CN107480179B - Detection method and device and electronic equipment - Google Patents

Detection method and device and electronic equipment Download PDF

Info

Publication number
CN107480179B
CN107480179B CN201710536609.4A CN201710536609A CN107480179B CN 107480179 B CN107480179 B CN 107480179B CN 201710536609 A CN201710536609 A CN 201710536609A CN 107480179 B CN107480179 B CN 107480179B
Authority
CN
China
Prior art keywords
similarity
direct connection
mode
calculating
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710536609.4A
Other languages
Chinese (zh)
Other versions
CN107480179A (en
Inventor
唐智翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710536609.4A priority Critical patent/CN107480179B/en
Publication of CN107480179A publication Critical patent/CN107480179A/en
Application granted granted Critical
Publication of CN107480179B publication Critical patent/CN107480179B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Abstract

The embodiment of the specification provides a detection method, a detection device and electronic equipment, wherein a request information set of a target webpage is obtained, and a request is sent for at least 3 times according to the request information set; wherein, at least 2 times of the request sending mode are direct connection mode, and at least 1 time is proxy mode; after at least 3 returned response information sets are received, calculating first similarity between response information sets in a direct connection mode and calculating second similarity between response information sets in the direct connection mode and a response information set in a proxy mode; finally, the detection result can be determined according to the first similarity and the second similarity.

