CN108810948A - A method of differentiating real traffic - Google Patents

A method of differentiating real traffic Download PDF

Info

Publication number
CN108810948A
CN108810948A CN201810536667.1A CN201810536667A CN108810948A CN 108810948 A CN108810948 A CN 108810948A CN 201810536667 A CN201810536667 A CN 201810536667A CN 108810948 A CN108810948 A CN 108810948A
Authority
CN
China
Prior art keywords
server
stid
sip
address
flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810536667.1A
Other languages
Chinese (zh)
Other versions
CN108810948B (en
Inventor
俞锋锋
吴梦雪
叶新江
刘宇
方毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHEJIANG MEIRI HUDONG NETWORK TECHNOLOGY Co Ltd
Original Assignee
ZHEJIANG MEIRI HUDONG NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHEJIANG MEIRI HUDONG NETWORK TECHNOLOGY Co Ltd filed Critical ZHEJIANG MEIRI HUDONG NETWORK TECHNOLOGY Co Ltd
Priority to CN201810536667.1A priority Critical patent/CN108810948B/en
Publication of CN108810948A publication Critical patent/CN108810948A/en
Application granted granted Critical
Publication of CN108810948B publication Critical patent/CN108810948B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition

Abstract

The present invention provides a kind of methods differentiating real traffic, including:Step S100 receives flow discriminating and asks and record to receive the time T that the flow differentiates request, and the flow, which differentiates, asks to include STID, SIP;Step S200 executes step S300 if STID is present in the Termination ID of the operation data of first server;The first server is stored with the operation data sent from the credible SDK for being installed to multiple mobile terminals, the IP address of the mobile terminal when operation data includes the Termination ID for the mobile terminal that credible SDK is mounted to, operation data transmission and generated time;Step S300, if STID corresponding IP address in first server is matched with SIP, and T-T1≤S1, then will differentiate that the flow status of request is set as FS1;Wherein S1 is first time threshold, and T1 is the generated time corresponding to STID and SIP stored in first server;Step S700, if flow status is located in real traffic status list TFS, then it is determined that flow differentiates that request is real traffic.

Description

A method of differentiating real traffic
Technical field
The present invention relates to a kind of information processing method more particularly to a kind of methods differentiating real traffic.
Background technology
With the development of intelligent terminal, the use of APP has obtained greatly popularizing.Counting user is may require that in many APP Flow, and flow information is transferred to the background devices of APP.The flow information being likely to occur includes but not limited to:In APP The number that specific/what's new is used, certain numbers read specific works in class APP and be clicked reading or access are certain The number etc. that embedded advertisement is clicked or browses in APP.Occurred more false flow in flow information, i.e., it is logical It crosses and uses malice brush flow program, the user of APP is used in the terminal that disguises oneself as, produce and false stream that non-user really generates Amount.
The means of currently used anti-false flow are mainly log analysis method, are sent out from the statistical analysis of daily record data It is now abnormal, such as:The ratio of click volume/pageview is excessively high or changes with time larger, and a large amount of flows are concentrated by several IP Generate etc..Log analysis method is to carry out the discovery of false flow based on statistics common sense or abnormal distribution, there is also it is following not Foot:
1, needing to accumulate certain data on flows effectively to carry out, and belong to posteriority mode, provided for false flow Existing space;
2, specific primary real traffic request can not be navigated to, i.e., can not judge certain traffic requests of specific APP It is real traffic or false flow.
Applicant provides a kind of thinking for solving above-mentioned technical problem in Chinese patent application CN201711079108, this Invention is made every effort to provide another thinking for solving above-mentioned technical problem.
Invention content
To solve the above-mentioned problems, first embodiment of the invention provides a kind of method differentiating real traffic, packet Include following steps:
Step S100 receives flow and differentiates request and record the time T for receiving the flow discriminating request, the stream Amount differentiates that request includes STID, SIP;Wherein, STID is the Termination ID of traffic source terminal, and SIP is the IP of traffic source terminal Address;
Step S200, if STID is present in the Termination ID of the operation data of first server (such as Redis servers) In, then executing step S300;The first server is stored with to be sent from the credible SDK for being installed to multiple mobile terminals Operation data, the operation data include the Termination ID for the mobile terminal that credible SDK is mounted to, operation data send when The IP address of mobile terminal and generated time;
Step S300, if STID corresponding IP address in first server is matched with SIP, and T-T1≤S1, then It will differentiate that the flow status of request is set as FS1;Wherein S1 is first time threshold, and T1 is the correspondence stored in first server In the generated time of STID and SIP;
Step S700, if flow status is located in real traffic status list TFS, then it is determined that flow differentiates that request is Real traffic.
To solve the above-mentioned problems, second embodiment of the present invention provides a kind of method differentiating real traffic, packet Include following steps:
Step S100 receives flow and differentiates request and record the time T for receiving the flow discriminating request, the stream Amount differentiates that request includes STID, SIP;Wherein, STID is the Termination ID of traffic source terminal, and SIP is the IP of traffic source terminal Address;
Step S200, if STID is not present in the operation data of first server (such as being embodied as Redis servers) Termination ID in, then executing step S500;The first server is stored with can from be installed to multiple mobile terminals Believe the operation data that SDK is sent, the operation data includes the Termination ID for the mobile terminal that credible SDK is mounted to;
Step S500, if STID is present in second server (such as being also implemented as Redis servers), and T-T2≤ S3, then executing step S600;Wherein, the Termination ID of multiple mobile terminals, each terminal are stored in the second server ID corresponds to the nearest active time of mobile terminal and one or more possession codings;The S3 is third time threshold, and T2 is The nearest active time corresponding to STID stored in second server;
Step S600, if the corresponding possession in second server of STID encodes possession coding corresponding with SIP SIPC is matched, then will differentiate that the flow status of request is set as FS4;
Step S700, if flow status is located in real traffic status list TFS, then it is determined that flow differentiates that request is Real traffic.
Description of the drawings
Fig. 1 is the schematic flow chart of the discriminating real traffic of the present invention;
Fig. 2 is the illustrative diagram of the first server storage content of the present invention;
Fig. 3 is the illustrative diagram of the second server storage content of the present invention.
Specific implementation mode
To keep the purpose, technical scheme and advantage of embodiment of the present invention clearer, implement below in conjunction with the present invention Attached drawing in mode carries out clear, complete description to technical scheme of the present invention, it is clear that described embodiment is this Invent a part of embodiment, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill The every other embodiment that personnel are obtained without making creative work belongs to the model that the present invention protects It encloses.
As shown in Figure 1, the present invention provides a kind of method differentiating real traffic, include the following steps:
Step S100 receives flow discriminating and asks and record to receive the time T that flow differentiates request, and flow discriminating is asked It asks including STID, SIP;Wherein, STID is the Termination ID of traffic source terminal, and SIP is the addresses IP of traffic source terminal.It can Choosing, flow differentiates that request can also use the non-reversible HASH algorithms such as MD5, carrys out protection information safety.According to the present invention, source Terminal is preferably realised as mobile terminal, the including but not limited to physical equipments such as mobile phone, tablet computer, and is equipped with application thereon Program APP.
According to the present invention, flow differentiates that request can be that the flow of source APP differentiates request, i.e., mobile terminal directly transmits Traffic requests, or by be responsible for flow information other third-party platforms forwarding flow differentiate request, third-party platform Example include but not limited to ADX (Ad Exchange), SSP (Sell-Side Platform) etc..Those skilled in the art know Dawn, any flow differentiate request, as long as carrying STID, SIP and SAPPID of source terminal, are suitable for the skill of the application Art scheme, to which the protection domain of the application can be fallen into.
According to the present invention, it can be integrated with credible SDK in some APP of mobile terminal, credible SDK is not integrated in some APP. The developer of credible SDK can be identical as the developer of APP, can also be the third party developer different from the developer of APP. As it is exemplary and not restrictive, example of credible SDK is that applicant develops " a to push away SDK ".
Step S200, if STID is present in the operation data of first server (such as being embodied as Redis servers) In Termination ID, then according to the first aspect of the invention, executing step S300.Illustrate by taking Fig. 2 as an example, if STID is One in IMEI-1, IMEI-2 or IMEI-3, then can consider that STID is present in the operation data of first server In Termination ID.
As shown in Fig. 2, first server is stored with the operation sent from the credible SDK for being installed to multiple mobile terminals Data, mobile terminal when operation data includes the Termination ID for the mobile terminal that credible SDK is mounted to, operation data is sent IP address and generated time.Further, first server also stores possession coding corresponding with IP address and generated time.Eventually It is the unique mark of terminal, such as IMEI, IMSI, unique Android system mark, and/or user-defined arbitrary energy to hold ID Enough identify the ID etc. of terminal, it is preferred that as shown in Fig. 2, Termination ID is the IMEI of mobile terminal.Those skilled in the art know, Operation data can be the initial data (such as running log) that credible SDK is sent, or (such as be run to initial data Daily record) data obtained after arbitrary technological means is handled are provided in the prior art, can also include initial data Also include data after handling.
Step S300, if STID corresponding IP address in first server is matched with SIP, and T-T1≤S1, still Illustrate by taking Fig. 2 as an example, it is assumed that STID IMEI-1, SIP IP-12, it may be considered that STID is corresponding in first server IP address is matched with SIP.It will so differentiate that the flow status of request is set as FS1.Wherein S1 is first time threshold, preferably , S1 should preferably be not less than the maximum cycle that credible SDK sends initial data (such as running log), so that service Device received in the S1 times before flow differentiates request, can receive the running log that feasible SDK is sent.Preferably, The general values of S1 are 10-60 minutes, are most preferably set as 30 minutes.T1 be first server in store correspond to STID and The generated time of SIP, in the preceding example, T1 t21.
Further, a variety of times may be used in generated time T1.Simply, T1 is that mobile terminal sends running log Time;For another example, T1 is that server receives time of running log and do not need mobile terminal in this case and send daily record Time is encapsulated into running log, can save the network flow of some.
It is currently preferred, determine that generated time T1=Ta-Tb+Tc, wherein Ta are daily record time of origin on mobile terminal, Tb is daily record sending time on mobile terminal, and Tc is the time that server receives running log.Obviously, Ta and Tb is movement The time that terminal provides, Tc are the time that server provides.The T1 that this mode obtains is more accurate, specifically includes following two Technique effect:
The first, evaded mobile terminal to generate daily record and send the inconsistent situation of logging time.Such as in some cases, Credible SDK obtains the information of mobile terminal when APP starts, and after APP stable a period of times or before APP exits Just running log is sent to server.Illustratively, credible SDK is 12:00 obtains the information of mobile terminal, generating run day Will, 12:Running log is sent to server by 30, at this point, if running time T 1 is set as 12 by server:30, then There will be inaccurate possibilities.
The second, the case where correcting the Time Inconsistency of mobile terminal and server.The time of server is generally standard Time, but the time of some mobile terminals and standard time existence time are poor.For example, when the time of server is 12:00 When, the time of some mobile terminals is 12:05, i.e., it is 5 minutes fast.In this way, when mobile terminal encapsulates in running log Between be " 12:When 05 ", the actual standard time is only " 12:00".It, can be to this time difference using currently preferred mode It is corrected.
In step S300, credible SDK is sent to the original number of server (in the S1 times) in the near future in operation data source According to (such as running log), it can be considered that being believable.When SIP is consistent with the IP address in operation data, then it is assumed that SIP is authentic and valid on maximum probability, rather than the IP address generated by technological means falseness.That is, generally, recognizing Real traffic is indicated for flow status FS1.
Further, when APP starts, initial data (such as running log) is sent to the first clothes by credible SDK Business device so that initial data (such as running log) can differentiate that request be triggered to up to server earlier than flow, so that clothes Device be engaged in when receiving traffic requests, it is easier to complete the judgement of step S300.
Further, STID corresponding IP address and the matched judgements of SIP in first server are specific in step S300 Including:
A kind of optional mode is, if IPA ≠ Null, and SIP is the only element in IPA, then judging that STID exists Corresponding IP address in first server is matched with SIP, is otherwise judged as mismatching.
Preferred another way is, if SIP ∈ IPA, to judge corresponding IPs of the STID in first server Address is matched with SIP;Otherwise, it is judged as mismatching.The addresses IP that the preferred embodiment fully takes into account mobile terminal can The case where capable of rationally changing within the time of S1, such as be altered to another WIFI from the region that a WIFI is covered and cover The region of lid, or it is altered to the region of mobile network's connection, so that the addresses IP dynamically distributed change, that is, exist In the S1 times, two or more IP address may reasonably occur in mobile terminal.Therefore, if SIP with the two or it is multiple One in IP address consistent, and it is consistent with the IP address in operation data to be considered as SIP, can to which kind mode is compared earlier above Reduce the False Rate that flow differentiates.
Wherein, IPA is the set of corresponding IP address of the STID in first server.
Those skilled in the art know, as long as IPA1 and SIP meet forgoing relationship, that is, fall into protection scope of the present invention, The present invention is not intended to limit the specific method step for the forgoing relationship for obtaining IPA1 and SIP.
According to the present invention, in step S300, if STID corresponding IP address in first server is mismatched with SIP, Or T-T1 > S1, then executing step S400;
Step S400, if the corresponding possessions SIP encode SAC and STID corresponding possession codings in first server Match, and T-T1≤S2, then setting flow status to FS2.Wherein, S2 is the second time threshold more than S1, it is preferred that S2 General value is 8-16 hours, is most preferably set as 12 hours.
STID judgements of corresponding possession codes match in first server specifically include in step S400:
A kind of optional mode is, if DID ≠ Null, and SAC is the only element in DID, then judge SAC with STID corresponding possession codes match in first server, is otherwise judged as mismatching.
Preferred another way is, if SAC ∈ DID, to judge that SAC and STID are corresponding in first server Otherwise possession codes match is judged as mismatching;Wherein, DID is corresponding possession codings of the STID in first server Set.The corresponding geographic area of IP address that preferred embodiment fully takes into account mobile terminal may be within the time of S2 The case where rationally changing, such as it is moved to another city from a city, to which kind mode is compared earlier above, can reduce The False Rate that flow differentiates.
Further, IP address and the mapping relations of geographic area may be used either type in the prior art and realize, Geographic area may range from city (such as Beijing), or the specific region in city (such as Haidian District or in Close village area etc.).
According to the present invention, in step S400, if the corresponding possession coding SAC and STID of SIP are right in first server The possession coding answered mismatches or T-T1 > S2, then setting flow status to FS3.
In step S200, if STID is not present in the end of the operation data of first server (such as Redis servers) It holds in ID, then according to the second aspect of the invention, executing step S500.It is worth noting that, second side of the present invention The technical term and technological means used in face is merely able to the technical term used and technology hand with the first aspect of the invention Section is identical or essentially identical, the reason of based on succinctly expressing, applicant no longer to relevant and technical term and technological means into Row repeats.
Step S500, if STID is present in second server (such as being also implemented as Redis servers), and T-T2≤ S3, then executing step S600;If STID is not present in second server or T-T2 > S3, it will differentiate request Flow status is set as FS5.Wherein, the Termination ID of multiple mobile terminals, each Termination ID are stored in the second server The nearest active time of corresponding mobile terminal and one or more possession codings;The S3 is third time threshold, when third Between threshold value be 2-6 months, preferably 3 months.The T2 is the nearest active time corresponding to STID stored in second server.
Step S600, if the corresponding possession in second server of STID encodes possession coding corresponding with SIP SIPC is matched, then will differentiate that the flow status of request is set as FS4;, whereas if STID's is corresponding in second server Possession encode corresponding with SIP possession coding SIPC mismatches, then setting flow status to FS6.
The similar technology of first aspect using the present invention, STID is corresponding in second server in the step S600 Possession encodes the matched judgements of possession coding SIPC corresponding with SIP and specifically includes:
A kind of optional mode is, if DID2 ≠ Null, and SIPC is the only element in DID, then judging SIPC With STID in second server corresponding possession codes match, be otherwise judged as mismatching.
Preferred another way is, if SIPC ∈ DID2, to judge that SIPC and STID are right in second server Otherwise the possession codes match answered is judged as mismatching;Wherein, DID2 is that corresponding possessions of the STID in second server is compiled The set of code.
First and second aspect according to the present invention, further includes step S700.
Step S700, if flow status is located in real traffic status list TFS, then it is determined that flow differentiates that request is Real traffic.Wherein, the flow status in TFS is self-defined flow status, and two methods are provided in the present invention to be promoted Flexibility.For example, TFS={ FS1, FS2 } can be defined, certainly when the first aspect of the invention is used alone TFS={ FS1 } or TFS={ FS1, FS2, FS3 } can also be defined;It, can when the second aspect of the invention is used alone To define TFS={ FS3 };Be used in combination the present invention first and second aspect when, can define TFS=FS1, FS2, FS4}。
In addition, those skilled in the art know, although in the present invention in fig. 1 by the unified drafting of first and second aspect, But this does not interfere two aspects of the present invention are independent to implement, to constitute two technical solutions arranged side by side, do not repel yet by Two aspects of present aspect are used in combination, to constitute the independent technique scheme of combination.
Further, the present invention also provides the update methods of operation data in first server.Specifically, when the first clothes When business device receives the running log that credible SDK is sent, operation data is updated using running log, running log includes credible Termination ID, IP address of terminal and the running log generated time LT of mobile terminal where SDK;Update specifically includes:
Step S1010 executes step if the Termination ID in running log is present in the Termination ID of operation data S1020。
Step S1020, if the IP address of terminal in running log is with being present in the corresponding IP of Termination ID of operation data In location, then obtaining the corresponding time IPT of IP address and the corresponding time SACT of the corresponding possession coding of IP address;If LT- IPT > S1, then updating IPT and SACT using LT;It is no to then follow the steps S1020.
Step S1020 updates SACT if LT-IPT > S2 using LT.
The above is only the better embodiment of the present invention, is not intended to limit the present invention in any form, every According to the technical essence of the invention to any simple modification, equivalent variations made by embodiment of above, each fall within the present invention's Within protection domain.

Claims (10)

1. a kind of method differentiating real traffic, includes the following steps:
Step S100 receives flow and differentiates request and record the time T for receiving the flow discriminating request, the flow mirror It does not invite and asks including STID, SIP;Wherein, STID is the Termination ID of traffic source terminal, and SIP is the IP address of traffic source terminal;
Step S200, if STID is present in the terminal of the operation data of first server (such as being embodied as Redis servers) In ID, then executing step S300;The first server is stored with from the credible SDK hairs for being installed to multiple mobile terminals The operation data sent, when the operation data includes the Termination ID for the mobile terminal that credible SDK is mounted to, operation data transmission Mobile terminal IP address and generated time;
Step S300, if STID corresponding IP address in first server is matched with SIP, and T-T1≤S1, then will mirror The flow status asked is not invited to be set as FS1;Wherein S1 is first time threshold, and T1 corresponds to for what is stored in first server The generated time of STID and SIP;
Step S700, if flow status is located in real traffic status list TFS, then it is determined that flow differentiates that request is true Flow.
2. the method according to claim 1 for differentiating real traffic, which is characterized in that STID is the in the step S300 Corresponding IP address is specifically included with the matched judgements of SIP in one server:
If IPA ≠ Null, and SIP is the only element in IPA, then judging corresponding IPs of the STID in first server Address is matched with SIP, is otherwise judged as mismatching;Alternatively,
If SIP ∈ IPA, judge that corresponding IP address of the STID in first server is matched with SIP;Otherwise, judge To mismatch;
Wherein, IPA is the set of corresponding IP address of the STID in first server.
3. the method according to claim 1 or 2 for differentiating real traffic, which is characterized in that the operation data further includes Possession coding corresponding with IP address;In the step S300, if STID corresponding IP address and SIP in first server Mismatch or T-T1>S1, then executing step S400;
Step S400, if the corresponding possessions SIP encode SAC and STID corresponding possession codes match in first server, And T-T1≤S2, then setting flow status to FS2;Wherein, S2 is the second time threshold more than S1.
4. the method according to claim 3 for differentiating real traffic, which is characterized in that STID is the in the step S400 The judgement of corresponding possession codes match specifically includes in one server:
If DID ≠ Null, and SAC is the only element in DID, then judging that SAC and STID are corresponding in first server Possession codes match, be otherwise judged as mismatching;Alternatively,
If SAC ∈ DID, judges SAC and the STID corresponding possession codes match in first server, be otherwise judged as It mismatches;Wherein, DID is the set of corresponding possession codings of the STID in first server.
5. the method according to claim 3 or 4 for differentiating real traffic, which is characterized in that in the step S400, if The corresponding possessions SIP encode SAC and STID corresponding possession coding mismatch or T-T1 in first server>S2, then Set flow status to FS3.
6. the method according to claim 5 for differentiating real traffic, which is characterized in that when the first server receives When the running log that credible SDK is sent, operation data is updated using running log, the running log includes the credible places SDK Mobile terminal Termination ID, IP address of terminal and running log generated time LT;The update specifically includes:
Step S1010 executes step if the Termination ID in running log is present in the Termination ID of operation data S1020;
Step S1020, if the IP address of terminal in running log is present in the corresponding IP address of Termination ID of operation data, It so obtains the corresponding time IPT of IP address and the corresponding possession of IP address encodes corresponding time SACT;If LT-IPT> S1, then updating IPT and SACT using LT;It is no to then follow the steps S1020;
Step S1020, if LT-IPT>S2, then updating SACT using LT.
7. according to the method for any discriminating real traffic of claim 1-5, wherein first time threshold 10-60 Minute, preferably 30 minutes.
8. according to the method for any discriminating real traffic of claim 1-5, wherein second time threshold is that 8-16 is small When, preferably 12 hours.
9. according to the method for any discriminating real traffic of claim 1-5, wherein the mobile terminal ID is movement The IMEI of terminal.
10. according to the method for any discriminating real traffic of claim 1-5, wherein the flow status in the TFS For self-defined flow status.
CN201810536667.1A 2018-05-29 2018-05-29 Method for identifying real flow Active CN108810948B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810536667.1A CN108810948B (en) 2018-05-29 2018-05-29 Method for identifying real flow

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810536667.1A CN108810948B (en) 2018-05-29 2018-05-29 Method for identifying real flow

Publications (2)

Publication Number Publication Date
CN108810948A true CN108810948A (en) 2018-11-13
CN108810948B CN108810948B (en) 2021-03-19

Family

ID=64089213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810536667.1A Active CN108810948B (en) 2018-05-29 2018-05-29 Method for identifying real flow

Country Status (1)

Country Link
CN (1) CN108810948B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112511459A (en) * 2020-11-23 2021-03-16 恒安嘉新(北京)科技股份公司 Traffic identification method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1741526A (en) * 2005-09-05 2006-03-01 北京启明星辰信息技术有限公司 Method and system for detecting exception flow of network
CN101438255A (en) * 2004-12-07 2009-05-20 思科技术公司 Network and application attack protection based on application layer message inspection
CN101577645A (en) * 2009-06-12 2009-11-11 北京星网锐捷网络技术有限公司 Method and device for detecting counterfeit network equipment
CN102394868A (en) * 2011-10-12 2012-03-28 镇江金钛软件有限公司 Detection method for DDoS attacked address of dynamic threshold
CN102480711A (en) * 2010-11-30 2012-05-30 中国电信股份有限公司 Flow accounting method and packet data service node
CN107707509A (en) * 2016-08-08 2018-02-16 阿里巴巴集团控股有限公司 Identify and assist in identifying the method, apparatus and system of false flow

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101438255A (en) * 2004-12-07 2009-05-20 思科技术公司 Network and application attack protection based on application layer message inspection
CN1741526A (en) * 2005-09-05 2006-03-01 北京启明星辰信息技术有限公司 Method and system for detecting exception flow of network
CN101577645A (en) * 2009-06-12 2009-11-11 北京星网锐捷网络技术有限公司 Method and device for detecting counterfeit network equipment
CN102480711A (en) * 2010-11-30 2012-05-30 中国电信股份有限公司 Flow accounting method and packet data service node
CN102394868A (en) * 2011-10-12 2012-03-28 镇江金钛软件有限公司 Detection method for DDoS attacked address of dynamic threshold
CN107707509A (en) * 2016-08-08 2018-02-16 阿里巴巴集团控股有限公司 Identify and assist in identifying the method, apparatus and system of false flow

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曹晓梅: "《基于流量预测的传感器网络拒绝服务攻击检测方案》", 《计算机学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112511459A (en) * 2020-11-23 2021-03-16 恒安嘉新(北京)科技股份公司 Traffic identification method and device, electronic equipment and storage medium
CN112511459B (en) * 2020-11-23 2024-04-26 恒安嘉新(北京)科技股份公司 Traffic identification method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN108810948B (en) 2021-03-19

Similar Documents

Publication Publication Date Title
US11411897B2 (en) Communication method and communication apparatus for message queue telemetry transport
CN103650545B (en) Machine To Machine (M2M) application server, XDMS servers and the method for M2M application group management
CN105657003B (en) Information processing method and server
CN104427519B (en) IP address ownership place management method and device
CN110070359A (en) Verification of data system, method, calculating equipment and storage medium based on block chain
CN109495592A (en) Data collaborative method and electronic equipment
CN106603394A (en) Method and device for realizing subscription notification
CN105245445A (en) Internet of things gateway
CN104159209A (en) Data traffic calibration method and device for mobile terminal
US7239878B2 (en) Telecommunication method for a wireless network
US9805111B2 (en) Data model pattern updating in a data collecting system
CN105228140A (en) A kind of data access method and device
CN109923847A (en) Call discovery method, apparatus, equipment and the storage medium of link
CN109246078B (en) Data interaction method and server
CN108810947A (en) The IP address-based server for differentiating real traffic
KR20210043865A (en) NGSI-LD API Wrapping Method
CN101110858A (en) Telecommunication report generation system and method thereof
RU2008112155A (en) SINGLE-PEOPLE PROTOCOL OF RESOLUTION OF NAMES OF SIMPLE INTERFACE OF APPLICATION PROGRAM
CN108810948A (en) A method of differentiating real traffic
CN105450589A (en) Remote procedure call method and system
CN114301870A (en) User identity management method and related product
CN108093428B (en) Server for authenticating real traffic
CN108768773A (en) The IP address-based server for differentiating real traffic
CN104506743A (en) Method and device for dynamically intercepting call
CN106326296A (en) Data query method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 310012 Room 418, West District, Building A, 525 Xixi Road, Xihu District, Hangzhou City, Zhejiang Province

Applicant after: Daily interactive Co., Ltd

Address before: 310012 Room 418, West District, Building A, 525 Xixi Road, Xihu District, Hangzhou City, Zhejiang Province

Applicant before: ZHEJIANG MEIRI INTERDYNAMIC NETWORK TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant