CN107483411A - Business recognition method and system - Google Patents

Business recognition method and system Download PDF

Info

Publication number
CN107483411A
CN107483411A CN201710611555.3A CN201710611555A CN107483411A CN 107483411 A CN107483411 A CN 107483411A CN 201710611555 A CN201710611555 A CN 201710611555A CN 107483411 A CN107483411 A CN 107483411A
Authority
CN
China
Prior art keywords
business
identified
library
early warning
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710611555.3A
Other languages
Chinese (zh)
Other versions
CN107483411B (en
Inventor
袁晓静
翟京卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201710611555.3A priority Critical patent/CN107483411B/en
Publication of CN107483411A publication Critical patent/CN107483411A/en
Application granted granted Critical
Publication of CN107483411B publication Critical patent/CN107483411B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a kind of business recognition method and system, this method includes:Obtain business to be identified corresponding to the DPI data currently flowed through;If the business to be identified is not belonging to current service feature storehouse, detect whether that user occurs actively triggers behavior for the business to be identified;If occurring, the business to be identified is stored to unidentified business library;If not occurring, the business to be identified is stored to early warning business library, and the business in presently described early warning business library, carry out early warning processing.The present invention can improve the accuracy of early warning business library, be advantageous to for the accurate early warning with security risk business.

Description

Business recognition method and system
Technical field
The present invention relates to communication technical field, more particularly to a kind of business recognition method and system on home terminal.
Background technology
When user carries out data interaction by home terminal and third party's operation system at present, pass through intelligent gateway DPI work( Energy module can be identified and distributed to data stream, therefore user can be carried for the business of security risk be present Show, but there is can not effectively identify Added Business and have the industry of security risk due to existing business identification technology Business, therefore lead to not the business for accurately and effectively helping user's early warning that there is security risk.
The content of the invention
The present invention provides a kind of business recognition method and system, it is possible to increase the accuracy of early warning business library, is advantageous to pair In the accurate early warning with security risk business.
The first aspect of the invention is to provide a kind of business recognition method, including:
Obtain business to be identified corresponding to the DPI data currently flowed through;
If the business to be identified is not belonging to current service feature storehouse, detect whether that user occurs to be waited to know for described Various-service actively triggers behavior;
If occurring, the business to be identified is stored to unidentified business library;If not occurring, by the industry to be identified Business is stored to early warning business library, and the business in presently described early warning business library, carries out early warning processing.
Another aspect of the present invention is to provide a kind of business identifying system, including:
Acquisition module, for obtaining business to be identified corresponding to the DPI data currently flowed through;
Identification module, for identifying whether the business to be identified belongs to current service feature storehouse, if being not belonging to, examine Whether survey occurs user is actively triggered behavior for the business to be identified;
Processing module, if actively triggering behavior for the business to be identified for user to occur, wait to know by described Various-service is stored to unidentified business library;
The processing module, if being additionally operable to not occur, the business to be identified is stored to early warning business library, and according to Business in presently described early warning business library, carry out early warning processing.
Business recognition method provided by the invention and system, if detecting, current business to be identified is not belonging to service feature During storehouse, then by whether detecting user for business generation active triggering behavior, realize and type of service is accurately identified, carry The high accuracy of early warning business library, is advantageous to for the accurate early warning with security risk business.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet for business recognition method that the embodiment of the present invention one provides;
Fig. 2A is the schematic flow sheet for another business recognition method that the embodiment of the present invention one provides;
Fig. 2 B are the schematic flow sheet for another business recognition method that the embodiment of the present invention one provides;
Fig. 3 is the schematic flow sheet for another business recognition method that the embodiment of the present invention one provides;
Fig. 4 is a kind of structural representation for business identifying system that the embodiment of the present invention two provides;
Fig. 5 is the structural representation for another business identifying system that the embodiment of the present invention two provides.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
For convenience of explanation, zoomed in or out the size in different layers and region, so size shown in figure and ratio Actual size might not be represented, does not also reflect the proportionate relationship of size.
Fig. 1 is a kind of schematic flow sheet for business recognition method that the embodiment of the present invention one provides, as shown in figure 1, the party Method includes:
101st, business to be identified corresponding to the DPI data currently flowed through is obtained.
Specifically, by DPI functional modules by plug-in unit into intelligent gateway, DPI functional modules will obtain DPI data It is divided into different business data flows, and the special packet in business data flow is detected by identification technology, can extracts Go out the information of content-level, such as the specific data of business and type of service, be advantageous to find and control abnormal traffic flow in time.
