CN107483411A - Business recognition method and system - Google Patents
Business recognition method and system Download PDFInfo
- Publication number
- CN107483411A CN107483411A CN201710611555.3A CN201710611555A CN107483411A CN 107483411 A CN107483411 A CN 107483411A CN 201710611555 A CN201710611555 A CN 201710611555A CN 107483411 A CN107483411 A CN 107483411A
- Authority
- CN
- China
- Prior art keywords
- business
- identified
- library
- early warning
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/66—Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a kind of business recognition method and system, this method includes:Obtain business to be identified corresponding to the DPI data currently flowed through;If the business to be identified is not belonging to current service feature storehouse, detect whether that user occurs actively triggers behavior for the business to be identified;If occurring, the business to be identified is stored to unidentified business library;If not occurring, the business to be identified is stored to early warning business library, and the business in presently described early warning business library, carry out early warning processing.The present invention can improve the accuracy of early warning business library, be advantageous to for the accurate early warning with security risk business.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of business recognition method and system on home terminal.
Background technology
When user carries out data interaction by home terminal and third party's operation system at present, pass through intelligent gateway DPI work(
Energy module can be identified and distributed to data stream, therefore user can be carried for the business of security risk be present
Show, but there is can not effectively identify Added Business and have the industry of security risk due to existing business identification technology
Business, therefore lead to not the business for accurately and effectively helping user's early warning that there is security risk.
The content of the invention
The present invention provides a kind of business recognition method and system, it is possible to increase the accuracy of early warning business library, is advantageous to pair
In the accurate early warning with security risk business.
The first aspect of the invention is to provide a kind of business recognition method, including:
Obtain business to be identified corresponding to the DPI data currently flowed through;
If the business to be identified is not belonging to current service feature storehouse, detect whether that user occurs to be waited to know for described
Various-service actively triggers behavior;
If occurring, the business to be identified is stored to unidentified business library;If not occurring, by the industry to be identified
Business is stored to early warning business library, and the business in presently described early warning business library, carries out early warning processing.
Another aspect of the present invention is to provide a kind of business identifying system, including:
Acquisition module, for obtaining business to be identified corresponding to the DPI data currently flowed through;
Identification module, for identifying whether the business to be identified belongs to current service feature storehouse, if being not belonging to, examine
Whether survey occurs user is actively triggered behavior for the business to be identified;
Processing module, if actively triggering behavior for the business to be identified for user to occur, wait to know by described
Various-service is stored to unidentified business library;
The processing module, if being additionally operable to not occur, the business to be identified is stored to early warning business library, and according to
Business in presently described early warning business library, carry out early warning processing.
Business recognition method provided by the invention and system, if detecting, current business to be identified is not belonging to service feature
During storehouse, then by whether detecting user for business generation active triggering behavior, realize and type of service is accurately identified, carry
The high accuracy of early warning business library, is advantageous to for the accurate early warning with security risk business.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
These accompanying drawings obtain other accompanying drawings.
Fig. 1 is a kind of schematic flow sheet for business recognition method that the embodiment of the present invention one provides;
Fig. 2A is the schematic flow sheet for another business recognition method that the embodiment of the present invention one provides;
Fig. 2 B are the schematic flow sheet for another business recognition method that the embodiment of the present invention one provides;
Fig. 3 is the schematic flow sheet for another business recognition method that the embodiment of the present invention one provides;
Fig. 4 is a kind of structural representation for business identifying system that the embodiment of the present invention two provides;
Fig. 5 is the structural representation for another business identifying system that the embodiment of the present invention two provides.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
For convenience of explanation, zoomed in or out the size in different layers and region, so size shown in figure and ratio
Actual size might not be represented, does not also reflect the proportionate relationship of size.
Fig. 1 is a kind of schematic flow sheet for business recognition method that the embodiment of the present invention one provides, as shown in figure 1, the party
Method includes:
101st, business to be identified corresponding to the DPI data currently flowed through is obtained.
Specifically, by DPI functional modules by plug-in unit into intelligent gateway, DPI functional modules will obtain DPI data
It is divided into different business data flows, and the special packet in business data flow is detected by identification technology, can extracts
Go out the information of content-level, such as the specific data of business and type of service, be advantageous to find and control abnormal traffic flow in time.
If the 102, the business to be identified is not belonging to current service feature storehouse, detect whether to occur user for described
Business to be identified actively triggers behavior.
Specifically, preserving known service information list in service feature storehouse, there is record in the service information list has passed through
The service feature data identified safely are crossed, the business datum of acquisition is compared with above-mentioned service information list, can be somebody's turn to do
Whether business is already present business;If so, then illustrate that the business is safety service;If it is not, then need to determine whether this
Business whether there is security risk, and whether the standard judged actively triggers this business as user.
If the 103, occurring, the business to be identified is stored to unidentified business library.
Specifically, if testing result, which is user, actively triggers this unidentified business, illustrate the business that this business is New raxa,
The information of the business is stored into the service lists in unidentified business library.
If the 104, not occurring, the business to be identified is stored to early warning business library, and according to presently described early warning industry
The business being engaged in storehouse, carry out early warning processing.
Wherein, service feature storehouse is specially to preserve the database for having identified service feature data;Unidentified business library is specific
To preserve the database of the service feature data of New raxa, above-mentioned New raxa business is that user actively initiates, and illustrates user to this
Class business has actual demand but existing supplier fails to provide the user with such business, unidentified in actual scene
Data in business library are provided to supplier and are used to study demand of the user for new business;Early warning business library is specially to preserve
The database of service feature data with security risk, in actual scene, the business with security risk can be made to user
Into the harm such as personal information leakage or property loss, therefore the data in early warning business library are provided to safe handling department,
For how studying in user terminal early warning and the similar business with security risk of interception.
Specifically, if testing result, which is that user is non-active, triggers this unidentified business, illustrate that the business does not permit in user
Perhaps in the case of, automatic running is simultaneously communicated with third party system terminal, therefore the business is there is security risk, such as is led
Cause user profile loss or user terminal virus infection etc.;Now the business is stored to the service lists in early warning business library
In, so that the business information is supplied to safe handling department by next step, carry out early warning processing.
In practical application, further the business in early warning business library can also be examined, to improve the standard of business library
True property, optionally, periodically can manually it be examined by staff.It is optional again, in order to improve the same of business library accuracy
The updating maintenance efficiency of Shi Tigao business libraries, Fig. 2A are the flow for another business recognition method that the embodiment of the present invention one provides
Schematic diagram, as shown in Figure 2 A, on the basis of embodiment one, this method also includes:
201st, safe class analysis is carried out to the business in the early warning business library, if the safe class reaches default
First threshold, then corresponding business is transferred to the unidentified business library.
Specifically, preserve the characteristic of business in service lists in early warning business library, such as title, type, touch
Send out type, start time etc., safe class analysis is carried out according to the characteristic of business, obtain safety etc. corresponding to the business
Level, wherein first threshold can be configured according to the specific needs of user.
Likewise, the business in unidentified business library can also further be examined, to improve the accurate of service feature storehouse
Property, further, in order to improve the renewal efficiency in service feature storehouse, as shown in Figure 2 B, on the basis of foregoing any embodiment
On, this method can also include:
202nd, user's request degree analysis is carried out to the business in the unidentified business library, if the user's request degree reaches
Default Second Threshold, then corresponding business is transferred to the service feature storehouse.
Specifically, the characteristic of business is preserved in service lists in unidentified business library, according to the feature of business
Data carry out user's request degree analysis with customer service service condition, demand degree of the user to the business are obtained, wherein the second threshold
Value can be configured according to the specific needs of user.
It should be noted that above two embodiment can individually be implemented, it can also combine and implement, for example, both to pre-
Business in alert business library carries out safe class analysis, also carries out user's request degree analysis to the business in unidentified business library.
So as to accurately and effectively be updated maintenance to each business library.
In addition, in order to improve the efficiency that intelligent gateway identifies business, prevent from hindering just because business recognition time is long
Normal communication.Fig. 3 is the schematic flow sheet for another business recognition method that the embodiment of the present invention one provides, as shown in figure 3,
On the basis of foregoing any embodiment, 101 include:
301st, in default very first time threshold value, business to be identified corresponding to the DPI data currently flowed through is obtained.
Specifically, very first time threshold value can be set according to the ability of intelligent gateway itself acquisition business datum, also may be used
To be configured according to requirement of the user to the fluency that communicates.
If the 302nd, in the very first time threshold value, the business to be identified is not got, then judges the industry to be identified
Business is not belonging to current service feature storehouse.
Obtained specifically, not getting the business to be identified and including intelligent gateway by the characteristic of business to be identified
Business label, above-mentioned business label is compared in current service feature storehouse, when not finding matching result, then judges institute
State business to be identified and be not belonging to current service feature storehouse;And cause to obtain the business to be identified and be not belonging to current business
There are two kinds of situations in the result of feature database, the first is that the business is not present in current service characteristic data base, then the industry
It is engaged in as the business of New raxa, second is because the limitation of recognition capability can not obtain the feature of the business in very first time threshold value
Data.Efficiency and network traffic flow that intelligent gateway identifies to business can be influenceed in reality scene, the occurrence of second
Smooth degree, very first time threshold value set and solve above mentioned problem.
Likewise, in actual applications, it can influence to identify because user's trigger action identified time of identification business is long
Efficiency, therefore in order to further improve recognition efficiency and improve network service smoothness degree, on the basis of foregoing any embodiment
On, 102 include:
If the 303, the business to be identified is not belonging to current service feature storehouse, detect from current time, default
The second time threshold in, if user occurs and actively triggers behavior for the business to be identified.
Specifically, the second time threshold can be set according to the ability of intelligent gateway itself acquisition business datum, also may be used
To be configured according to requirement of the user to the fluency that communicates.
Accordingly, 104 include:
If the 304th, in second time threshold, active triggering row of the user for the business to be identified does not occur
For then the business to be identified is stored to the early warning business library.
Specifically, in second time threshold, active triggering row of the user for the business to be identified does not occur
It is include two kinds of situations, the first is user's trigger action mark according to service feature data acquisition, is triggered according to user dynamic
Make a check mark and judge that this business is not that actively triggering produces user;Second is because the limitation of recognition capability can not be in the second time threshold
The characteristic of the business is obtained in value.Intelligent gateway can be influenceed in reality scene, the occurrence of second to know business
Other efficiency and network service smoothness degree, the second time threshold set and solve above mentioned problem.
A kind of business recognition method is present embodiments provided, current business to be identified is not belonging to service feature if detecting
During storehouse, then by whether detecting user for business generation active triggering behavior, realize and type of service is accurately identified, carry
The high accuracy of early warning business library, is advantageous to for the accurate early warning with security risk business.
In order to efficiently identify the business with security risk, the accuracy of early warning business library is improved, Fig. 4 is the present invention
The structural representation for a kind of business identifying system that embodiment two provides, as shown in figure 4, the system includes:
Acquisition module 1, for obtaining business to be identified corresponding to the DPI data currently flowed through.
Specifically, acquisition module 1 includes DPI functional modules, DPI functional modules are divided into different industry by DPI data are obtained
Business data flow, and the special packet in business data flow is detected by identification technology, content-level can be extracted
Information, such as the specific data of business and type of service, be advantageous to find and control abnormal traffic flow in time.Acquisition module 1 will
The service feature Data Concurrent of the business to be identified obtained gives identification module 2.
Identification module 2, for identifying whether business to be identified belongs to current service feature storehouse, if being not belonging to, detect
User whether occurs and actively triggers behavior for business to be identified.
Specifically, preserving known service information list in service feature storehouse, record has been subjected in the service information list
The business datum of acquisition is compared with above-mentioned service information list for the service feature data identified safely, identification module 2, can be with
Obtain whether the business is already present business;If so, then illustrate that the business is safety service;If it is not, then need further
Detect this business and whether there is security risk, whether the standard of detection actively triggers this business for user, and by testing result
It is sent to processing module 3.
Processing module 3, if actively triggering behavior for business to be identified for user to occur, business to be identified is deposited
Store up to unidentified business library.
Processing module 3, if being additionally operable to not occur, business to be identified is stored to early warning business library, and according to current pre-
Business in alert business library, carries out early warning processing.
Wherein, service feature storehouse is specially to preserve the database for having identified service feature data;Unidentified business library is specific
To preserve the database of the service feature data of New raxa, above-mentioned New raxa business is that user actively initiates, and illustrates user to this
Class business has actual demand but existing supplier fails to provide the user with such business, unidentified in actual scene
Data in business library are provided to supplier and are used to study demand of the user for new business;Early warning business library is specially to preserve
The database of service feature data with security risk, in actual scene, the business with security risk can be made to user
Into the harm such as personal information leakage or property loss, therefore the data in early warning business library are provided to safe handling department,
For how studying in user terminal early warning and the similar business with security risk of interception.
Specifically, processing module 3 stores business to be identified to unidentified business library or early warning industry according to testing result
Business storehouse.
In practical application, further the business in early warning business library can also be examined, to improve the standard of business library
True property, optionally, periodically can manually it be examined by staff.It is optional again, in order to improve the same of business library accuracy
The updating maintenance efficiency of Shi Tigao business libraries, Fig. 5 are the structure for another business identifying system that the embodiment of the present invention two provides
Schematic diagram, as shown in figure 5, on the basis of foregoing any embodiment, the system also includes:
First analysis module 4, for carrying out safe class analysis to the business in early warning business library, if safe class reaches
Default first threshold, then corresponding business is transferred to unidentified business library.
Specifically, preserve the characteristic of business in service lists in early warning business library, such as title, type, touch
Send out type, start time etc., the first analysis module 4 carries out safe class analysis according to the characteristic of business, obtains the business
Corresponding safe class, wherein first threshold can be configured according to the specific needs of user.
Likewise, the business in unidentified business library can also further be examined, to improve the accurate of service feature storehouse
Property, further, in order to improve the renewal efficiency in service feature storehouse, as shown in figure 5, on the basis of foregoing any embodiment
On, the system also includes:
Second analysis module 5, for carrying out user's request degree analysis to the business in unidentified business library, if user's request
Degree reaches default Second Threshold, then corresponding business is transferred into service feature storehouse.
Specifically, the characteristic of business, the second analysis module 5 are preserved in service lists in unidentified business library
User's request degree analysis is carried out according to the characteristic and customer service service condition of business, obtains demand of the user to the business
Degree, wherein Second Threshold can be configured according to the specific needs of user.
It should be noted that above two embodiment can individually be implemented, it can also combine and implement, for example, the system
The first analysis module 4 can both be included, also including the second analysis module 5, so as to be accurately and effectively updated to each business library
Safeguard.
In addition, in order to improve the efficiency that intelligent gateway identifies business, prevent from hindering just because business recognition time is long
Normal communication.On the basis of foregoing any embodiment, acquisition module 1, specifically in default very first time threshold value,
Acquisition currently flows through business to be identified corresponding to DPI data.Acquisition module 1, if being additionally operable in very first time threshold value, do not obtain
To business to be identified, then judge that business to be identified is not belonging to current service feature storehouse.
Specifically, very first time threshold value can be set according to the ability of intelligent gateway itself acquisition business datum, also may be used
To be configured according to requirement of the user to the fluency that communicates.When not getting business to be identified, acquisition module 1 will be above-mentioned
Business label is compared in current service feature storehouse, when not finding matching result, then judges the business to be identified not
Belong to current service feature storehouse;And cause to obtain the business to be identified and be not belonging to the result in current service feature storehouse and deposit
In two kinds of situations, the first is that the business is not present in current service characteristic data base, then the business is the industry of New raxa
Business, second is because the limitation of recognition capability can not obtain the characteristic of the business in very first time threshold value.In real field
Jing Zhong, efficiency and the network service smoothness degree that intelligent gateway identifies to business, the very first time can be influenceed the occurrence of second
Threshold value sets and solves above mentioned problem.
Likewise, in actual applications, it can influence to identify because user's trigger action identified time of identification business is long
Efficiency, therefore in order to further improve recognition efficiency and improve network service smoothness degree, on the basis of foregoing any embodiment
On, if identification module 2 is not belonging to current service feature storehouse specifically for business to be identified, detect from current time,
In default second time threshold, if user occurs and actively triggers behavior for business to be identified.Accordingly, processing module
If 3 are specifically used in the second time threshold, user does not occur and actively triggers behavior for business to be identified, then will be to be identified
Business is stored to early warning business library.
Specifically, the second time threshold can be set according to the ability of intelligent gateway itself acquisition business datum, also may be used
To be configured according to requirement of the user to the fluency that communicates.In second time threshold, user does not occur and is directed to institute
To state the behavior that actively triggers of business to be identified include two kinds of situations, and the first is user's triggering according to service feature data acquisition
Action identification, judge that this business is not that actively triggering produces user according to user's trigger action mark;Second is because identifying energy
The limitation of power can not obtain the characteristic of the business in the second time threshold.In reality scene, the hair of second of situation
Life can influence efficiency and the network service smoothness degree that intelligent gateway identifies to business, and the second time threshold sets and solves above-mentioned ask
Topic.
A kind of business identifying system is present embodiments provided, current business to be identified is not belonging to service feature if detecting
During storehouse, then by whether detecting user for business generation active triggering behavior, realize and type of service is accurately identified, carry
The high accuracy of early warning business library, is advantageous to for the accurate early warning with security risk business.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
Specific work process, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to
The related hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey
Sequence upon execution, execution the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or
Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (10)
- A kind of 1. business recognition method, it is characterised in that including:Obtain business to be identified corresponding to the DPI data currently flowed through;If the business to be identified is not belonging to current service feature storehouse, detect whether that user, which occurs, is directed to the industry to be identified Business actively triggers behavior;If occurring, the business to be identified is stored to unidentified business library;If not occurring, the business to be identified is deposited Storage is to early warning business library, and the business in presently described early warning business library, carries out early warning processing.
- 2. according to the method for claim 1, it is characterised in that methods described also includes:Safe class analysis is carried out to the business in the early warning business library, if the safe class reaches default first threshold Value, then be transferred to the unidentified business library by corresponding business.
- 3. according to the method for claim 1, it is characterised in that methods described also includes:User's request degree analysis is carried out to the business in the unidentified business library, if the user's request degree reaches default the Two threshold values, then corresponding business is transferred to the service feature storehouse.
- 4. according to the method any one of claim 1-3, it is characterised in that described to obtain the DPI data currently flowed through Corresponding business to be identified, including:In default very first time threshold value, business to be identified corresponding to the DPI data currently flowed through is obtained;Methods described also includes:If in the very first time threshold value, the business to be identified is not got, then judges that the business to be identified is not belonging to Current service feature storehouse.
- 5. according to the method any one of claim 1-3, it is characterised in that if the business to be identified is not belonging to Current service feature storehouse, then detect whether that user occurs actively triggers behavior for the business to be identified, including:If the business to be identified is not belonging to current service feature storehouse, detect from current time, at default second Between in threshold value, if user occurs and actively triggers behavior for the business to be identified;If described do not occur, the business to be identified is stored to early warning business library, including:If in second time threshold, user does not occur and actively triggers behavior for the business to be identified, then by institute Business to be identified is stated to store to the early warning business library.
- A kind of 6. business identifying system, it is characterised in that including:Acquisition module, for obtaining business to be identified corresponding to the DPI data currently flowed through;Identification module, if being not belonging to current service feature storehouse for the business to be identified, detect whether that user's pin occurs Behavior is actively triggered to the business to be identified;Processing module, if behavior is actively triggered for the business to be identified for user to occur, by the industry to be identified Business is stored to unidentified business library;The processing module, if being additionally operable to not occur, the business to be identified is stored to early warning business library, and according to current Business in the early warning business library, carry out early warning processing.
- 7. system according to claim 6, it is characterised in that the system also includes:First analysis module, for carrying out safe class analysis to the business in the early warning business library, if the safe class Reach default first threshold, then corresponding business is transferred to the unidentified business library.
- 8. system according to claim 6, it is characterised in that the system also includes:Second analysis module, for carrying out user's request degree analysis to the business in the unidentified business library, if the user Demand degree reaches default Second Threshold, then corresponding business is transferred into the service feature storehouse.
- 9. according to the system any one of claim 6-8, it is characterised in thatThe acquisition module, currently flowed through specifically in default very first time threshold value, acquisition is described corresponding to DPI data Business to be identified;The acquisition module, if being additionally operable in the very first time threshold value, the business to be identified is not got, then judges institute State business to be identified and be not belonging to current service feature storehouse.
- 10. according to the system any one of claim 6-8, it is characterised in thatThe identification module, if being not belonging to current service feature storehouse specifically for the business to be identified, detect from current From moment, in default second time threshold, if user occurs and actively triggers behavior for the business to be identified;The processing module, if being directed to the business to be identified specifically for user in second time threshold, does not occur Actively trigger behavior, then the business to be identified is stored to the early warning business library.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710611555.3A CN107483411B (en) | 2017-07-25 | 2017-07-25 | Service identification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710611555.3A CN107483411B (en) | 2017-07-25 | 2017-07-25 | Service identification method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107483411A true CN107483411A (en) | 2017-12-15 |
CN107483411B CN107483411B (en) | 2020-01-31 |
Family
ID=60596764
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710611555.3A Active CN107483411B (en) | 2017-07-25 | 2017-07-25 | Service identification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107483411B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109447320A (en) * | 2018-09-27 | 2019-03-08 | 中国联合网络通信集团有限公司 | The recognition methods of customer service, apparatus and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102025636A (en) * | 2010-12-09 | 2011-04-20 | 北京星网锐捷网络技术有限公司 | Message feature processing method and device as well as network equipment |
US20130288636A1 (en) * | 2012-04-12 | 2013-10-31 | Kelly Roy Peterson | Location data updating and transmission |
CN104796406A (en) * | 2015-03-20 | 2015-07-22 | 杭州华三通信技术有限公司 | Method and device for identifying application |
CN106612241A (en) * | 2015-10-27 | 2017-05-03 | 中国移动通信集团浙江有限公司 | Service control method and service control device |
CN106921637A (en) * | 2015-12-28 | 2017-07-04 | 华为技术有限公司 | The recognition methods of the application message in network traffics and device |
-
2017
- 2017-07-25 CN CN201710611555.3A patent/CN107483411B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102025636A (en) * | 2010-12-09 | 2011-04-20 | 北京星网锐捷网络技术有限公司 | Message feature processing method and device as well as network equipment |
US20130288636A1 (en) * | 2012-04-12 | 2013-10-31 | Kelly Roy Peterson | Location data updating and transmission |
CN104796406A (en) * | 2015-03-20 | 2015-07-22 | 杭州华三通信技术有限公司 | Method and device for identifying application |
CN106612241A (en) * | 2015-10-27 | 2017-05-03 | 中国移动通信集团浙江有限公司 | Service control method and service control device |
CN106921637A (en) * | 2015-12-28 | 2017-07-04 | 华为技术有限公司 | The recognition methods of the application message in network traffics and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109447320A (en) * | 2018-09-27 | 2019-03-08 | 中国联合网络通信集团有限公司 | The recognition methods of customer service, apparatus and system |
Also Published As
Publication number | Publication date |
---|---|
CN107483411B (en) | 2020-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5966650A (en) | Detecting mobile telephone misuse | |
CN106295349A (en) | Risk Identification Method, identification device and the anti-Ore-controlling Role that account is stolen | |
CN106452955B (en) | A kind of detection method and system of abnormal network connection | |
CN104123496B (en) | The hold-up interception method and device of a kind of rogue software, terminal | |
CN107220181A (en) | A kind of abnormal process localization method, apparatus and system | |
CN103685222A (en) | A data matching detection method based on a determinacy finite state automation | |
CN111934913A (en) | Intelligent network management system | |
CN105528558B (en) | A kind of detection method and device of private communication channel communication | |
Sharma et al. | WLI-FCM and artificial neural network based cloud intrusion detection system | |
CN106033438A (en) | Public sentiment data storage method and server | |
CN109409113A (en) | A kind of electric network data safety protecting method and distributed power grid data safety guard system | |
CN107483411A (en) | Business recognition method and system | |
CN107493258A (en) | A kind of intruding detection system based on network security | |
CN107194265A (en) | A kind of device of the warehouse compartment supervision based on block chain image processing techniques | |
CN102143151B (en) | Deep packet inspection based protocol packet spanning inspection method and deep packet inspection based protocol packet spanning inspection device | |
CN104318665A (en) | System for precluding financial false cards | |
CN106161127B (en) | Class of subscriber detection method and device | |
WO2020161808A1 (en) | Priority determination device, priority determination method, and computer-readable medium | |
CN115296895B (en) | Request response method and device, storage medium and electronic equipment | |
CN110120109A (en) | A kind of airport pipe well inspection management method, terminal, server and system | |
CN109583205A (en) | A kind of data information security management method | |
CN112434287B (en) | Method, device, equipment and storage medium for detecting Hook | |
US20200226257A1 (en) | System and method for identifying activity in a computer system | |
CN104052852A (en) | Communication method and device | |
CN1494257A (en) | Method of proceeding real time monitoring against identification authorized charging service apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |