CN108566358A - A kind of iOS system network traffic interception method and system under the mobile phone based on iPhone - Google Patents

A kind of iOS system network traffic interception method and system under the mobile phone based on iPhone Download PDF

Info

Publication number
CN108566358A
CN108566358A CN201711398735.4A CN201711398735A CN108566358A CN 108566358 A CN108566358 A CN 108566358A CN 201711398735 A CN201711398735 A CN 201711398735A CN 108566358 A CN108566358 A CN 108566358A
Authority
CN
China
Prior art keywords
data
microsoft loopback
loopback adapter
ios system
iphone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711398735.4A
Other languages
Chinese (zh)
Other versions
CN108566358B (en
Inventor
张成康
张承超
黄良迅
彭炜凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SIE CONSULTING Co Ltd
Original Assignee
SIE CONSULTING Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SIE CONSULTING Co Ltd filed Critical SIE CONSULTING Co Ltd
Priority to CN201711398735.4A priority Critical patent/CN108566358B/en
Publication of CN108566358A publication Critical patent/CN108566358A/en
Application granted granted Critical
Publication of CN108566358B publication Critical patent/CN108566358B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/308Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content

Landscapes

  • Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses the iOS system network traffic interception method and system under a kind of mobile phone based on iPhone, and described method includes following steps:Step 1 receives starting up's request, and a Microsoft Loopback Adapter for being suitable for iOS system is created according to request instruction;Step 2 rewrites and cracks the routing table of injection iOS system, the data that original is normally received, and Microsoft Loopback Adapter is passed through in all drainages;Step 3 intercepts data by Microsoft Loopback Adapter, and implements integration processing;Step 4 carries out selective transmission to integrating treated data.The mechanism of iOS system, all TCP/UDP communication flows of full powers take over iPhone mobile phones can be got around, and can arbitrarily change the Content of Communication of the inside.The messaging channel of the one line APP such as wechat, microblogging, QQ can also be gone to private services device, and the data therefrom communication information.Sensitive wording can also be analyzed, as long as including this communication information can be removed as long as these sensitive wordings.