If the 102, the business to be identified is not belonging to current service feature storehouse, detect whether to occur user for described Business to be identified actively triggers behavior.
Specifically, preserving known service information list in service feature storehouse, there is record in the service information list has passed through The service feature data identified safely are crossed, the business datum of acquisition is compared with above-mentioned service information list, can be somebody's turn to do Whether business is already present business;If so, then illustrate that the business is safety service;If it is not, then need to determine whether this Business whether there is security risk, and whether the standard judged actively triggers this business as user.
If the 103, occurring, the business to be identified is stored to unidentified business library.
Specifically, if testing result, which is user, actively triggers this unidentified business, illustrate the business that this business is New raxa, The information of the business is stored into the service lists in unidentified business library.
If the 104, not occurring, the business to be identified is stored to early warning business library, and according to presently described early warning industry The business being engaged in storehouse, carry out early warning processing.
Wherein, service feature storehouse is specially to preserve the database for having identified service feature data;Unidentified business library is specific To preserve the database of the service feature data of New raxa, above-mentioned New raxa business is that user actively initiates, and illustrates user to this Class business has actual demand but existing supplier fails to provide the user with such business, unidentified in actual scene Data in business library are provided to supplier and are used to study demand of the user for new business;Early warning business library is specially to preserve The database of service feature data with security risk, in actual scene, the business with security risk can be made to user Into the harm such as personal information leakage or property loss, therefore the data in early warning business library are provided to safe handling department, For how studying in user terminal early warning and the similar business with security risk of interception.
Specifically, if testing result, which is that user is non-active, triggers this unidentified business, illustrate that the business does not permit in user Perhaps in the case of, automatic running is simultaneously communicated with third party system terminal, therefore the business is there is security risk, such as is led Cause user profile loss or user terminal virus infection etc.;Now the business is stored to the service lists in early warning business library In, so that the business information is supplied to safe handling department by next step, carry out early warning processing.
In practical application, further the business in early warning business library can also be examined, to improve the standard of business library True property, optionally, periodically can manually it be examined by staff.It is optional again, in order to improve the same of business library accuracy The updating maintenance efficiency of Shi Tigao business libraries, Fig. 2A are the flow for another business recognition method that the embodiment of the present invention one provides Schematic diagram, as shown in Figure 2 A, on the basis of embodiment one, this method also includes:
201st, safe class analysis is carried out to the business in the early warning business library, if the safe class reaches default First threshold, then corresponding business is transferred to the unidentified business library.
Specifically, preserve the characteristic of business in service lists in early warning business library, such as title, type, touch Send out type, start time etc., safe class analysis is carried out according to the characteristic of business, obtain safety etc. corresponding to the business Level, wherein first threshold can be configured according to the specific needs of user.
Likewise, the business in unidentified business library can also further be examined, to improve the accurate of service feature storehouse Property, further, in order to improve the renewal efficiency in service feature storehouse, as shown in Figure 2 B, on the basis of foregoing any embodiment On, this method can also include:
202nd, user's request degree analysis is carried out to the business in the unidentified business library, if the user's request degree reaches Default Second Threshold, then corresponding business is transferred to the service feature storehouse.
Specifically, the characteristic of business is preserved in service lists in unidentified business library, according to the feature of business Data carry out user's request degree analysis with customer service service condition, demand degree of the user to the business are obtained, wherein the second threshold Value can be configured according to the specific needs of user.
It should be noted that above two embodiment can individually be implemented, it can also combine and implement, for example, both to pre- Business in alert business library carries out safe class analysis, also carries out user's request degree analysis to the business in unidentified business library. So as to accurately and effectively be updated maintenance to each business library.
In addition, in order to improve the efficiency that intelligent gateway identifies business, prevent from hindering just because business recognition time is long Normal communication.Fig. 3 is the schematic flow sheet for another business recognition method that the embodiment of the present invention one provides, as shown in figure 3, On the basis of foregoing any embodiment, 101 include:
301st, in default very first time threshold value, business to be identified corresponding to the DPI data currently flowed through is obtained.
Specifically, very first time threshold value can be set according to the ability of intelligent gateway itself acquisition business datum, also may be used To be configured according to requirement of the user to the fluency that communicates.
If the 302nd, in the very first time threshold value, the business to be identified is not got, then judges the industry to be identified Business is not belonging to current service feature storehouse.
Obtained specifically, not getting the business to be identified and including intelligent gateway by the characteristic of business to be identified Business label, above-mentioned business label is compared in current service feature storehouse, when not finding matching result, then judges institute State business to be identified and be not belonging to current service feature storehouse;And cause to obtain the business to be identified and be not belonging to current business There are two kinds of situations in the result of feature database, the first is that the business is not present in current service characteristic data base, then the industry It is engaged in as the business of New raxa, second is because the limitation of recognition capability can not obtain the feature of the business in very first time threshold value Data.Efficiency and network traffic flow that intelligent gateway identifies to business can be influenceed in reality scene, the occurrence of second Smooth degree, very first time threshold value set and solve above mentioned problem.
Likewise, in actual applications, it can influence to identify because user's trigger action identified time of identification business is long Efficiency, therefore in order to further improve recognition efficiency and improve network service smoothness degree, on the basis of foregoing any embodiment On, 102 include:
If the 303, the business to be identified is not belonging to current service feature storehouse, detect from current time, default The second time threshold in, if user occurs and actively triggers behavior for the business to be identified.
Specifically, the second time threshold can be set according to the ability of intelligent gateway itself acquisition business datum, also may be used To be configured according to requirement of the user to the fluency that communicates.
Accordingly, 104 include:
If the 304th, in second time threshold, active triggering row of the user for the business to be identified does not occur For then the business to be identified is stored to the early warning business library.
Specifically, in second time threshold, active triggering row of the user for the business to be identified does not occur It is include two kinds of situations, the first is user's trigger action mark according to service feature data acquisition, is triggered according to user dynamic Make a check mark and judge that this business is not that actively triggering produces user;Second is because the limitation of recognition capability can not be in the second time threshold The characteristic of the business is obtained in value.Intelligent gateway can be influenceed in reality scene, the occurrence of second to know business Other efficiency and network service smoothness degree, the second time threshold set and solve above mentioned problem.
A kind of business recognition method is present embodiments provided, current business to be identified is not belonging to service feature if detecting During storehouse, then by whether detecting user for business generation active triggering behavior, realize and type of service is accurately identified, carry The high accuracy of early warning business library, is advantageous to for the accurate early warning with security risk business.
In order to efficiently identify the business with security risk, the accuracy of early warning business library is improved, Fig. 4 is the present invention The structural representation for a kind of business identifying system that embodiment two provides, as shown in figure 4, the system includes:
Acquisition module 1, for obtaining business to be identified corresponding to the DPI data currently flowed through.
Specifically, acquisition module 1 includes DPI functional modules, DPI functional modules are divided into different industry by DPI data are obtained Business data flow, and the special packet in business data flow is detected by identification technology, content-level can be extracted Information, such as the specific data of business and type of service, be advantageous to find and control abnormal traffic flow in time.Acquisition module 1 will The service feature Data Concurrent of the business to be identified obtained gives identification module 2.
Identification module 2, for identifying whether business to be identified belongs to current service feature storehouse, if being not belonging to, detect User whether occurs and actively triggers behavior for business to be identified.
Specifically, preserving known service information list in service feature storehouse, record has been subjected in the service information list The business datum of acquisition is compared with above-mentioned service information list for the service feature data identified safely, identification module 2, can be with Obtain whether the business is already present business;If so, then illustrate that the business is safety service;If it is not, then need further Detect this business and whether there is security risk, whether the standard of detection actively triggers this business for user, and by testing result It is sent to processing module 3.
Processing module 3, if actively triggering behavior for business to be identified for user to occur, business to be identified is deposited Store up to unidentified business library.
Processing module 3, if being additionally operable to not occur, business to be identified is stored to early warning business library, and according to current pre- Business in alert business library, carries out early warning processing.
Wherein, service feature storehouse is specially to preserve the database for having identified service feature data;Unidentified business library is specific To preserve the database of the service feature data of New raxa, above-mentioned New raxa business is that user actively initiates, and illustrates user to this Class business has actual demand but existing supplier fails to provide the user with such business, unidentified in actual scene Data in business library are provided to supplier and are used to study demand of the user for new business;Early warning business library is specially to preserve The database of service feature data with security risk, in actual scene, the business with security risk can be made to user Into the harm such as personal information leakage or property loss, therefore the data in early warning business library are provided to safe handling department, For how studying in user terminal early warning and the similar business with security risk of interception.
Specifically, processing module 3 stores business to be identified to unidentified business library or early warning industry according to testing result Business storehouse.
In practical application, further the business in early warning business library can also be examined, to improve the standard of business library True property, optionally, periodically can manually it be examined by staff.It is optional again, in order to improve the same of business library accuracy The updating maintenance efficiency of Shi Tigao business libraries, Fig. 5 are the structure for another business identifying system that the embodiment of the present invention two provides Schematic diagram, as shown in figure 5, on the basis of foregoing any embodiment, the system also includes:
First analysis module 4, for carrying out safe class analysis to the business in early warning business library, if safe class reaches Default first threshold, then corresponding business is transferred to unidentified business library.
Specifically, preserve the characteristic of business in service lists in early warning business library, such as title, type, touch Send out type, start time etc., the first analysis module 4 carries out safe class analysis according to the characteristic of business, obtains the business Corresponding safe class, wherein first threshold can be configured according to the specific needs of user.
Likewise, the business in unidentified business library can also further be examined, to improve the accurate of service feature storehouse Property, further, in order to improve the renewal efficiency in service feature storehouse, as shown in figure 5, on the basis of foregoing any embodiment On, the system also includes:
Second analysis module 5, for carrying out user's request degree analysis to the business in unidentified business library, if user's request Degree reaches default Second Threshold, then corresponding business is transferred into service feature storehouse.
Specifically, the characteristic of business, the second analysis module 5 are preserved in service lists in unidentified business library User's request degree analysis is carried out according to the characteristic and customer service service condition of business, obtains demand of the user to the business Degree, wherein Second Threshold can be configured according to the specific needs of user.
It should be noted that above two embodiment can individually be implemented, it can also combine and implement, for example, the system The first analysis module 4 can both be included, also including the second analysis module 5, so as to be accurately and effectively updated to each business library Safeguard.
In addition, in order to improve the efficiency that intelligent gateway identifies business, prevent from hindering just because business recognition time is long Normal communication.On the basis of foregoing any embodiment, acquisition module 1, specifically in default very first time threshold value, Acquisition currently flows through business to be identified corresponding to DPI data.Acquisition module 1, if being additionally operable in very first time threshold value, do not obtain To business to be identified, then judge that business to be identified is not belonging to current service feature storehouse.
Specifically, very first time threshold value can be set according to the ability of intelligent gateway itself acquisition business datum, also may be used To be configured according to requirement of the user to the fluency that communicates.When not getting business to be identified, acquisition module 1 will be above-mentioned Business label is compared in current service feature storehouse, when not finding matching result, then judges the business to be identified not Belong to current service feature storehouse;And cause to obtain the business to be identified and be not belonging to the result in current service feature storehouse and deposit In two kinds of situations, the first is that the business is not present in current service characteristic data base, then the business is the industry of New raxa Business, second is because the limitation of recognition capability can not obtain the characteristic of the business in very first time threshold value.In real field Jing Zhong, efficiency and the network service smoothness degree that intelligent gateway identifies to business, the very first time can be influenceed the occurrence of second Threshold value sets and solves above mentioned problem.
Likewise, in actual applications, it can influence to identify because user's trigger action identified time of identification business is long Efficiency, therefore in order to further improve recognition efficiency and improve network service smoothness degree, on the basis of foregoing any embodiment On, if identification module 2 is not belonging to current service feature storehouse specifically for business to be identified, detect from current time, In default second time threshold, if user occurs and actively triggers behavior for business to be identified.Accordingly, processing module If 3 are specifically used in the second time threshold, user does not occur and actively triggers behavior for business to be identified, then will be to be identified Business is stored to early warning business library.
Specifically, the second time threshold can be set according to the ability of intelligent gateway itself acquisition business datum, also may be used To be configured according to requirement of the user to the fluency that communicates.In second time threshold, user does not occur and is directed to institute To state the behavior that actively triggers of business to be identified include two kinds of situations, and the first is user's triggering according to service feature data acquisition Action identification, judge that this business is not that actively triggering produces user according to user's trigger action mark;Second is because identifying energy The limitation of power can not obtain the characteristic of the business in the second time threshold.In reality scene, the hair of second of situation Life can influence efficiency and the network service smoothness degree that intelligent gateway identifies to business, and the second time threshold sets and solves above-mentioned ask Topic.
A kind of business identifying system is present embodiments provided, current business to be identified is not belonging to service feature if detecting During storehouse, then by whether detecting user for business generation active triggering behavior, realize and type of service is accurately identified, carry The high accuracy of early warning business library, is advantageous to for the accurate early warning with security risk business.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description Specific work process, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to The related hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey Sequence upon execution, execution the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

  1. A kind of 1. business recognition method, it is characterised in that including:
    Obtain business to be identified corresponding to the DPI data currently flowed through;
    If the business to be identified is not belonging to current service feature storehouse, detect whether that user, which occurs, is directed to the industry to be identified Business actively triggers behavior;
    If occurring, the business to be identified is stored to unidentified business library;If not occurring, the business to be identified is deposited Storage is to early warning business library, and the business in presently described early warning business library, carries out early warning processing.
  2. 2. according to the method for claim 1, it is characterised in that methods described also includes:
    Safe class analysis is carried out to the business in the early warning business library, if the safe class reaches default first threshold Value, then be transferred to the unidentified business library by corresponding business.
  3. 3. according to the method for claim 1, it is characterised in that methods described also includes:
    User's request degree analysis is carried out to the business in the unidentified business library, if the user's request degree reaches default the Two threshold values, then corresponding business is transferred to the service feature storehouse.
  4. 4. according to the method any one of claim 1-3, it is characterised in that described to obtain the DPI data currently flowed through Corresponding business to be identified, including:
    In default very first time threshold value, business to be identified corresponding to the DPI data currently flowed through is obtained;
    Methods described also includes:
    If in the very first time threshold value, the business to be identified is not got, then judges that the business to be identified is not belonging to Current service feature storehouse.
  5. 5. according to the method any one of claim 1-3, it is characterised in that if the business to be identified is not belonging to Current service feature storehouse, then detect whether that user occurs actively triggers behavior for the business to be identified, including:
    If the business to be identified is not belonging to current service feature storehouse, detect from current time, at default second Between in threshold value, if user occurs and actively triggers behavior for the business to be identified;
    If described do not occur, the business to be identified is stored to early warning business library, including:
    If in second time threshold, user does not occur and actively triggers behavior for the business to be identified, then by institute Business to be identified is stated to store to the early warning business library.
  6. A kind of 6. business identifying system, it is characterised in that including:
    Acquisition module, for obtaining business to be identified corresponding to the DPI data currently flowed through;
    Identification module, if being not belonging to current service feature storehouse for the business to be identified, detect whether that user's pin occurs Behavior is actively triggered to the business to be identified;
    Processing module, if behavior is actively triggered for the business to be identified for user to occur, by the industry to be identified Business is stored to unidentified business library;
    The processing module, if being additionally operable to not occur, the business to be identified is stored to early warning business library, and according to current Business in the early warning business library, carry out early warning processing.
  7. 7. system according to claim 6, it is characterised in that the system also includes:
    First analysis module, for carrying out safe class analysis to the business in the early warning business library, if the safe class Reach default first threshold, then corresponding business is transferred to the unidentified business library.
  8. 8. system according to claim 6, it is characterised in that the system also includes:
    Second analysis module, for carrying out user's request degree analysis to the business in the unidentified business library, if the user Demand degree reaches default Second Threshold, then corresponding business is transferred into the service feature storehouse.
  9. 9. according to the system any one of claim 6-8, it is characterised in that
    The acquisition module, currently flowed through specifically in default very first time threshold value, acquisition is described corresponding to DPI data Business to be identified;
    The acquisition module, if being additionally operable in the very first time threshold value, the business to be identified is not got, then judges institute State business to be identified and be not belonging to current service feature storehouse.
  10. 10. according to the system any one of claim 6-8, it is characterised in that
    The identification module, if being not belonging to current service feature storehouse specifically for the business to be identified, detect from current From moment, in default second time threshold, if user occurs and actively triggers behavior for the business to be identified;
    The processing module, if being directed to the business to be identified specifically for user in second time threshold, does not occur Actively trigger behavior, then the business to be identified is stored to the early warning business library.
CN201710611555.3A 2017-07-25 2017-07-25 Service identification method and system Active CN107483411B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710611555.3A CN107483411B (en) 2017-07-25 2017-07-25 Service identification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710611555.3A CN107483411B (en) 2017-07-25 2017-07-25 Service identification method and system

Publications (2)

Publication Number Publication Date
CN107483411A true CN107483411A (en) 2017-12-15
CN107483411B CN107483411B (en) 2020-01-31

Family

ID=60596764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710611555.3A Active CN107483411B (en) 2017-07-25 2017-07-25 Service identification method and system

Country Status (1)

Country Link
CN (1) CN107483411B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109447320A (en) * 2018-09-27 2019-03-08 中国联合网络通信集团有限公司 The recognition methods of customer service, apparatus and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025636A (en) * 2010-12-09 2011-04-20 北京星网锐捷网络技术有限公司 Message feature processing method and device as well as network equipment
US20130288636A1 (en) * 2012-04-12 2013-10-31 Kelly Roy Peterson Location data updating and transmission
CN104796406A (en) * 2015-03-20 2015-07-22 杭州华三通信技术有限公司 Method and device for identifying application
CN106612241A (en) * 2015-10-27 2017-05-03 中国移动通信集团浙江有限公司 Service control method and service control device
CN106921637A (en) * 2015-12-28 2017-07-04 华为技术有限公司 The recognition methods of the application message in network traffics and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025636A (en) * 2010-12-09 2011-04-20 北京星网锐捷网络技术有限公司 Message feature processing method and device as well as network equipment
US20130288636A1 (en) * 2012-04-12 2013-10-31 Kelly Roy Peterson Location data updating and transmission
CN104796406A (en) * 2015-03-20 2015-07-22 杭州华三通信技术有限公司 Method and device for identifying application
CN106612241A (en) * 2015-10-27 2017-05-03 中国移动通信集团浙江有限公司 Service control method and service control device
CN106921637A (en) * 2015-12-28 2017-07-04 华为技术有限公司 The recognition methods of the application message in network traffics and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109447320A (en) * 2018-09-27 2019-03-08 中国联合网络通信集团有限公司 The recognition methods of customer service, apparatus and system

Also Published As

Publication number Publication date
CN107483411B (en) 2020-01-31

Similar Documents

Publication Publication Date Title
US5966650A (en) Detecting mobile telephone misuse
CN106295349A (en) Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen
CN106452955B (en) A kind of detection method and system of abnormal network connection
CN104123496B (en) The hold-up interception method and device of a kind of rogue software, terminal
CN107220181A (en) A kind of abnormal process localization method, apparatus and system
CN103685222A (en) A data matching detection method based on a determinacy finite state automation
CN111934913A (en) Intelligent network management system
CN105528558B (en) A kind of detection method and device of private communication channel communication
Sharma et al. WLI-FCM and artificial neural network based cloud intrusion detection system
CN106033438A (en) Public sentiment data storage method and server
CN109409113A (en) A kind of electric network data safety protecting method and distributed power grid data safety guard system
CN107483411A (en) Business recognition method and system
CN107493258A (en) A kind of intruding detection system based on network security
CN107194265A (en) A kind of device of the warehouse compartment supervision based on block chain image processing techniques
CN102143151B (en) Deep packet inspection based protocol packet spanning inspection method and deep packet inspection based protocol packet spanning inspection device
CN104318665A (en) System for precluding financial false cards
CN106161127B (en) Class of subscriber detection method and device
WO2020161808A1 (en) Priority determination device, priority determination method, and computer-readable medium
CN115296895B (en) Request response method and device, storage medium and electronic equipment
CN110120109A (en) A kind of airport pipe well inspection management method, terminal, server and system
CN109583205A (en) A kind of data information security management method
CN112434287B (en) Method, device, equipment and storage medium for detecting Hook
US20200226257A1 (en) System and method for identifying activity in a computer system
CN104052852A (en) Communication method and device
CN1494257A (en) Method of proceeding real time monitoring against identification authorized charging service apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant