CN107426053A - A kind of automation building method of packet load - Google Patents

A kind of automation building method of packet load Download PDF

Info

Publication number
CN107426053A
CN107426053A CN201710617545.0A CN201710617545A CN107426053A CN 107426053 A CN107426053 A CN 107426053A CN 201710617545 A CN201710617545 A CN 201710617545A CN 107426053 A CN107426053 A CN 107426053A
Authority
CN
China
Prior art keywords
feature configuration
feature
coverage
byte
packet load
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710617545.0A
Other languages
Chinese (zh)
Other versions
CN107426053B (en
Inventor
林康
罗鹰
张鑫阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kelai Network Technology Co.,Ltd.
Original Assignee
CHENGDU COLASOFT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU COLASOFT Co Ltd filed Critical CHENGDU COLASOFT Co Ltd
Priority to CN201710617545.0A priority Critical patent/CN107426053B/en
Publication of CN107426053A publication Critical patent/CN107426053A/en
Application granted granted Critical
Publication of CN107426053B publication Critical patent/CN107426053B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • H04L49/9057Arrangements for supporting packet reassembly or resequencing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • H04L49/9042Separate storage for different parts of the packet, e.g. header and payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Communication Control (AREA)

Abstract

The invention discloses a kind of automation building method of packet load.This method predefines feature configuration, including:Feature, deviant and depth.Initial coverage of each feature configuration in packet load is determined according to deviant and depth, and initial coverage is adjusted, finally the room after adjustment is filled.Flexibility of the present invention is high, can support the generation of multiple types of data bag, specific protocol, such as HTTP also can be supported easily after extension, relative to packet is manually constructed one by one, have higher efficiency, and not error-prone.

Description

A kind of automation building method of packet load
Technical field
The invention belongs to the automation building method in packet technology field, more particularly to a kind of packet load.
Background technology
When carrying out the test analysis of network security and Network Abnormal, it is often necessary to construct some and wrapped in packet load Packet containing certain content, while position to these features, form etc. may also require.Due in actual data packet Many unprintable binary systems are inside had, during these data of manual construction, it is easy to malfunction, and also it is inefficient.
Therefore, it is necessary to propose that one kind allows computer to be automatically performed packet and constructed by some simple configuration cans Scheme.
The content of the invention
To solve the above problems, the invention provides a kind of automation building method of packet load, including following step Suddenly:
Step 1:Predefine feature, the skew for each feature configuration that will be incorporated into same packet load Value and depth, initial coverage of each feature configuration in packet load is determined according to deviant and depth.
Step 2:Detect the initial coverage of each feature configuration whether have it is overlapping, in the event of overlapping, then basis Respective feature length changes respective coverage, makes it not overlapping.If modification failure, then it represents that feature configuration it Between it is incompatible, jump out this flow.After having monitored, step 3 is performed.
Step 3:Each feature configuration is subjected to ascending order row according to the deviant of the coverage after step 2 adjusts Row.
Step 4:Since the first place of data pack load, in the range of a last feature configuration initial coverage area, The feature of each feature configuration and deviant are sequentially covered in sequence, and to before last feature configuration not The position covered is filled.
Further, the amended coverage of feature configuration of two initial overlapped coverages should not weigh just It is folded.
Further, in step 2, each amended coverage length of feature configuration should just be characterized content Length.
Further, the mode of filling is artificial filling or filled by machine.
Beneficial effects of the present invention are:
1. flexibility is high, the generation of multiple types of data bag can be supported, specific protocol, such as HTTP can also be facilitated after extension Support on ground.
2. relative to packet is manually constructed one by one, there is higher efficiency, and it is not error-prone.
Brief description of the drawings
Fig. 1 is the method for the invention schematic flow sheet.
Embodiment
As shown in figure 1, the present invention comprises the following steps:
Step 1:Predefine feature, the skew for each feature configuration that will be incorporated into same packet load Amount and depth, determine the feature configuration of each packet load to be incorporated into packet load according to offset and depth Initial coverage.
The feature configuration of packet load includes the content of 3 aspects, respectively feature, deviant, depth.
Feature is usually character string or binary system, and it occupies one section of fixed length in packet.
Deviant refers to the original position range data bag load starting of the feature covering of feature configuration(0th byte)'s Offset.Deviant minimum 0, default value 0.Represent that the feature of feature configuration covers start bit if deviant is 1 Put be data pack load the 1st byte.
Depth refers to the byte length that feature configuration occupies in data pack load, and the length calculates since deviant.Such as Depth is 5, then it represents that feature configuration occupies 5 bytes.Depth value is up to 65535, default value 65535.
The initial coverage can be expressed as with section(Deviant, deviant+depth value), i.e., since deviant (Comprising), terminate to deviant+depth value(Do not include).The deviant of the byte of packet the 0th is that the deviant of the 0, the 1st byte is The deviant of 1, the 2nd byte is 2.......Such as, the initial coverage of feature configuration is (1,5), feature length Spend for 3, its initial coverage is the 1st byte to the 4th byte of packet, and feature can be two kinds in packet load Mode is configured, be respectively configured from the 1st byte of packet load to the 3rd byte, the 2nd word from packet load Save to the 4th byte and configured.
Step 2:Detect the initial coverage of each feature configuration whether have it is overlapping, in the event of overlapping, then basis Respective feature length changes respective coverage, makes it not overlapping;If modification failure, then it represents that feature configuration it Between it is incompatible, jump out this flow;After having monitored, step 3 is performed;
Preferably, the amended coverage of feature configuration of two initial overlapped coverages should be just not overlapping.It is each The amended coverage length of feature configuration should just be characterized the length of content, and ensure what feature can identify Meanwhile data package size is reduced as far as possible, it is more convenient to be subsequently extended.
Step 3:Each feature configuration is subjected to ascending order row according to the deviant of the coverage after step 2 adjusts Row;
Step 4:Since the first place of data pack load, in the range of a last feature configuration initial coverage area, according to Order is sequentially covered the feature of each feature configuration and deviant, and to not covered before last feature configuration To position be filled.
The mode of filling is artificial or by configuring the Filling power for allowing machine to fill needs.For example directly filled out used Fill, data are directly set to 0.
The above method is described in detail with specific example below.
It is assumed that be loaded packet everybody sequentially for the 0th byte, the 1st byte, the 2nd byte, the 3rd byte, the 4th byte, 5th byte, the 6th byte, the 7th byte, the 8th byte, the 9th byte, the 10th byte, the 11st byte.
Such as there are so tri- characteristic values of A, B, C:
It is assumed that A, initial coverage are(0,2), i.e., initial coverage is the 0th byte to the 1st byte, and feature length is 2。
It is assumed that the initial coverages of B are (4,10), i.e., initial coverage is the 4th byte to the 9th byte, and feature is grown Spend for 3.
It is assumed that the initial coverages of C are(5,11), i.e., initial coverage is the 5th byte to the 10th byte, feature Length is 3.
Then A, B, C total initial coverage is since the 0th byte of packet load, is terminated to the 11st byte, is needed A, B, C are reasonably configured in the range of this.A, B initial coverage is non-overlapping, without being adjusted to A, And between A, B have can fill area.B, C initial coverage is overlapping, it is necessary to according to feature to the 9th byte in the 5th byte The respective initial coverage of length adjustment, make both just non-overlapping.
A is adjusted(0,2), the filling block between A, B is the 2nd byte to the 3rd byte;
It is after B adjustment(4,7), i.e. coverage is the 4th byte to the 6th byte.It is after C adjustment(7,10), without filling between B, C For block to be empty, the filling block after C is the 10th byte to the 11st byte.
Certainly, if first feature configuration A has the offset more than 0, also need to since the 0th byte to A Byte before is filled.As A is(1,3), length 2, initial coverage is the 1st byte to the 2nd byte;This explanation needs To be filled to the 0th byte.

Claims (4)

1. the automation building method of a kind of packet load, it is characterised in that comprise the following steps:
Step 1:Predefine feature, the skew for each feature configuration that will be incorporated into same packet load Value and depth, initial coverage of each feature configuration in packet load is determined according to deviant and depth;
Step 2:Detect the initial coverage of each feature configuration whether have it is overlapping, in the event of overlapping, then according to each Feature length change respective coverage, make it not overlapping;If modification failure, then it represents that between feature configuration not Compatibility, jump out this flow;After having monitored, step 3 is performed;
Step 3:Each feature configuration is subjected to ascending order arrangement according to the deviant of the coverage after step 2 adjusts;
Step 4:Since the first place of data pack load, in the range of a last feature configuration initial coverage area, according to Order is sequentially covered the feature of each feature configuration and deviant, and to not covered before last feature configuration To position be filled.
2. the automation building method of packet load as claimed in claim 1, it is characterised in that in step 2, at the beginning of two The amended coverage of feature configuration of beginning overlapped coverage should be just not overlapping.
3. the automation building method of packet load as claimed in claim 1 or 2, it is characterised in that each in step 2 The amended coverage length of feature configuration should just be characterized the length of content.
4. the automation building method of packet load as claimed in claim 1, it is characterised in that the mode of filling is artificial Filling is filled by machine.
CN201710617545.0A 2017-07-26 2017-07-26 Automatic construction method for data packet load Active CN107426053B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710617545.0A CN107426053B (en) 2017-07-26 2017-07-26 Automatic construction method for data packet load

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710617545.0A CN107426053B (en) 2017-07-26 2017-07-26 Automatic construction method for data packet load

Publications (2)

Publication Number Publication Date
CN107426053A true CN107426053A (en) 2017-12-01
CN107426053B CN107426053B (en) 2021-01-05

Family

ID=60431251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710617545.0A Active CN107426053B (en) 2017-07-26 2017-07-26 Automatic construction method for data packet load

Country Status (1)

Country Link
CN (1) CN107426053B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854648A (en) * 2010-04-14 2010-10-06 华为技术有限公司 Testing method, device and testing system for single board of communication apparatus
CN103414701A (en) * 2013-07-25 2013-11-27 华为技术有限公司 Rule matching method and device
CN103428215A (en) * 2013-08-12 2013-12-04 广东电网公司电力调度控制中心 Method and system for generating attack traffic of data network
CN103746885A (en) * 2014-01-28 2014-04-23 中国人民解放军信息安全测评认证中心 Test system and test method oriented to next-generation firewall
CN104219221A (en) * 2014-05-30 2014-12-17 郭瑞 Network security flow generating method and network security flow generating system
CN104506484A (en) * 2014-11-11 2015-04-08 中国电子科技集团公司第三十研究所 Proprietary protocol analysis and identification method
CN106209830A (en) * 2016-07-08 2016-12-07 中国人民解放军国防科学技术大学 A kind of message building method represented based on XML procotol
US20170013009A1 (en) * 2015-07-07 2017-01-12 University Of Science And Technology Beijing Test method and system for plc security defense device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854648A (en) * 2010-04-14 2010-10-06 华为技术有限公司 Testing method, device and testing system for single board of communication apparatus
CN103414701A (en) * 2013-07-25 2013-11-27 华为技术有限公司 Rule matching method and device
CN103428215A (en) * 2013-08-12 2013-12-04 广东电网公司电力调度控制中心 Method and system for generating attack traffic of data network
CN103746885A (en) * 2014-01-28 2014-04-23 中国人民解放军信息安全测评认证中心 Test system and test method oriented to next-generation firewall
CN104219221A (en) * 2014-05-30 2014-12-17 郭瑞 Network security flow generating method and network security flow generating system
CN104506484A (en) * 2014-11-11 2015-04-08 中国电子科技集团公司第三十研究所 Proprietary protocol analysis and identification method
US20170013009A1 (en) * 2015-07-07 2017-01-12 University Of Science And Technology Beijing Test method and system for plc security defense device
CN106209830A (en) * 2016-07-08 2016-12-07 中国人民解放军国防科学技术大学 A kind of message building method represented based on XML procotol

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
TYM8865: "Linux内核学习笔记——ip报文组装", 《CSDN博客,BLOG.CSDN.NET/OPENS_TYM/ARTICLE/DETAILS/17658569》 *
张瀚: "基于DPI技术的P2P流量检测系统设计", 《中国优秀硕士论文全文数据库》 *

Also Published As

Publication number Publication date
CN107426053B (en) 2021-01-05

Similar Documents

Publication Publication Date Title
CN103634165B (en) Method, terminal device and system for realizing network testing based on reverse proxy
EP2618544B1 (en) Ethernet communication system and method based on mmc/sd interface
CN101902440B (en) Method and device for blocking TCP connection
CN102983939B (en) A kind of upstream data communication method for spacecraft multilevel subnetwork
CN105025056A (en) Internet of Things information collection and monitoring system design method
CN105137755B (en) A kind of adaptive distribution method of unmanned plane task load
CN103259936A (en) Operating system upgrade method for mobile terminal and operating system upgrade device of operating system upgrade method
CN106161256A (en) A kind of processing method and processing device of Border Gateway Protocol (BGP) route
CN110752966A (en) Network protocol security test method and device, electronic equipment and storage medium
CN105847101A (en) Data transmission method based on vehicle bus
CN101826997A (en) Communication method of newly accessed intelligent equipment, device and monitoring system
CN107800814A (en) Virtual machine deployment method and device
CN106470227B (en) A kind of configuration method and device of OTA upgrade package
CN104506943A (en) Set top box software customized upgrading method
CN103297311A (en) Method and device for achieving control and provision for wireless access point protocol (CAPWAP) data tunnels
CN107426053A (en) A kind of automation building method of packet load
CN104683130B (en) A kind of method and apparatus of configuring stacking port
CN103139247B (en) The keepalive method of back-end server, system and device in SiteServer LBS
CN103702354A (en) Base station engineering parameter collection and analysis method
CN101697546B (en) Method for implementing protocol data unit (PDU) used for packing and unpacking network bytes
CN107666401A (en) A kind of configuration information obtaining method and terminal
CN206962836U (en) Intelligent commodity shelf Communication topology and intelligent commodity shelf based on CAN
CN102487398B (en) Multi link point to point protocol (MLPP) dynamically binding method and system
CN105827461A (en) Method for upgrading power line carrier communication module
CN112887277B (en) Conversion method and device of field bus and Ethernet and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 610041 No. 06, floor 15, unit 2, building 1, No. 28, north section of Tianfu Avenue, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan

Patentee after: Chengdu Shumo Technology Co.,Ltd.

Address before: 13 / F and 14 / F, unit 1, building 4, No. 966, north section of Tianfu Avenue, high tech Zone, Chengdu, Sichuan 610041

Patentee before: COLASOFT Co.,Ltd.

CP03 Change of name, title or address
TR01 Transfer of patent right

Effective date of registration: 20220321

Address after: 610041 12th, 13th and 14th floors, unit 1, building 4, No. 966, north section of Tianfu Avenue, high tech Zone, Chengdu, Sichuan

Patentee after: Kelai Network Technology Co.,Ltd.

Address before: 610041 No. 06, floor 15, unit 2, building 1, No. 28, north section of Tianfu Avenue, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan

Patentee before: Chengdu Shumo Technology Co.,Ltd.

TR01 Transfer of patent right