Description

A kind of iOS system network traffic interception method and system under the mobile phone based on iPhone
Technical field
The present invention relates to to-talk internet technical fields, and in particular to the iOS system net under a kind of mobile phone based on iPhone Network communicates hold-up interception method and system.
Background technology
Current.Based on network traffic interception can not be carried out to iOS system under iPhone mobile phones, and can not get around The mechanism of iOS system, all TCP/UDP communication flows of full powers take over iPhone mobile phones, and cannot arbitrarily change the inside Content of Communication.Also the messaging channel of a line APP such as wechat, microblogging, QQ cannot be gone to private services device simultaneously, and The data therefrom communication information.Also sensitive wording cannot be analyzed, as long as including this cannot be removed as long as these sensitive wordings The communication information.Realize that network traffic interception modification function is widely used in Android phone system, but iPhone mobile phones IOS system on currently without this function.
Invention content
In order to overcome the deficiencies of the above existing technologies, purpose of the present invention is to provide one kind based under iPhone mobile phones IOS system network traffic interception method and system, the mechanism of iOS system, the institute of full powers take over iPhone mobile phones can be got around There is TCP/UDP communication flows, and can arbitrarily change the Content of Communication of the inside.
In view of the above and other objects, the present invention proposes that the iOS system network communication under a kind of mobile phone based on iPhone is blocked The method of cutting, specifically comprises the following steps:
S1 receives starting up's request, and a Microsoft Loopback Adapter for being suitable for iOS system is created according to request instruction;
S2 obtains Microsoft Loopback Adapter data packet, rewrites and crack the routing table of injection iOS system, former normal receiving Data, all drainage pass through Microsoft Loopback Adapter;
S3 intercepts data by Microsoft Loopback Adapter, and implements integration processing;
S4 carries out selective transmission to integrating treated data.
Further, before step S3, data are packaged, and are implemented to the data set packet of transmission or the number of reception According to unpacking;
In step S3, the Data Integration processing to interception is completed in transfer server, screens and reconfigure parsing Filtering, includes being intercepted, being captured to the data of reception, or be filtered, change to the data of transmission;
In step S4, to integrating, treated that data are sent to server or client.
Further, it is described reconfigure parsing filtering include regular expression, search replacement and copy modification.
Further, for the Microsoft Loopback Adapter by cracking, the mode of decompiling obtains the bottom data structure of system, then right This bottom data carries out injection modification and creates;
The Microsoft Loopback Adapter has the function of to seize website and behavior record on both sides by the arms;
In order to achieve the above objectives, the present invention also provides the iOS system network traffic interceptions under a kind of mobile phone based on iPhone System specifically includes:
Microsoft Loopback Adapter creating unit creates one according to request instruction and is suitable for iOS systems for receiving starting up's request The Microsoft Loopback Adapter of system;
Injection unit is rewritten, the data packet for obtaining Microsoft Loopback Adapter creating unit rewrites and cracks injection iOS systems Microsoft Loopback Adapter is passed through in the routing table of system, the data that original is normally received, all drainage;
Data Integration processing unit by Microsoft Loopback Adapter and rewrites and cracks the routing table for injecting iOS system, logarithm According to being intercepted, and implement integration processing;
Transmission unit carries out selective transmission for integrating treated data to Data Integration processing unit.
Further, the system also includes:
Package module for being packaged data, and is implemented to unpack to the data set packet of transmission or the data of reception;
Transfer processing module, for being completed in transfer server to the processing of the Data Integration of interception, screening and group again Parsing filtering is closed, includes that the data of reception are intercepted, are captured, or the data of transmission are filtered, are changed;
Module is seized on both sides by the arms, for being seized on both sides by the arms to website and data information;
Memory module, for carrying out trace memory to system operatio behavior.
Compared with prior art, the invention has the advantages that:
The present invention carries out network traffic interception under iPhone mobile phones to iOS system, can get around the mechanism of iOS system, All TCP/UDP communication flows of full powers take over iPhone mobile phones, and can arbitrarily change the Content of Communication of the inside.It can be with The messaging channel of the one line APP such as wechat, microblogging, QQ is gone to private services device, and the data therefrom communication information.Also Sensitive wording can be analyzed, as long as including this communication information can be removed as long as these sensitive wordings.It can be according to the reality of enterprise Rule is arranged in border demand, can be used for secondary encryption, and enterprise's secondary development is suitble to use.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, other are can also be obtained according to these attached drawings Attached drawing.
Fig. 1 is the step flow chart of the iOS system network traffic interception method under a kind of mobile phone based on iPhone of the present invention;
Fig. 2 is one embodiment of the iOS system network traffic interception method under a kind of mobile phone based on iPhone of the present invention Flow;
Fig. 3 is the system architecture diagram of the iOS system network traffic interception system under a kind of mobile phone based on iPhone of the present invention.
Specific implementation mode
To make the object, technical solutions and advantages of the present invention clearer, it below by specific specific example and combines Embodiments of the present invention are illustrated, those skilled in the art can understand this hair easily by content disclosed in the present specification Bright further advantage and effect.The present invention also can be implemented or be applied by other different specific examples, in this specification Every details also can be based on different viewpoints with application, carry out without departing from the spirit of the present invention it is various modification and change.
Fig. 1 is one embodiment of the iOS system network traffic interception method under a kind of mobile phone based on iPhone of the present invention Step flow chart.
As shown in Figure 1, the iOS system network traffic interception method under a kind of mobile phone based on iPhone of the present invention, specific to wrap Include following steps:
S1 receives starting up's request, and a Microsoft Loopback Adapter for being suitable for iOS system is created according to request instruction;
S2 obtains Microsoft Loopback Adapter data packet, rewrites and crack the routing table of injection iOS system, former normal receiving Data, all drainage pass through Microsoft Loopback Adapter;
S3 intercepts data by Microsoft Loopback Adapter, and implements integration processing;
S4 carries out selective transmission to integrating treated data.
In the specific embodiment of the invention, before step S3, data are packaged, and implement the data set to transmission Packet or the data received are unpacked;
In step S3, the Data Integration processing to interception is completed in transfer server, screens and reconfigure parsing Filtering, includes being intercepted, being captured to the data of reception, or be filtered, change to the data of transmission.
Interception, capture operation in the present invention are by checking the communication bag inside Microsoft Loopback Adapter, carrying out packet analysis.Packet Content unpacked, after unpacking to byte stream carry out screening, screening to sensitive content is just filtered, or content is forwarded To given server transfer server.
Described to be forwarded to given server transfer server, as long as there is ip, when forwarding is specified to go to some ip 's.Such as:It is 123.123.123.123 that I has built a server ip in Ali's cloud, and data can be all forwarded to this by I On the address of platform server.I can build a server 111.33.44.55 in Huawei's cloud again, can also forward 2 simultaneously Platform.
Such as the server of the original transceiving data of wechat is:Mp.wx.qq.com, the present invention are led to after intercepting all Mp.wx.qq.com data turn to abc.com servers, are then sent to again again in this complete information of server process Mp.wx.qq.com, centre have carried out a capture action.
In step S4, to integrating, treated that data are sent to server or client.
Specifically, it is described reconfigure parsing filtering include regular expression, search replacement and copy modification.
Preferably, the Microsoft Loopback Adapter, by cracking, the mode of decompiling obtains the bottom data structure of system, then to this A bottom data carries out injection modification and creates;Specifically the present invention realizes that request is jumped by the routing table of rewriting iOS system The method turned, routing table data belong to IOS system low level datas, come out and then be processed modification by decompiling.
In the specific embodiment of the invention, by cracking, the mode of decompiling obtains the bottom data structure of system, then Injection modification is carried out to this bottom data again, i.e. bottom injects, and establishes and receives data and send two lines road, receiving data is Communication layers are implemented to intercept to data, capture operation, and transmission data is that communication layers are implemented to filter to data, modification operation.
As shown in Fig. 2, being one embodiment of the present of invention flow, multiple APP can be intercepted simultaneously, or change multiple The message content of APP.Example:Disabling family wechat hair circle of friends may be implemented, pay the bill with Alipay, QQ hair group's message starts The APP plug-in units developed of the iPhone mobile phones installation present invention, behind be referred to as this APP.The plug-in unit just exists automatically after starting once IPhone mobile phone running backgrounds, APP states may be at closing or terminate, but cannot unload this APP.After APP has started, That is normal operating iphone mobile phones, if iphone mobile phones are using the popular softwares such as wechat APP, QQAPP at this time, this App can be Backstage captures wechat and corresponds to all communication datas of common APP, including chat word, picture etc..It can be this after capture Chat message is forwarded to specified transfer server.Before wechat and corresponding common APP receipts connect message, data can also be carried out real-time It intercepts, administrator can configure on backstage, can add the sensitive wording of deletion.Such as receive " sensitive wording ", this APP can be automatic This message is filtered, wechat and corresponding common APP would not receive this message.User sends message in wechat by wireless network Before, such as have sent " sensitive wording ", this APP then carries out intercepting at once allows transmission to fail.The wireless network includes three big fortune Seek the wireless network of quotient, including wireless WiFi, 4G, 3G and 2G network.