Description

Detection method and device and electronic equipment
Technical Field
The embodiment of the specification relates to the technical field of internet, in particular to a detection method and device and electronic equipment.
Background
In practical applications, many web pages use a proxy server to improve user access efficiency. In the process of web page development or operation, if the response result returned by the network request is inconsistent with the expectation, whether the proxy server has a problem needs to be determined. Generally, the judgment can be made by comparing whether the response results returned after sending the same request by using the proxy mode and the direct connection mode are consistent. In practice, however, many response results contain varying information, so that even the same request may have different response results.
There is a need to provide a more accurate solution to determining if there is a problem with a proxy server.
Disclosure of Invention
The embodiment of the specification provides a detection method and device and an electronic device:
according to the detection method provided by the embodiment of the specification, the method comprises the following steps:
acquiring a request information set of a target webpage;
sending at least 3 requests according to the request information set; wherein, at least 2 times of the request sending mode are direct connection mode, and at least 1 time is proxy mode;
receiving at least 3 returned response information sets;
calculating a first similarity between response information sets in a direct connection mode;
calculating a second similarity between the response information sets in the direct connection mode and the proxy mode;
and determining a detection result according to the first similarity and the second similarity.
According to an embodiment of the present specification, there is provided a detection apparatus, including:
the acquisition unit is used for acquiring a request information set of a target webpage;
the sending unit sends at least 3 requests according to the request information set; wherein, at least 2 times of the request sending mode are direct connection mode, and at least 1 time is proxy mode;
the receiving unit is used for receiving the returned at least 3 response information sets;
the first calculating unit is used for calculating first similarity between response information sets in a direct connection mode;
the second calculation unit is used for calculating a second similarity between the response information sets in the direct connection mode and the proxy mode;
and the determining unit is used for determining the detection result according to the first similarity and the second similarity.
According to this specification embodiment, provide an electronic equipment, include:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring a request information set of a target webpage;
sending at least 3 requests according to the request information set; wherein, at least 2 times of the request sending mode are direct connection mode, and at least 1 time is proxy mode;
receiving at least 3 returned response information sets;
calculating a first similarity between response information sets in a direct connection mode;
calculating a second similarity between the response information sets in the direct connection mode and the proxy mode;
and determining a detection result according to the first similarity and the second similarity.
In the embodiment of the present specification, a first similarity of a response information set in a direct connection manner is calculated, and the first similarity may be regarded as a randomness of change information in a response result in the same request; calculating a second similarity of the response information set in the direct connection mode and the proxy mode, wherein the second similarity can be regarded as a difference between the direct connection mode and the proxy mode in the same request; based on the random degree, the difference generated by the change information in the response result in the direct connection mode and the proxy mode can be eliminated, and whether the response results of the direct connection mode and the proxy mode are consistent or not is judged.
Drawings
FIG. 1 is a block diagram of a system for implementing detection provided in an embodiment of the present disclosure;
FIG. 2 is a flow chart of a detection method provided in an embodiment of the present disclosure;
FIG. 3 is a diagram illustrating a method for calculating similarity between strings according to an embodiment of the present disclosure;
fig. 4 is a schematic block diagram of a detection apparatus according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the specification, as detailed in the appended claims.
The terminology used in the description herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present specification. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
As described above, determining whether the proxy server has a problem may be determined by comparing whether response results returned after sending the same request in the proxy mode and the direct connection mode are consistent, that is, sending the same request to the same website 2 times, once in the direct connection mode and once in the proxy mode.
The direct connection mode may be that the client directly communicates with the web server without passing through the proxy server, and directly sends a request to the web server.
The proxy mode may be that the client communicates with the web server through the proxy server, which may be understood as that the client sends a request to the proxy server, and the proxy server forwards the request to the web server.
In practice, however, many response results may contain changed information, for example, the response results may contain json with tagging requests of random numbers, and recommendation information with randomness (e.g., the paibao recommendation information shows some recommended commodity information each time the user opens the paibao top page, and these commodity information are often random, so the recommended commodity information shown each time may be different). So that different response results occur even for the same request.
Fig. 1 is a system architecture diagram for implementing detection provided in an embodiment of the present specification. In this embodiment, the system may include a client 11, a proxy server 12, and a web server 13.
The client 11 may be a terminal installed with test software.
The proxy server 12 may provide proxy services for the web server 13.
The web server 13 may provide services to users who access the web site.
Generally, a user can access various websites in a network through a client 11, and if the websites are deployed with a proxy server, the access path is shown as 101 in fig. 1;
if the website does not deploy a proxy server, or the client disables a proxy server, the access path is shown as 102 in FIG. 1.
An embodiment of a method for implementing detection according to the present disclosure is described below with reference to an example shown in fig. 2, where the method may include the following steps:
step 210: and acquiring a request information set of the target webpage.
In this embodiment, request information on a target webpage may be acquired by simulating a browser environment, and a plurality of request information may form a request information set.
The target web page may be a web page using a proxy server.
It is worth mentioning that, in order to improve the detection accuracy, the request information set includes all the request information of the target web page.
Step 220: sending a request for at least 3 times according to the request information set; wherein, at least 2 times of the request sending mode are direct connection mode, and at least 1 time is proxy mode.
And sending each piece of request information of the request information set for at least 3 times.
It is worth mentioning that in order to improve the detection accuracy, the sending of at least 3 requests may be simultaneous.
Taking sending 3 requests as an example, assume that the request information of the target website includes: request 1, request 2, request 3; acquiring a request information set { request 1, request 2, request 3 };
sending a request 1, a request 2 and a request 3 to a target website server in a direct connection mode;
sending a request 1, a request 2 and a request 3 to a target website server in a direct connection mode;
sending a request 1, a request 2 and a request 3 to a proxy server of a target website in a proxy mode;
as described above, in order to improve the detection accuracy, the 3 transmissions may be performed simultaneously.
Step 230: at least 3 sets of response information returned are received.
Generally, each time a client sends a request message, the client receives a response message.
Therefore, the client receives at least 3 sets of response information returned.
Following the example in the previous step, typically, a request will correspond to a response;
the client will receive the returned 3 sets of response information, namely:
the returned response information set { response 1, response 2, response 3} in the direct connection mode;
the response information set { response 1, response 2, response 3} returned in another direct connection mode;
the response information set { response 1, response 2, response 3} returned under the proxy mode;
here, response 1 is response information of request 1, response 2 is response information of request 2, and response 3 is response information of request 3.
Step 240: and calculating first similarity between response information sets in a direct connection mode.
And calculating a first similarity of the response information set in the direct connection mode, wherein the first similarity can be regarded as the randomness of the change information in the response result under the same request.
Specifically, the step 240 may include the following steps:
converting the response information sets in at least 2 direct connection modes into character strings;
and calculating the first similarity of the character strings in any 2 direct connection modes.
If the character strings with the length of 100 are completely the same, the similarity is 100 percent; if a character of 1 bit is different and other characters of 99 bits are the same, the similarity is 99%.
By way of example only, it is possible to illustrate,
the response information set in the direct connection mode is assumed to be {10101, 01010 }; conversion to string is then string 1: 1010101010, respectively;
the response information set in the other direct connection mode is {11100, 11010 }; conversion to string is then string 2: 1110011010 (binary numbers are used for convenience of description in this example, and any character may be used in practice);
as shown in fig. 3, 2 strings are traversed, the 1 st bit characters are the same, the 2 nd bit characters are different, the 3 rd bit characters are the same, the 4 th bit characters are the same, the 5 th bit characters are different, the 6 th bit characters are different, the 7 th bit characters are the same, the 8 th bit characters are the same, the 9 th bit characters are the same, and the 10 th bit characters are the same. Since the number of identical character bits is 7 divided by the character string length 10, the similarity can be found to be 70%.
In this embodiment, the similarity calculation may be implemented by a Levenshtein Distance algorithm or a Simhash algorithm. The Levenshtein Distance algorithm or the Simhash algorithm can be used for calculating the similarity of two character strings, and the calculation efficiency is high.
Step 250: and calculating a second similarity between the response information sets in the direct connection mode and the proxy mode.
And calculating a second similarity of the response information sets in the direct connection mode and the proxy mode, wherein the second similarity can be regarded as a difference between the direct connection mode and the proxy mode in the same request.
Specifically, the step 250 may include the following steps:
converting the response information sets in at least 1 direct connection mode and at least 1 agent mode into character strings;
and calculating the second similarity of the character strings of any 1 agent mode and any 1 direct connection mode.
Similar to the previous step 240, the second similarity calculation may also be implemented by a Levenshtein Distance algorithm or a Simhash algorithm. For details, reference may be made to step 230, which is not described herein again.
Step 260: and determining a detection result according to the first similarity and the second similarity.
Based on the random degree, the difference generated by the change information in the response result in the direct connection mode and the proxy mode can be eliminated, and whether the response results of the direct connection mode and the proxy mode are consistent or not is judged.
Specifically, the step 260 may include the following steps:
calculating a difference value between the first similarity and the second similarity;
judging whether the absolute value of the difference value exceeds a threshold value;
and under the condition that the absolute value of the difference exceeds a threshold value, determining that the detection result is that the proxy server has a problem.
And under the condition that the absolute value of the difference value does not exceed the threshold value, determining that the detection result indicates that the proxy server has no problem.
In this embodiment, calculating the difference between the first similarity and the second similarity may be considered to eliminate a difference caused by part of change information in response results in the direct connection mode and the proxy mode; that is, the absolute value of the difference is different between the direct connection mode and the proxy mode.
If the response information returned by the direct connection mode and the proxy mode is completely the same, the absolute value of the difference value is certainly 0. Therefore, the threshold value may also be 0;
in practical application, some non-semantic data may exist in the response information, which may cause that even though the response information has the same semantic part, the non-semantic part still has difference; however, such a request is allowed, and it is not different between the response information in the direct connection mode and the response information in the proxy mode; therefore, it is desirable to allow for a range of differences, i.e., the threshold may be greater than 0.
For the case where the threshold is greater than 0:
the threshold value can be preset manually;
with the continuous development of computer technology, especially the progress of artificial intelligence, the threshold value can also be calculated through machine learning. For example, based on the threshold value in the historical detection, an optimal threshold value can be calculated by a machine learning algorithm.
Still further, the threshold may be calculated based on big data techniques. For example, when it is found that most of the detection proxy servers have problems through mass data, the set threshold is 5%, and it may be determined that the threshold may also be set to 5% in the detection process.
The smaller the threshold value is, the stricter the detection standard is;
when the absolute value of the difference value does not exceed the threshold value, the response results in the direct connection mode and the proxy mode are consistent, and the proxy server is proved to have no problem;
when the absolute value of the difference exceeds the threshold, the response results in the direct connection mode and the proxy mode are not consistent, and the fact that the proxy server has problems is indicated.
Through the embodiment of the specification, the first similarity of the response information set in the direct connection mode is calculated, and the first similarity can be regarded as the randomness of the change information in the response result under the same request; calculating a second similarity of the response information set in the direct connection mode and the proxy mode, wherein the second similarity can be regarded as a difference between the direct connection mode and the proxy mode in the same request; based on the random degree, the difference generated by the change information in the response result in the direct connection mode and the proxy mode can be eliminated, and whether the response results of the direct connection mode and the proxy mode are consistent or not is judged.
Corresponding to the embodiment of the detection method described in the foregoing fig. 2, the present specification also provides an embodiment of a detection apparatus. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. The software implementation is taken as an example, and is formed by reading corresponding computer program instructions in the nonvolatile memory into the memory for operation through the processor of the device where the software implementation is located as a logical means. In terms of hardware, a hardware structure of the apparatus in which the detection device is located in this specification may include a processor, a network interface, a memory, and a nonvolatile memory, and the apparatus in which the detection device is located in the embodiment may also include other hardware according to the actual detection function, which is not described herein again.
Referring to fig. 4, a block diagram of a detection apparatus provided for one embodiment of the present disclosure, the apparatus includes:
an obtaining unit 310, which obtains a request information set of a target webpage;
a sending unit 320, sending at least 3 requests according to the request information set; wherein, at least 2 times of the request sending mode are direct connection mode, and at least 1 time is proxy mode;
a receiving unit 330, which receives the returned at least 3 response information sets;
the first calculating unit 340 is used for calculating a first similarity between response information sets in a direct connection mode;
the second calculating unit 350 calculates a second similarity between the response information sets in the direct connection mode and the proxy mode;
the determining unit 360 determines a detection result according to the first similarity and the second similarity.
In an alternative embodiment:
the first calculating unit 340 specifically includes:
the conversion subunit converts the response information sets in at least 2 direct connection modes into character strings;
and the calculating subunit calculates the first similarity of the character strings in any 2 direct connection modes.
In an alternative embodiment:
the second calculating unit 350 specifically includes:
the conversion subunit converts the response information sets in at least 1 direct connection mode and at least 1 proxy mode into character strings;
and the calculation subunit calculates the second similarity of the character strings of any 1 agent mode and any 1 direct connection mode.
In an alternative embodiment:
the determining unit 360 specifically includes:
a calculating subunit that calculates a difference between the first similarity and the second similarity;
a judgment subunit for judging whether the difference exceeds a threshold value;
and the determining subunit determines that the detection result is that the proxy server has a problem under the condition that the difference exceeds the threshold value.
In an alternative embodiment:
the request information set comprises all request information of the target webpage.
In an alternative embodiment:
the sending of at least 3 requests is simultaneous.
In an alternative embodiment:
the similarity calculation is realized by a Levenshtein Distance algorithm or a Simhash algorithm.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in the specification. One of ordinary skill in the art can understand and implement it without inventive effort.
Fig. 4 above describes the internal functional modules and the structural schematic of the detection apparatus, and the substantial execution subject may be an electronic device, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring a request information set of a target webpage;
sending at least 3 requests according to the request information set; wherein, at least 2 times of the request sending mode are direct connection mode, and at least 1 time is proxy mode;
receiving at least 3 returned response information sets;
calculating a first similarity between response information sets in a direct connection mode;
calculating a second similarity between the response information sets in the direct connection mode and the proxy mode;
and determining a detection result according to the first similarity and the second similarity.
In the above embodiments of the electronic device, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. The general-purpose processor may be a microprocessor, or the processor may be any conventional processor, and the aforementioned memory may be a read-only memory (ROM), a Random Access Memory (RAM), a flash memory, a hard disk, or a solid state disk. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the embodiment of the electronic device, since it is substantially similar to the embodiment of the method, the description is simple, and for the relevant points, reference may be made to part of the description of the embodiment of the method.
Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This specification is intended to cover any variations, uses, or adaptations of the specification following, in general, the principles of the specification and including such departures from the present disclosure as come within known or customary practice within the art to which the specification pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the specification being indicated by the following claims.
It will be understood that the present description is not limited to the precise arrangements described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present description is limited only by the appended claims.

Claims (15)

1. A method of detection, the method comprising:
acquiring a request information set of a target webpage;
sending at least 3 requests according to the request information set; wherein, at least 2 times of the transmitted request are transmitted in a direct connection mode, and at least 1 time of the transmitted request is transmitted in a proxy mode;
receiving at least 3 returned response information sets;
calculating a first similarity between response information sets in a direct connection mode;
calculating a second similarity between the response information sets in the direct connection mode and the proxy mode;
and determining a detection result according to the first similarity and the second similarity.
2. The method according to claim 1, wherein the calculating a first similarity between response information sets in a direct connection manner specifically includes:
converting the response information sets in at least 2 direct connection modes into character strings;
and calculating the first similarity of the character strings in any 2 direct connection modes.
3. The method according to claim 1, wherein the calculating of the second similarity between the response information sets in the direct connection mode and the proxy mode specifically includes:
converting the response information sets in at least 1 direct connection mode and at least 1 agent mode into character strings;
and calculating the second similarity of the character strings of any 1 agent mode and any 1 direct connection mode.
4. The method according to claim 1, wherein determining the detection result according to the first similarity and the second similarity specifically includes:
calculating a difference value between the first similarity and the second similarity;
judging whether the absolute value of the difference value exceeds a threshold value;
and under the condition that the absolute value of the difference exceeds a threshold value, determining that the detection result is that the proxy server has a problem.
5. The method of claim 1, the set of request information comprising all request information for the target web page.
6. The method of claim 1, the sending at least 3 requests being sent simultaneously.
7. The method according to claim 2 or 3, wherein the similarity calculation is implemented by a Levenshtein Distance algorithm or a Simhash algorithm.
8. A detection apparatus, the apparatus comprising:
the acquisition unit is used for acquiring a request information set of a target webpage;
the sending unit sends at least 3 requests according to the request information set; wherein, at least 2 times of the transmitted request are transmitted in a direct connection mode, and at least 1 time of the transmitted request is transmitted in a proxy mode;
the receiving unit is used for receiving the returned at least 3 response information sets;
the first calculating unit is used for calculating first similarity between response information sets in a direct connection mode;
the second calculation unit is used for calculating a second similarity between the response information sets in the direct connection mode and the proxy mode;
and the determining unit is used for determining the detection result according to the first similarity and the second similarity.
9. The apparatus according to claim 8, wherein the first computing unit specifically includes:
the conversion subunit converts the response information sets in at least 2 direct connection modes into character strings;
and the calculating subunit calculates the first similarity of the character strings in any 2 direct connection modes.
10. The apparatus according to claim 8, wherein the second computing unit specifically includes:
the conversion subunit converts the response information sets in at least 1 direct connection mode and at least 1 proxy mode into character strings;
and the calculation subunit calculates the second similarity of the character strings of any 1 agent mode and any 1 direct connection mode.
11. The apparatus according to claim 8, wherein the determining unit specifically includes:
a calculating subunit that calculates a difference between the first similarity and the second similarity;
a judgment subunit that judges whether the absolute value of the difference exceeds a threshold;
and the determining subunit determines that the detection result is that the proxy server has a problem when the absolute value of the difference exceeds a threshold value.
12. The apparatus of claim 8, the set of request information comprising all request information for the target web page.
13. The apparatus of claim 8, the sending at least 3 requests is sending at the same time.
14. The apparatus according to claim 9 or 10, wherein the similarity calculation is implemented by a Levenshtein Distance algorithm or a Simhash algorithm.
15. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring a request information set of a target webpage;
sending at least 3 requests according to the request information set; wherein, at least 2 times of the transmitted request are transmitted in a direct connection mode, and at least 1 time of the transmitted request is transmitted in a proxy mode;
receiving at least 3 returned response information sets;
calculating a first similarity between response information sets in a direct connection mode;
calculating a second similarity between the response information sets in the direct connection mode and the proxy mode;
and determining a detection result according to the first similarity and the second similarity.
CN201710536609.4A 2017-07-04 2017-07-04 Detection method and device and electronic equipment Active CN107480179B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710536609.4A CN107480179B (en) 2017-07-04 2017-07-04 Detection method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710536609.4A CN107480179B (en) 2017-07-04 2017-07-04 Detection method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN107480179A CN107480179A (en) 2017-12-15
CN107480179B true CN107480179B (en) 2020-06-16

Family

ID=60595299

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710536609.4A Active CN107480179B (en) 2017-07-04 2017-07-04 Detection method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN107480179B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1795447A (en) * 2002-05-15 2006-06-28 英特尔公司 Automatic proxy detection
CN102143187A (en) * 2011-04-07 2011-08-03 北京星网锐捷网络技术有限公司 Method and system for terminal equipment to access network as well as network access proxy device
CN102185923A (en) * 2011-05-16 2011-09-14 广州市动景计算机科技有限公司 Webpage browsing method for mobile communication equipment terminal
CN102439905A (en) * 2011-09-30 2012-05-02 华为技术有限公司 Method, device and system of finding network topology automatically
CN103517250A (en) * 2012-06-15 2014-01-15 华为终端有限公司 A method and an apparatus used for dealing with abnormities of an application agent client
CN103795762A (en) * 2012-11-01 2014-05-14 百度在线网络技术(北京)有限公司 Reverse agent test system and method
CN105024872A (en) * 2014-04-25 2015-11-04 腾讯科技(北京)有限公司 Network performance test method and device
CN106911733A (en) * 2015-12-22 2017-06-30 北京奇虎科技有限公司 The network address access method and device of cloud agency

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9537888B1 (en) * 2013-04-08 2017-01-03 Amazon Technologies, Inc. Proxy server-based malware detection

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1795447A (en) * 2002-05-15 2006-06-28 英特尔公司 Automatic proxy detection
CN102143187A (en) * 2011-04-07 2011-08-03 北京星网锐捷网络技术有限公司 Method and system for terminal equipment to access network as well as network access proxy device
CN102185923A (en) * 2011-05-16 2011-09-14 广州市动景计算机科技有限公司 Webpage browsing method for mobile communication equipment terminal
CN102439905A (en) * 2011-09-30 2012-05-02 华为技术有限公司 Method, device and system of finding network topology automatically
CN103517250A (en) * 2012-06-15 2014-01-15 华为终端有限公司 A method and an apparatus used for dealing with abnormities of an application agent client
CN103795762A (en) * 2012-11-01 2014-05-14 百度在线网络技术(北京)有限公司 Reverse agent test system and method
CN105024872A (en) * 2014-04-25 2015-11-04 腾讯科技(北京)有限公司 Network performance test method and device
CN106911733A (en) * 2015-12-22 2017-06-30 北京奇虎科技有限公司 The network address access method and device of cloud agency

Also Published As

Publication number Publication date
CN107480179A (en) 2017-12-15

Similar Documents

Publication Publication Date Title
CN110275958B (en) Website information identification method and device and electronic equipment
JP6422617B2 (en) Network access operation identification program, server, and storage medium
CN106055574B (en) Method and device for identifying illegal uniform resource identifier (URL)
CN108650260B (en) Malicious website identification method and device
CN106874253A (en) Recognize the method and device of sensitive information
EP2691848A1 (en) Determining machine behavior
EP3703329A1 (en) Webpage request identification
US20220414131A1 (en) Text search method, device, server, and storage medium
CN109582844A (en) A kind of method, apparatus and system identifying crawler
CN112765324B (en) Concept drift detection method and device
CN108809943B (en) Website monitoring method and device
CN110825977A (en) Data recommendation method and related equipment
CN108234454B (en) Identity authentication method, server and client device
CN110245684B (en) Data processing method, electronic device, and medium
CN106250755B (en) Method and device for generating verification code
CN108470126B (en) Data processing method, device and storage medium
CN107480179B (en) Detection method and device and electronic equipment
CN108495150B (en) Method and device for determining video click satisfaction
CN110598115A (en) Sensitive webpage identification method and system based on artificial intelligence multi-engine
CN111901324B (en) Method, device and storage medium for flow identification based on sequence entropy
CN111966948B (en) Information delivery method, device, equipment and storage medium
CN110413871B (en) Application recommendation method and device and electronic equipment
CN111563276B (en) Webpage tampering detection method, detection system and related equipment
CN111814643A (en) Black and gray URL (Uniform resource locator) identification method and device, electronic equipment and medium
CN110807118A (en) Image comment generation method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right