CN108810948A - A method of differentiating real traffic - Google Patents
A method of differentiating real traffic Download PDFInfo
- Publication number
- CN108810948A CN108810948A CN201810536667.1A CN201810536667A CN108810948A CN 108810948 A CN108810948 A CN 108810948A CN 201810536667 A CN201810536667 A CN 201810536667A CN 108810948 A CN108810948 A CN 108810948A
- Authority
- CN
- China
- Prior art keywords
- server
- stid
- sip
- address
- flow
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/04—Arrangements for maintaining operational condition
Abstract
The present invention provides a kind of methods differentiating real traffic, including:Step S100 receives flow discriminating and asks and record to receive the time T that the flow differentiates request, and the flow, which differentiates, asks to include STID, SIP;Step S200 executes step S300 if STID is present in the Termination ID of the operation data of first server;The first server is stored with the operation data sent from the credible SDK for being installed to multiple mobile terminals, the IP address of the mobile terminal when operation data includes the Termination ID for the mobile terminal that credible SDK is mounted to, operation data transmission and generated time;Step S300, if STID corresponding IP address in first server is matched with SIP, and T-T1≤S1, then will differentiate that the flow status of request is set as FS1;Wherein S1 is first time threshold, and T1 is the generated time corresponding to STID and SIP stored in first server;Step S700, if flow status is located in real traffic status list TFS, then it is determined that flow differentiates that request is real traffic.
Description
Technical field
The present invention relates to a kind of information processing method more particularly to a kind of methods differentiating real traffic.
Background technology
With the development of intelligent terminal, the use of APP has obtained greatly popularizing.Counting user is may require that in many APP
Flow, and flow information is transferred to the background devices of APP.The flow information being likely to occur includes but not limited to:In APP
The number that specific/what's new is used, certain numbers read specific works in class APP and be clicked reading or access are certain
The number etc. that embedded advertisement is clicked or browses in APP.Occurred more false flow in flow information, i.e., it is logical
It crosses and uses malice brush flow program, the user of APP is used in the terminal that disguises oneself as, produce and false stream that non-user really generates
Amount.
The means of currently used anti-false flow are mainly log analysis method, are sent out from the statistical analysis of daily record data
It is now abnormal, such as:The ratio of click volume/pageview is excessively high or changes with time larger, and a large amount of flows are concentrated by several IP
Generate etc..Log analysis method is to carry out the discovery of false flow based on statistics common sense or abnormal distribution, there is also it is following not
Foot:
1, needing to accumulate certain data on flows effectively to carry out, and belong to posteriority mode, provided for false flow
Existing space;
2, specific primary real traffic request can not be navigated to, i.e., can not judge certain traffic requests of specific APP
It is real traffic or false flow.
Applicant provides a kind of thinking for solving above-mentioned technical problem in Chinese patent application CN201711079108, this
Invention is made every effort to provide another thinking for solving above-mentioned technical problem.
Invention content
To solve the above-mentioned problems, first embodiment of the invention provides a kind of method differentiating real traffic, packet
Include following steps:
Step S100 receives flow and differentiates request and record the time T for receiving the flow discriminating request, the stream
Amount differentiates that request includes STID, SIP;Wherein, STID is the Termination ID of traffic source terminal, and SIP is the IP of traffic source terminal
Address;
Step S200, if STID is present in the Termination ID of the operation data of first server (such as Redis servers)
In, then executing step S300;The first server is stored with to be sent from the credible SDK for being installed to multiple mobile terminals
Operation data, the operation data include the Termination ID for the mobile terminal that credible SDK is mounted to, operation data send when
The IP address of mobile terminal and generated time;
Step S300, if STID corresponding IP address in first server is matched with SIP, and T-T1≤S1, then
It will differentiate that the flow status of request is set as FS1;Wherein S1 is first time threshold, and T1 is the correspondence stored in first server
In the generated time of STID and SIP;
Step S700, if flow status is located in real traffic status list TFS, then it is determined that flow differentiates that request is
Real traffic.
To solve the above-mentioned problems, second embodiment of the present invention provides a kind of method differentiating real traffic, packet
Include following steps:
Step S100 receives flow and differentiates request and record the time T for receiving the flow discriminating request, the stream
Amount differentiates that request includes STID, SIP;Wherein, STID is the Termination ID of traffic source terminal, and SIP is the IP of traffic source terminal
Address;
Step S200, if STID is not present in the operation data of first server (such as being embodied as Redis servers)
Termination ID in, then executing step S500;The first server is stored with can from be installed to multiple mobile terminals
Believe the operation data that SDK is sent, the operation data includes the Termination ID for the mobile terminal that credible SDK is mounted to;
Step S500, if STID is present in second server (such as being also implemented as Redis servers), and T-T2≤
S3, then executing step S600;Wherein, the Termination ID of multiple mobile terminals, each terminal are stored in the second server
ID corresponds to the nearest active time of mobile terminal and one or more possession codings;The S3 is third time threshold, and T2 is
The nearest active time corresponding to STID stored in second server;
Step S600, if the corresponding possession in second server of STID encodes possession coding corresponding with SIP
SIPC is matched, then will differentiate that the flow status of request is set as FS4;
Step S700, if flow status is located in real traffic status list TFS, then it is determined that flow differentiates that request is
Real traffic.
Description of the drawings
Fig. 1 is the schematic flow chart of the discriminating real traffic of the present invention;
Fig. 2 is the illustrative diagram of the first server storage content of the present invention;
Fig. 3 is the illustrative diagram of the second server storage content of the present invention.
Specific implementation mode
To keep the purpose, technical scheme and advantage of embodiment of the present invention clearer, implement below in conjunction with the present invention
Attached drawing in mode carries out clear, complete description to technical scheme of the present invention, it is clear that described embodiment is this
Invent a part of embodiment, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill
The every other embodiment that personnel are obtained without making creative work belongs to the model that the present invention protects
It encloses.
As shown in Figure 1, the present invention provides a kind of method differentiating real traffic, include the following steps:
Step S100 receives flow discriminating and asks and record to receive the time T that flow differentiates request, and flow discriminating is asked
It asks including STID, SIP;Wherein, STID is the Termination ID of traffic source terminal, and SIP is the addresses IP of traffic source terminal.It can
Choosing, flow differentiates that request can also use the non-reversible HASH algorithms such as MD5, carrys out protection information safety.According to the present invention, source
Terminal is preferably realised as mobile terminal, the including but not limited to physical equipments such as mobile phone, tablet computer, and is equipped with application thereon
Program APP.
According to the present invention, flow differentiates that request can be that the flow of source APP differentiates request, i.e., mobile terminal directly transmits
Traffic requests, or by be responsible for flow information other third-party platforms forwarding flow differentiate request, third-party platform
Example include but not limited to ADX (Ad Exchange), SSP (Sell-Side Platform) etc..Those skilled in the art know
Dawn, any flow differentiate request, as long as carrying STID, SIP and SAPPID of source terminal, are suitable for the skill of the application
Art scheme, to which the protection domain of the application can be fallen into.
According to the present invention, it can be integrated with credible SDK in some APP of mobile terminal, credible SDK is not integrated in some APP.
The developer of credible SDK can be identical as the developer of APP, can also be the third party developer different from the developer of APP.
As it is exemplary and not restrictive, example of credible SDK is that applicant develops " a to push away SDK ".
Step S200, if STID is present in the operation data of first server (such as being embodied as Redis servers)
In Termination ID, then according to the first aspect of the invention, executing step S300.Illustrate by taking Fig. 2 as an example, if STID is
One in IMEI-1, IMEI-2 or IMEI-3, then can consider that STID is present in the operation data of first server
In Termination ID.
As shown in Fig. 2, first server is stored with the operation sent from the credible SDK for being installed to multiple mobile terminals
Data, mobile terminal when operation data includes the Termination ID for the mobile terminal that credible SDK is mounted to, operation data is sent
IP address and generated time.Further, first server also stores possession coding corresponding with IP address and generated time.Eventually
It is the unique mark of terminal, such as IMEI, IMSI, unique Android system mark, and/or user-defined arbitrary energy to hold ID
Enough identify the ID etc. of terminal, it is preferred that as shown in Fig. 2, Termination ID is the IMEI of mobile terminal.Those skilled in the art know,
Operation data can be the initial data (such as running log) that credible SDK is sent, or (such as be run to initial data
Daily record) data obtained after arbitrary technological means is handled are provided in the prior art, can also include initial data
Also include data after handling.
Step S300, if STID corresponding IP address in first server is matched with SIP, and T-T1≤S1, still
Illustrate by taking Fig. 2 as an example, it is assumed that STID IMEI-1, SIP IP-12, it may be considered that STID is corresponding in first server
IP address is matched with SIP.It will so differentiate that the flow status of request is set as FS1.Wherein S1 is first time threshold, preferably
, S1 should preferably be not less than the maximum cycle that credible SDK sends initial data (such as running log), so that service
Device received in the S1 times before flow differentiates request, can receive the running log that feasible SDK is sent.Preferably,
The general values of S1 are 10-60 minutes, are most preferably set as 30 minutes.T1 be first server in store correspond to STID and
The generated time of SIP, in the preceding example, T1 t21.
Further, a variety of times may be used in generated time T1.Simply, T1 is that mobile terminal sends running log
Time;For another example, T1 is that server receives time of running log and do not need mobile terminal in this case and send daily record
Time is encapsulated into running log, can save the network flow of some.
It is currently preferred, determine that generated time T1=Ta-Tb+Tc, wherein Ta are daily record time of origin on mobile terminal,
Tb is daily record sending time on mobile terminal, and Tc is the time that server receives running log.Obviously, Ta and Tb is movement
The time that terminal provides, Tc are the time that server provides.The T1 that this mode obtains is more accurate, specifically includes following two
Technique effect:
The first, evaded mobile terminal to generate daily record and send the inconsistent situation of logging time.Such as in some cases,
Credible SDK obtains the information of mobile terminal when APP starts, and after APP stable a period of times or before APP exits
Just running log is sent to server.Illustratively, credible SDK is 12:00 obtains the information of mobile terminal, generating run day
Will, 12:Running log is sent to server by 30, at this point, if running time T 1 is set as 12 by server:30, then
There will be inaccurate possibilities.
The second, the case where correcting the Time Inconsistency of mobile terminal and server.The time of server is generally standard
Time, but the time of some mobile terminals and standard time existence time are poor.For example, when the time of server is 12:00
When, the time of some mobile terminals is 12:05, i.e., it is 5 minutes fast.In this way, when mobile terminal encapsulates in running log
Between be " 12:When 05 ", the actual standard time is only " 12:00".It, can be to this time difference using currently preferred mode
It is corrected.
In step S300, credible SDK is sent to the original number of server (in the S1 times) in the near future in operation data source
According to (such as running log), it can be considered that being believable.When SIP is consistent with the IP address in operation data, then it is assumed that
SIP is authentic and valid on maximum probability, rather than the IP address generated by technological means falseness.That is, generally, recognizing
Real traffic is indicated for flow status FS1.
Further, when APP starts, initial data (such as running log) is sent to the first clothes by credible SDK
Business device so that initial data (such as running log) can differentiate that request be triggered to up to server earlier than flow, so that clothes
Device be engaged in when receiving traffic requests, it is easier to complete the judgement of step S300.
Further, STID corresponding IP address and the matched judgements of SIP in first server are specific in step S300
Including:
A kind of optional mode is, if IPA ≠ Null, and SIP is the only element in IPA, then judging that STID exists
Corresponding IP address in first server is matched with SIP, is otherwise judged as mismatching.
Preferred another way is, if SIP ∈ IPA, to judge corresponding IPs of the STID in first server
Address is matched with SIP;Otherwise, it is judged as mismatching.The addresses IP that the preferred embodiment fully takes into account mobile terminal can
The case where capable of rationally changing within the time of S1, such as be altered to another WIFI from the region that a WIFI is covered and cover
The region of lid, or it is altered to the region of mobile network's connection, so that the addresses IP dynamically distributed change, that is, exist
In the S1 times, two or more IP address may reasonably occur in mobile terminal.Therefore, if SIP with the two or it is multiple
One in IP address consistent, and it is consistent with the IP address in operation data to be considered as SIP, can to which kind mode is compared earlier above
Reduce the False Rate that flow differentiates.
Wherein, IPA is the set of corresponding IP address of the STID in first server.
Those skilled in the art know, as long as IPA1 and SIP meet forgoing relationship, that is, fall into protection scope of the present invention,
The present invention is not intended to limit the specific method step for the forgoing relationship for obtaining IPA1 and SIP.
According to the present invention, in step S300, if STID corresponding IP address in first server is mismatched with SIP,
Or T-T1 > S1, then executing step S400;
Step S400, if the corresponding possessions SIP encode SAC and STID corresponding possession codings in first server
Match, and T-T1≤S2, then setting flow status to FS2.Wherein, S2 is the second time threshold more than S1, it is preferred that S2
General value is 8-16 hours, is most preferably set as 12 hours.
STID judgements of corresponding possession codes match in first server specifically include in step S400:
A kind of optional mode is, if DID ≠ Null, and SAC is the only element in DID, then judge SAC with
STID corresponding possession codes match in first server, is otherwise judged as mismatching.
Preferred another way is, if SAC ∈ DID, to judge that SAC and STID are corresponding in first server
Otherwise possession codes match is judged as mismatching;Wherein, DID is corresponding possession codings of the STID in first server
Set.The corresponding geographic area of IP address that preferred embodiment fully takes into account mobile terminal may be within the time of S2
The case where rationally changing, such as it is moved to another city from a city, to which kind mode is compared earlier above, can reduce
The False Rate that flow differentiates.
Further, IP address and the mapping relations of geographic area may be used either type in the prior art and realize,
Geographic area may range from city (such as Beijing), or the specific region in city (such as Haidian District or in
Close village area etc.).
According to the present invention, in step S400, if the corresponding possession coding SAC and STID of SIP are right in first server
The possession coding answered mismatches or T-T1 > S2, then setting flow status to FS3.
In step S200, if STID is not present in the end of the operation data of first server (such as Redis servers)
It holds in ID, then according to the second aspect of the invention, executing step S500.It is worth noting that, second side of the present invention
The technical term and technological means used in face is merely able to the technical term used and technology hand with the first aspect of the invention
Section is identical or essentially identical, the reason of based on succinctly expressing, applicant no longer to relevant and technical term and technological means into
Row repeats.
Step S500, if STID is present in second server (such as being also implemented as Redis servers), and T-T2≤
S3, then executing step S600;If STID is not present in second server or T-T2 > S3, it will differentiate request
Flow status is set as FS5.Wherein, the Termination ID of multiple mobile terminals, each Termination ID are stored in the second server
The nearest active time of corresponding mobile terminal and one or more possession codings;The S3 is third time threshold, when third
Between threshold value be 2-6 months, preferably 3 months.The T2 is the nearest active time corresponding to STID stored in second server.
Step S600, if the corresponding possession in second server of STID encodes possession coding corresponding with SIP
SIPC is matched, then will differentiate that the flow status of request is set as FS4;, whereas if STID's is corresponding in second server
Possession encode corresponding with SIP possession coding SIPC mismatches, then setting flow status to FS6.
The similar technology of first aspect using the present invention, STID is corresponding in second server in the step S600
Possession encodes the matched judgements of possession coding SIPC corresponding with SIP and specifically includes:
A kind of optional mode is, if DID2 ≠ Null, and SIPC is the only element in DID, then judging SIPC
With STID in second server corresponding possession codes match, be otherwise judged as mismatching.
Preferred another way is, if SIPC ∈ DID2, to judge that SIPC and STID are right in second server
Otherwise the possession codes match answered is judged as mismatching;Wherein, DID2 is that corresponding possessions of the STID in second server is compiled
The set of code.
First and second aspect according to the present invention, further includes step S700.
Step S700, if flow status is located in real traffic status list TFS, then it is determined that flow differentiates that request is
Real traffic.Wherein, the flow status in TFS is self-defined flow status, and two methods are provided in the present invention to be promoted
Flexibility.For example, TFS={ FS1, FS2 } can be defined, certainly when the first aspect of the invention is used alone
TFS={ FS1 } or TFS={ FS1, FS2, FS3 } can also be defined;It, can when the second aspect of the invention is used alone
To define TFS={ FS3 };Be used in combination the present invention first and second aspect when, can define TFS=FS1, FS2,
FS4}。
In addition, those skilled in the art know, although in the present invention in fig. 1 by the unified drafting of first and second aspect,
But this does not interfere two aspects of the present invention are independent to implement, to constitute two technical solutions arranged side by side, do not repel yet by
Two aspects of present aspect are used in combination, to constitute the independent technique scheme of combination.
Further, the present invention also provides the update methods of operation data in first server.Specifically, when the first clothes
When business device receives the running log that credible SDK is sent, operation data is updated using running log, running log includes credible
Termination ID, IP address of terminal and the running log generated time LT of mobile terminal where SDK;Update specifically includes:
Step S1010 executes step if the Termination ID in running log is present in the Termination ID of operation data
S1020。
Step S1020, if the IP address of terminal in running log is with being present in the corresponding IP of Termination ID of operation data
In location, then obtaining the corresponding time IPT of IP address and the corresponding time SACT of the corresponding possession coding of IP address;If LT-
IPT > S1, then updating IPT and SACT using LT;It is no to then follow the steps S1020.
Step S1020 updates SACT if LT-IPT > S2 using LT.
The above is only the better embodiment of the present invention, is not intended to limit the present invention in any form, every
According to the technical essence of the invention to any simple modification, equivalent variations made by embodiment of above, each fall within the present invention's
Within protection domain.
Claims (10)
1. a kind of method differentiating real traffic, includes the following steps:
Step S100 receives flow and differentiates request and record the time T for receiving the flow discriminating request, the flow mirror
It does not invite and asks including STID, SIP;Wherein, STID is the Termination ID of traffic source terminal, and SIP is the IP address of traffic source terminal;
Step S200, if STID is present in the terminal of the operation data of first server (such as being embodied as Redis servers)
In ID, then executing step S300;The first server is stored with from the credible SDK hairs for being installed to multiple mobile terminals
The operation data sent, when the operation data includes the Termination ID for the mobile terminal that credible SDK is mounted to, operation data transmission
Mobile terminal IP address and generated time;
Step S300, if STID corresponding IP address in first server is matched with SIP, and T-T1≤S1, then will mirror
The flow status asked is not invited to be set as FS1;Wherein S1 is first time threshold, and T1 corresponds to for what is stored in first server
The generated time of STID and SIP;
Step S700, if flow status is located in real traffic status list TFS, then it is determined that flow differentiates that request is true
Flow.
2. the method according to claim 1 for differentiating real traffic, which is characterized in that STID is the in the step S300
Corresponding IP address is specifically included with the matched judgements of SIP in one server:
If IPA ≠ Null, and SIP is the only element in IPA, then judging corresponding IPs of the STID in first server
Address is matched with SIP, is otherwise judged as mismatching;Alternatively,
If SIP ∈ IPA, judge that corresponding IP address of the STID in first server is matched with SIP;Otherwise, judge
To mismatch;
Wherein, IPA is the set of corresponding IP address of the STID in first server.
3. the method according to claim 1 or 2 for differentiating real traffic, which is characterized in that the operation data further includes
Possession coding corresponding with IP address;In the step S300, if STID corresponding IP address and SIP in first server
Mismatch or T-T1>S1, then executing step S400;
Step S400, if the corresponding possessions SIP encode SAC and STID corresponding possession codes match in first server,
And T-T1≤S2, then setting flow status to FS2;Wherein, S2 is the second time threshold more than S1.
4. the method according to claim 3 for differentiating real traffic, which is characterized in that STID is the in the step S400
The judgement of corresponding possession codes match specifically includes in one server:
If DID ≠ Null, and SAC is the only element in DID, then judging that SAC and STID are corresponding in first server
Possession codes match, be otherwise judged as mismatching;Alternatively,
If SAC ∈ DID, judges SAC and the STID corresponding possession codes match in first server, be otherwise judged as
It mismatches;Wherein, DID is the set of corresponding possession codings of the STID in first server.
5. the method according to claim 3 or 4 for differentiating real traffic, which is characterized in that in the step S400, if
The corresponding possessions SIP encode SAC and STID corresponding possession coding mismatch or T-T1 in first server>S2, then
Set flow status to FS3.
6. the method according to claim 5 for differentiating real traffic, which is characterized in that when the first server receives
When the running log that credible SDK is sent, operation data is updated using running log, the running log includes the credible places SDK
Mobile terminal Termination ID, IP address of terminal and running log generated time LT;The update specifically includes:
Step S1010 executes step if the Termination ID in running log is present in the Termination ID of operation data
S1020;
Step S1020, if the IP address of terminal in running log is present in the corresponding IP address of Termination ID of operation data,
It so obtains the corresponding time IPT of IP address and the corresponding possession of IP address encodes corresponding time SACT;If LT-IPT>
S1, then updating IPT and SACT using LT;It is no to then follow the steps S1020;
Step S1020, if LT-IPT>S2, then updating SACT using LT.
7. according to the method for any discriminating real traffic of claim 1-5, wherein first time threshold 10-60
Minute, preferably 30 minutes.
8. according to the method for any discriminating real traffic of claim 1-5, wherein second time threshold is that 8-16 is small
When, preferably 12 hours.
9. according to the method for any discriminating real traffic of claim 1-5, wherein the mobile terminal ID is movement
The IMEI of terminal.
10. according to the method for any discriminating real traffic of claim 1-5, wherein the flow status in the TFS
For self-defined flow status.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810536667.1A CN108810948B (en) | 2018-05-29 | 2018-05-29 | Method for identifying real flow |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810536667.1A CN108810948B (en) | 2018-05-29 | 2018-05-29 | Method for identifying real flow |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108810948A true CN108810948A (en) | 2018-11-13 |
CN108810948B CN108810948B (en) | 2021-03-19 |
Family
ID=64089213
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810536667.1A Active CN108810948B (en) | 2018-05-29 | 2018-05-29 | Method for identifying real flow |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108810948B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112511459A (en) * | 2020-11-23 | 2021-03-16 | 恒安嘉新(北京)科技股份公司 | Traffic identification method and device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1741526A (en) * | 2005-09-05 | 2006-03-01 | 北京启明星辰信息技术有限公司 | Method and system for detecting exception flow of network |
CN101438255A (en) * | 2004-12-07 | 2009-05-20 | 思科技术公司 | Network and application attack protection based on application layer message inspection |
CN101577645A (en) * | 2009-06-12 | 2009-11-11 | 北京星网锐捷网络技术有限公司 | Method and device for detecting counterfeit network equipment |
CN102394868A (en) * | 2011-10-12 | 2012-03-28 | 镇江金钛软件有限公司 | Detection method for DDoS attacked address of dynamic threshold |
CN102480711A (en) * | 2010-11-30 | 2012-05-30 | 中国电信股份有限公司 | Flow accounting method and packet data service node |
CN107707509A (en) * | 2016-08-08 | 2018-02-16 | 阿里巴巴集团控股有限公司 | Identify and assist in identifying the method, apparatus and system of false flow |
-
2018
- 2018-05-29 CN CN201810536667.1A patent/CN108810948B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101438255A (en) * | 2004-12-07 | 2009-05-20 | 思科技术公司 | Network and application attack protection based on application layer message inspection |
CN1741526A (en) * | 2005-09-05 | 2006-03-01 | 北京启明星辰信息技术有限公司 | Method and system for detecting exception flow of network |
CN101577645A (en) * | 2009-06-12 | 2009-11-11 | 北京星网锐捷网络技术有限公司 | Method and device for detecting counterfeit network equipment |
CN102480711A (en) * | 2010-11-30 | 2012-05-30 | 中国电信股份有限公司 | Flow accounting method and packet data service node |
CN102394868A (en) * | 2011-10-12 | 2012-03-28 | 镇江金钛软件有限公司 | Detection method for DDoS attacked address of dynamic threshold |
CN107707509A (en) * | 2016-08-08 | 2018-02-16 | 阿里巴巴集团控股有限公司 | Identify and assist in identifying the method, apparatus and system of false flow |
Non-Patent Citations (1)
Title |
---|
曹晓梅: "《基于流量预测的传感器网络拒绝服务攻击检测方案》", 《计算机学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112511459A (en) * | 2020-11-23 | 2021-03-16 | 恒安嘉新(北京)科技股份公司 | Traffic identification method and device, electronic equipment and storage medium |
CN112511459B (en) * | 2020-11-23 | 2024-04-26 | 恒安嘉新(北京)科技股份公司 | Traffic identification method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108810948B (en) | 2021-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11411897B2 (en) | Communication method and communication apparatus for message queue telemetry transport | |
CN103650545B (en) | Machine To Machine (M2M) application server, XDMS servers and the method for M2M application group management | |
CN105657003B (en) | Information processing method and server | |
CN104427519B (en) | IP address ownership place management method and device | |
CN110070359A (en) | Verification of data system, method, calculating equipment and storage medium based on block chain | |
CN109495592A (en) | Data collaborative method and electronic equipment | |
CN106603394A (en) | Method and device for realizing subscription notification | |
CN105245445A (en) | Internet of things gateway | |
CN104159209A (en) | Data traffic calibration method and device for mobile terminal | |
US7239878B2 (en) | Telecommunication method for a wireless network | |
US9805111B2 (en) | Data model pattern updating in a data collecting system | |
CN105228140A (en) | A kind of data access method and device | |
CN109923847A (en) | Call discovery method, apparatus, equipment and the storage medium of link | |
CN109246078B (en) | Data interaction method and server | |
CN108810947A (en) | The IP address-based server for differentiating real traffic | |
KR20210043865A (en) | NGSI-LD API Wrapping Method | |
CN101110858A (en) | Telecommunication report generation system and method thereof | |
RU2008112155A (en) | SINGLE-PEOPLE PROTOCOL OF RESOLUTION OF NAMES OF SIMPLE INTERFACE OF APPLICATION PROGRAM | |
CN108810948A (en) | A method of differentiating real traffic | |
CN105450589A (en) | Remote procedure call method and system | |
CN114301870A (en) | User identity management method and related product | |
CN108093428B (en) | Server for authenticating real traffic | |
CN108768773A (en) | The IP address-based server for differentiating real traffic | |
CN104506743A (en) | Method and device for dynamically intercepting call | |
CN106326296A (en) | Data query method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 310012 Room 418, West District, Building A, 525 Xixi Road, Xihu District, Hangzhou City, Zhejiang Province Applicant after: Daily interactive Co., Ltd Address before: 310012 Room 418, West District, Building A, 525 Xixi Road, Xihu District, Hangzhou City, Zhejiang Province Applicant before: ZHEJIANG MEIRI INTERDYNAMIC NETWORK TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |