the splicing of file data, and splice the heavy length of data and then execute equal to the total length of the file data of record in data head S3, otherwise executes S21;
S3:Judge file type and change file suffixes name, its step is as follows:
S31:Open the file data of splicing
S32:Judge that File header information identifies, the file being typically different type has different file headers, for example:.Jpg literary composition Part head is 0xFFD8FF;.png file header is 0x89PNG etc., just can determine that file type by file header;
S33:The file suffixes name of the file type after will confirm that is modified as the suffix name of respective file type;
S4:The file data extracting is carried out processing and presenting of respective file form.
Those of ordinary skill in the art will be appreciated that, embodiment described here is to aid in reader and understands this Bright implementation is it should be understood that protection scope of the present invention is not limited to such special statement and embodiment.Ability The those of ordinary skill in domain can according to these technology disclosed by the invention enlightenment make various without departing from the present invention essence its Its various concrete deformation and combination, these deformation and combination are still within the scope of the present invention.

Claims (1)

1. a kind of monitoring QQ sends the method for file data it is characterised in that comprising the following steps:
S1:Network packet is obtained by network packet capturing mode, detailed step is as follows;
S11:Network data packet capturing, carries out packet crawl according to Wireshark;
S12:Protocol header is analyzed, and obtains protocol type and port, and protocol type is TCP, and port is 80 or 443;
S13:Network sends, and detailed step is as follows:
S131:Set up and connect, 443 or 80 ports are opened in user end to server application, then server end beams back an ACK report Literary composition notifies client request message to receive, and client sends confirmation message again and confirms server just now after receiving confirmation message Hold the confirmation message sending, complete to connect;
S132:Client basic parameter sends;After the completion of connection establishment, client can send multiple POST request, and analysis should Request bag obtains http protocol information, and content includes:Send data network type, send data QQ client release and Send length of data segment etc., after request success, service end will respond, client then starts to send data head and file Data;
S2:Network data Packet analyzing, judges to send file data with the presence or absence of QQ in packet, comprises the following steps that:
S21:Monitor and scan network packet and whether there is file attribute packet header feature;The head feature of skew place value 0x00 " 0xABCD9876 ", if existing, executes S22, if not existing, continues monitoring;
S22:Continue to monitor downwards, if the single bag data continuously transmitting is more than 368 bytes, execute S23, if not existing, Execution S21;
S23:Continue to monitor downwards, 4 byte lengths starting from 344 bytes are the total length of file data, afterwards 16 Byte is other information data, starts as file data section after 16 words knots, and the length of file data is number in POST information Length according to section deducts 368, preserves this segment file data execution S24;
S24:Continue to monitor downwards, circulation execution S132 to S23, until continuous POST request no longer occurs, complete to send literary composition The splicing of number of packages evidence, and the heavy length of splicing data then executes S3 equal to the total length of the file data of record in data head, no Then execute S21;
S3:Judge file type and change file suffixes name, its step is as follows:
S31:Open the file data of splicing;
S32:Judge that File header information identifies, the file being typically different type has different file headers, for example:.Jpg file header For 0xFFD8FF;.png file header is 0x89PNG etc., just can determine that file type by file header;
S33:The file suffixes name of the file type after will confirm that is modified as the suffix name of respective file type;
S4:The file data extracting is carried out processing and presenting of respective file form.
CN201610943700.3A 2016-11-02 2016-11-02 MAC protocol realization method and device for adjusting working cycles based on energy states Pending CN106453358A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610943700.3A CN106453358A (en) 2016-11-02 2016-11-02 MAC protocol realization method and device for adjusting working cycles based on energy states

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610943700.3A CN106453358A (en) 2016-11-02 2016-11-02 MAC protocol realization method and device for adjusting working cycles based on energy states

Publications (1)

Publication Number Publication Date
CN106453358A true CN106453358A (en) 2017-02-22

Family

ID=58177610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610943700.3A Pending CN106453358A (en) 2016-11-02 2016-11-02 MAC protocol realization method and device for adjusting working cycles based on energy states

Country Status (1)

Country Link
CN (1) CN106453358A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109814765A (en) * 2017-11-22 2019-05-28 广州数鹏通科技有限公司 Meteorological image comparison method, device, computer equipment and storage medium
CN113542264A (en) * 2021-07-13 2021-10-22 杭州安恒信息技术股份有限公司 File transmission control method, device, equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100057903A1 (en) * 2006-07-19 2010-03-04 Chronicle Solutions (Uk) Limited Network monitoring by using packet header analysis
CN101783817A (en) * 2010-03-26 2010-07-21 西南科技大学 Web text reduction system and method
CN103139315A (en) * 2013-03-26 2013-06-05 烽火通信科技股份有限公司 Application layer protocol analysis method suitable for home gateway
CN104702454A (en) * 2013-12-04 2015-06-10 大连东浦机电有限公司 Method for monitoring risks of QQ transmitted data based on keyword extraction strategy
CN105227514A (en) * 2014-05-27 2016-01-06 北大方正集团有限公司 Based on document transmission processing method and the browser of browser

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100057903A1 (en) * 2006-07-19 2010-03-04 Chronicle Solutions (Uk) Limited Network monitoring by using packet header analysis
CN101783817A (en) * 2010-03-26 2010-07-21 西南科技大学 Web text reduction system and method
CN103139315A (en) * 2013-03-26 2013-06-05 烽火通信科技股份有限公司 Application layer protocol analysis method suitable for home gateway
CN104702454A (en) * 2013-12-04 2015-06-10 大连东浦机电有限公司 Method for monitoring risks of QQ transmitted data based on keyword extraction strategy
CN105227514A (en) * 2014-05-27 2016-01-06 北大方正集团有限公司 Based on document transmission processing method and the browser of browser

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109814765A (en) * 2017-11-22 2019-05-28 广州数鹏通科技有限公司 Meteorological image comparison method, device, computer equipment and storage medium
CN113542264A (en) * 2021-07-13 2021-10-22 杭州安恒信息技术股份有限公司 File transmission control method, device, equipment and readable storage medium
CN113542264B (en) * 2021-07-13 2022-08-26 杭州安恒信息技术股份有限公司 File transmission control method, device and equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US10432650B2 (en) System and method to protect a webserver against application exploits and attacks
CN103051633B (en) A kind of method and apparatus of defensive attack
CN104137513B (en) Attack prevention method and equipment
Udd et al. Exploiting bro for intrusion detection in a SCADA system
TWI294726B (en)
JP4827972B2 (en) Network monitoring device, network monitoring method, and network monitoring program
CA2526759A1 (en) Event monitoring and management
CN109922073A (en) Network security monitoring device, method and system
CN103166996B (en) HTTP connects and HTTPS connects self-adaptation method, Apparatus and system
TW201505411A (en) Method of interpreting a rule and a rule-interpreting apparatus for rule-based security apparatus
CN105516081A (en) Method and system for issuing safety strategy by server and message queue middleware
Shuaib et al. Resiliency of smart power meters to common security attacks
Farina et al. Understanding ddos attacks from mobile devices
JP4380710B2 (en) Traffic anomaly detection system, traffic information observation device, and traffic information observation program
CN101018233A (en) Session control method and control device
Huang et al. An authentication scheme to defend against UDP DrDoS attacks in 5G networks
CN106453358A (en) MAC protocol realization method and device for adjusting working cycles based on energy states
Darwish et al. Vulnerability Assessment and Experimentation of Smart Grid DNP3.
KR100758796B1 (en) Realtime service management system for enterprise and a method thereof
US11943250B2 (en) Test device
CN104660584A (en) Trojan virus analysis technique based on network conversation
CN116319028A (en) Rebound shell attack interception method and device
Leal et al. MQTT flow signatures for the Internet of things
Dalati et al. NGS: mitigating DDoS attacks using SDN-based network gate shield
JP2009169781A (en) Network quarantine system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 641000 Songshan South Road 253, Neijiang City, Sichuan Province

Applicant after: Sichuan Miwu Traceless Science and Technology Co., Ltd.

Address before: 641000 Songshan South Road 253, Neijiang City, Sichuan Province

Applicant before: SICHUAN MWH INFORMATION SAFETY TECHNOLOGY CO., LTD.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222

RJ01 Rejection of invention patent application after publication