The present invention is applicable in various communications protocols technical intercept, including http protocol:URLSession、AFNetworking Deng, TCP udp protocol:AsyncSocket, AsyncUdpSocket, GCDAsyncUdpSocket etc., SOCKET agreements: AsyncSocket, cocoaasyncsocket etc., POP3, FTP, SMTP connection can also realize interception, can also be according to reality The agreement of situation is customized.
Microsoft Loopback Adapter of the present invention, which also has, seizes web sites function, such as certain listed company on both sides by the arms, and mobile phone, online computing will be installed first Authentication Client logs in, could normal browsing website.At this time in the integrated present invention of Authentication Client, you can to control employee's mobile phone Internet behavior, mobile phone browser are accessing www.youku.com video networks, then my Microsoft Loopback Adapter inspection:If he Youku.com cannot be opened using the network of company, to save corporate networks bandwidth.It simultaneously again can be mobile phone access Www.163.com goes to www.21cn.com, is configured according to the actual conditions of enterprise, filters some unhealthy webpages, or Consume flow webpage.
The present invention has the function of behavior record, it is assumed that:The integrated present invention of Taobao APP, all mobile phones equipped with Taobao APP, As long as operation is primary, do not have to open again later, as long as hereafter mobile phone has network request that can all be recorded by Microsoft Loopback Adapter. Either any APP, including browser that system is included, can also be recorded.It is just forwarded to after certain amount is recorded specified Server is used for counting user behavioral data.It can count what website when user have accessed, have input in what Hold, stopped how long etc..
The present invention is highly suitable for enterprise, and rule can be arranged according to the actual demand of enterprise.Such as some guarantors Confidential information requires high enterprise, can intercept the communication of any software completely.Such as:The mobile phone that certain express company matches to courier On be mounted with【Addressee APP】, this software can integrate this technology at this time, as long as dress【Addressee APP】Iphone hands Machine, since the function of the present invention intercepts network, this TV station Iphone mobile phones can only use【Addressee APP】, other all app Network connection is can not be used all to block.
It is contemplated that the present invention may be use with secondary encryption, is suitble to enterprise's secondary development to use.Such as:The chat IM of certain OA systems Content is no encrypted, and it is to formulate exploitation to need encryption function, is carried out after chat content being captured using the present invention Then encryption retransmits out.As long as server is by the encryption method decryption of agreement.
Fig. 3 is one embodiment of the iOS system network traffic interception system under a kind of mobile phone based on iPhone of the present invention System architecture diagram.
As shown in figure 3, in order to achieve the above objectives, the present invention also provides the iOS system nets under a kind of mobile phone based on iPhone Network communicates intercepting system, specifically includes:
Microsoft Loopback Adapter creating unit creates one according to request instruction and is suitable for iOS systems for receiving starting up's request The Microsoft Loopback Adapter of system;
Injection unit is rewritten, the data packet for obtaining Microsoft Loopback Adapter creating unit rewrites and cracks injection iOS systems Microsoft Loopback Adapter is passed through in the routing table of system, the data that original is normally received, all drainage;
Data Integration processing unit by Microsoft Loopback Adapter and rewrites and cracks the routing table for injecting iOS system, logarithm According to being intercepted, and implement integration processing;
Transmission unit carries out selective transmission for integrating treated data to Data Integration processing unit.
Preferably, the system also includes:
Package module for being packaged data, and is implemented to unpack to the data set packet of transmission or the data of reception;
Transfer processing module, for being completed in transfer server to the processing of the Data Integration of interception, screening and group again Parsing filtering is closed, includes that the data of reception are intercepted, are captured, or the data of transmission are filtered, are changed;
Module is seized on both sides by the arms, for being seized on both sides by the arms to website and data information;
Memory module, for carrying out trace memory to system operatio behavior.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.

Claims (6)

1. a kind of iOS system network traffic interception method under mobile phone based on iPhone, which is characterized in that the method includes such as Lower step:
S1 receives starting up's request, and a Microsoft Loopback Adapter for being suitable for iOS system is created according to request instruction;
S2 obtains Microsoft Loopback Adapter data packet, rewrites and crack the routing table of injection iOS system, the number that original is normally received According to Microsoft Loopback Adapter is passed through in all drainages;
S3 intercepts data by Microsoft Loopback Adapter, and implements integration processing;
S4 carries out selective transmission to integrating treated data.
2. the iOS system network traffic interception method under a kind of mobile phone based on iPhone as described in claim 1, feature exist In:
Before step S3, data are packaged, and implement to unpack to the data set packet of transmission or the data of reception;
In step S3, the Data Integration processing to interception is completed in transfer server, screens and reconfigure parsing filtering, Include that the data of reception are intercepted, are captured, or the data of transmission are filtered, are changed;
In step S4, to integrating, treated that data are sent to server or client.
3. the iOS system network traffic interception method under a kind of mobile phone based on iPhone as claimed in claim 2, feature exist In, it is described reconfigure parsing filtering include regular expression, search replacement and copy modification.
4. the iOS system network traffic interception method under a kind of mobile phone based on iPhone as described in claim 1, feature exist In, the Microsoft Loopback Adapter by cracking, the mode of decompiling obtains the bottom data structure of system, then to this bottom data into Row injection modification creates;
The Microsoft Loopback Adapter has the function of to seize website and behavior record on both sides by the arms.
5. the iOS system network traffic interception system under a kind of mobile phone based on iPhone, which is characterized in that the system comprises:
Microsoft Loopback Adapter creating unit creates one according to request instruction and is suitable for iOS system for receiving starting up's request Microsoft Loopback Adapter;
Injection unit is rewritten, the data packet for obtaining Microsoft Loopback Adapter creating unit rewrites and cracks injection iOS system Microsoft Loopback Adapter is passed through in routing table, the data that original is normally received, all drainage;
Data Integration processing unit, by Microsoft Loopback Adapter and rewrite and crack injection iOS system routing table, to data into Row intercepts, and implements integration processing;
Transmission unit carries out selective transmission for integrating treated data to Data Integration processing unit.
6. the iOS system network traffic interception system under a kind of mobile phone based on iPhone as claimed in claim 5, feature exist In, the system also includes:
Package module for being packaged data, and is implemented to unpack to the data set packet of transmission or the data of reception;
Transfer processing module, for completing to handle the Data Integration of interception in transfer server, screening and reconfigure solution Analysis filtering, includes being intercepted, being captured to the data of reception, or be filtered, change to the data of transmission;
Module is seized on both sides by the arms, for being seized on both sides by the arms to website and data information;
Memory module, for carrying out trace memory to system operatio behavior.
CN201711398735.4A 2017-12-22 2017-12-22 iOS system network communication interception method and system based on iPhone mobile phone Active CN108566358B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711398735.4A CN108566358B (en) 2017-12-22 2017-12-22 iOS system network communication interception method and system based on iPhone mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711398735.4A CN108566358B (en) 2017-12-22 2017-12-22 iOS system network communication interception method and system based on iPhone mobile phone

Publications (2)

Publication Number Publication Date
CN108566358A true CN108566358A (en) 2018-09-21
CN108566358B CN108566358B (en) 2021-03-26

Family

ID=63529442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711398735.4A Active CN108566358B (en) 2017-12-22 2017-12-22 iOS system network communication interception method and system based on iPhone mobile phone

Country Status (1)

Country Link
CN (1) CN108566358B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109446086A (en) * 2018-10-29 2019-03-08 北京酷我科技有限公司 A kind of method of App inside packet capturing
CN111490939A (en) * 2020-03-30 2020-08-04 苏州瑞立思科技有限公司 High-performance windows network card driving method supporting advanced strategy configuration
CN111953595A (en) * 2019-10-24 2020-11-17 北京大学 Data transmission architecture based on virtual host
CN115499402A (en) * 2022-08-23 2022-12-20 北京天空卫士网络安全技术有限公司 Instant messaging information processing method, terminal and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070233857A1 (en) * 2006-03-30 2007-10-04 Nebuad, Inc. Network device for monitoring and modifying network traffic between an end user and a content provider
US7657011B1 (en) * 2006-03-16 2010-02-02 Juniper Networks, Inc. Lawful intercept trigger support within service provider networks
CN103916405A (en) * 2014-04-25 2014-07-09 厦门享游网络科技有限公司 Method for guiding flow of TCP/UDP of App on IOS
CN104506545A (en) * 2014-12-30 2015-04-08 北京奇虎科技有限公司 Data leakage prevention method and data leakage prevention device
CN105656943A (en) * 2016-03-15 2016-06-08 上海缔安科技股份有限公司 Application data interception system and method
CN105721419A (en) * 2014-12-19 2016-06-29 卡巴斯基实验室股份制公司 System and method for selecting means for intercepting network transmissions
CN106209838A (en) * 2016-07-08 2016-12-07 杭州迪普科技有限公司 The IP cut-in method of SSL VPN and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7657011B1 (en) * 2006-03-16 2010-02-02 Juniper Networks, Inc. Lawful intercept trigger support within service provider networks
US20070233857A1 (en) * 2006-03-30 2007-10-04 Nebuad, Inc. Network device for monitoring and modifying network traffic between an end user and a content provider
CN103916405A (en) * 2014-04-25 2014-07-09 厦门享游网络科技有限公司 Method for guiding flow of TCP/UDP of App on IOS
CN105721419A (en) * 2014-12-19 2016-06-29 卡巴斯基实验室股份制公司 System and method for selecting means for intercepting network transmissions
CN104506545A (en) * 2014-12-30 2015-04-08 北京奇虎科技有限公司 Data leakage prevention method and data leakage prevention device
CN105656943A (en) * 2016-03-15 2016-06-08 上海缔安科技股份有限公司 Application data interception system and method
CN106209838A (en) * 2016-07-08 2016-12-07 杭州迪普科技有限公司 The IP cut-in method of SSL VPN and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MRPEAK: "mitmproxy的使用", 《HTTPS://WWW.JIANSHU.COM/P/29647028989D》 *
颐和园: "ios charles proxy教程", 《HTTPS://BLOG.CSDN.NET/KMYHY/ARTICLE/DETAILS/74389070》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109446086A (en) * 2018-10-29 2019-03-08 北京酷我科技有限公司 A kind of method of App inside packet capturing
CN111953595A (en) * 2019-10-24 2020-11-17 北京大学 Data transmission architecture based on virtual host
CN111490939A (en) * 2020-03-30 2020-08-04 苏州瑞立思科技有限公司 High-performance windows network card driving method supporting advanced strategy configuration
CN115499402A (en) * 2022-08-23 2022-12-20 北京天空卫士网络安全技术有限公司 Instant messaging information processing method, terminal and system

Also Published As

Publication number Publication date
CN108566358B (en) 2021-03-26

Similar Documents

Publication Publication Date Title
US11379602B2 (en) Internal controls engine and reporting of events generated by a network or associated applications
CN106789259B (en) A kind of LoRa core network system and implementation method
US9954873B2 (en) Mobile device-based intrusion prevention system
CN108566358A (en) A kind of iOS system network traffic interception method and system under the mobile phone based on iPhone
CN103117906B (en) A kind of mobile terminal shares flux monitoring method during Wi-Fi hotspot
CN104580192B (en) The treating method and apparatus of the network access request of application program
US9794282B1 (en) Server with queuing layer mechanism for changing treatment of client connections
US8234361B2 (en) Computerized system and method for handling network traffic
US20150156183A1 (en) System and method for filtering network communications
US11700239B2 (en) Split tunneling based on content type to exclude certain network traffic from a tunnel
EP3424196A1 (en) Systems and methods for dynamic firewall policy configuration
KR102451237B1 (en) Security for container networks
CN107124402A (en) A kind of method and apparatus of packet filtering
US10601777B2 (en) Data inspection system and method
JP2024020524A (en) Methods and systems for efficient cyber protections of mobile devices
CN102857388A (en) Cloud detection safety management auditing system
US20230353600A1 (en) Distributed network and security operations platform
CN102420837B (en) NDIS (Network Driver Interface Standard)-based method and system
EP3590061A1 (en) Managing data encrypting application
US20190205776A1 (en) Techniques for policy-controlled analytic data collection in large-scale systems
Schulz et al. Tetherway: a framework for tethering camouflage
CN102572814A (en) Method, system and device for monitoring viruses in mobile terminal
CN105991353A (en) Fault location method and device
JP6828818B2 (en) Traffic optimizer, communication system, traffic optimization method and program
Copeland et al. A managed security environment for enterprise iPhones

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant