CN109274669A - One kind bypassing WAF reverse proxy method based on online traffic mirroring - Google Patents

One kind bypassing WAF reverse proxy method based on online traffic mirroring Download PDF

Info

Publication number
CN109274669A
CN109274669A CN201811087143.5A CN201811087143A CN109274669A CN 109274669 A CN109274669 A CN 109274669A CN 201811087143 A CN201811087143 A CN 201811087143A CN 109274669 A CN109274669 A CN 109274669A
Authority
CN
China
Prior art keywords
request
waf
service device
response
testing service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811087143.5A
Other languages
Chinese (zh)
Other versions
CN109274669B (en
Inventor
龚致
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN201811087143.5A priority Critical patent/CN109274669B/en
Publication of CN109274669A publication Critical patent/CN109274669A/en
Application granted granted Critical
Publication of CN109274669B publication Critical patent/CN109274669B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Abstract

The invention discloses one kind to bypass WAF reverse proxy method based on online traffic mirroring, comprising: step S100: in WAF system site configuration testing service device;Step S200: the service traffics on service server are carried out real-time mirror image by testing service device;Step S300: the request and response that testing service device obtains mirror image in service traffics are parsed and are pre-processed;Step S400: pretreated request and response are sent to WAF system and carry out safety detection by testing service device.The present invention is using bypass deployment way, in the case where not influencing business on line, WAF system function can be tested, avoid having network topology on modification line, and real traffic on line is obtained using bypass is carried out in linear flow rate, flow on line is analyzed in real time.

Description

One kind bypassing WAF reverse proxy method based on online traffic mirroring
Technical field
The present invention relates to technical field of network security, are a kind of reversed based on online traffic mirroring bypass WAF specifically Proxy Method.
Background technique
With e-commerce, Web bank, E-Government it is prevailing, WEB server carrying business value it is higher and higher, The security threat that WEB server is faced also increases with it, and therefore, the defence for WEB application layer becomes inexorable trend, WAF (WebApplicationFirewall, WEB application firewall) product comes into vogue.WAF product can according to Form division To be divided into three kinds, hardware, software and cloud service.Software WAF is due to function and the defect of aspect of performance, gradually by market institute It eliminates.It just rises within cloud WAF nearly 2 years, product and market also all also prematurities.Compared with first two form, hardware WAF warp Cross the application of many years, in all respects all in relative maturity and perfect and existing market WAF product mainstream form.For line Upper already existing business progress WAF product is online, and WAF product stability and reliability are most important.
Summary of the invention
The purpose of the present invention is to provide one kind to bypass WAF reverse proxy method based on online traffic mirroring, for solving Simulation actual services flow but also not traffic affecting problem cannot not only be reached to the test of WAF system in the prior art.
The present invention is solved the above problems by following technical proposals:
One kind bypassing WAF reverse proxy method based on online traffic mirroring, comprising:
Step S100: in WAF system site configuration testing service device;
Step S200: the service traffics on service server are carried out real-time mirror image by testing service device;
Step S300: the request and response that testing service device obtains mirror image in service traffics carry out parsing and pre- place Reason;
Step S400: pretreated request and response are sent to WAF system and carry out safety detection by testing service device.
Survey for testing WAF system function is installed on WAF system site configuration testing service device, testing service device Try software.Testing service device by the traffic mirroring program on service server, by user issue the request of service server with And response of the service server to request.Traffic mirroring program, first creation service traffics selection rule, and by service server Network interface card and network protocol module unbind, and service server network interface card is associated with mirror module, then by mirror module and network protocol Module relation selects the received data on flows packet of service server network interface card according to flow selection rule, and will meet stream The data on flows packet of amount selection rule is sent to testing service device by udp protocol, and data on flows packet is issued business service Device network interface card.Service server goes out the data on flows Packet analyzing received to request and response, and is located in advance to request and response Pretreated request is issued WAF system and carries out safety detection by reason, and whether WAF system detection has attack, attack if it exists, Exception is then returned to testing service device, returns to request if without attack, testing service device is according to the request ID of return return pair The response answered, WAF system carry out safety detection to the response of return, attack if it exists, then return to exception to testing service device, if Then response is returned without attack.Whether testing service device is consistent with the quantity of return request and the return of WAF system to request Whether response is corresponding with the request of transmission, to detect the function of WAF system.Entire bypass of the detection process based on service server The testing service device of deployment, therefore will not influence business on line, and due to by the way of traffic mirroring, it both can be to true on line Real service traffics are simulated, and do not need have topology on modification line.
Further, the step S200 is specifically included:
Step S210: user sends http request to load balancer;
Step S220: http request is transmitted to service server by load balancer;
Step S230: service server passes through net by http request and to the response of http request using traffic mirroring program Network layers real-time mirror image is to testing service device.
When user sends a request to service server, service server by traffic mirroring program in real time will request with And service server does the response that request is made and is mirrored to testing service device, and the true mould in linear flow rate on line may be implemented It is quasi-, as the flow of test WAF system, therefore, business on line is neither influenced, and can be surveyed with real simulation service server Examination.
Further, the step S400 is specifically included:
Step S410: pretreated request is sent to WAF system, the request that WAF system docking is received by testing service device Safety detection is carried out, if detecting attack, is returned abnormal to testing service device;Otherwise, WAF system forwards are requested to test Server;
Step S420: the corresponding data of the request of WAF system forwards are returned to WAF system by testing service device;
The data that step S430:WAF system docking receives carry out safety detection and return to exception if detecting attack Give testing service device;Otherwise, WAF system forwards respond to testing service device;
Step S440: the request and response that testing service device returns to the request of transmission and response with WAF system are to score Analysis, obtains testing result.
Pretreated request is sent to WAF system by testing service device, carries out safety detection to request by WAF system, There is attack in request if detected, returns to exception and return request if not detecting attack to testing service device Testing service device is returned, testing service device records and judge the request sent and whether the request returned is consistent, and asking return Corresponding response is asked to be sent to WAF system, the response that WAF system docking receives carries out safety detection, if detecting attack, Exception is returned to testing service device, if not detecting attack, returning response gives testing service device, testing service device record And whether the response for detecting the return of WAF system is corresponding with request is sent, and analyzes and determines the function of WAF system.In testing service device Test program is installed, which mainly possesses the function of three aspects, and (1) UDP mirror image receives service, receives image program The UDP message packet sended over parses the TCP data of encapsulation out of UDP message packet, realizes the parsing of request and response;(2) Request and response are pre-processed;(3) according to the response results of WAF system, statistical analysis output test report, wherein reporting an error Exception response, attack-response, normal response three classes result.
Further, carrying out pretreatment to request in the step S300 includes carrying out the TCP data packet of same request Assembling, and increase xff head in the http header of request, for carrying out true source client mark, Yi Ji to request Increase request-test-id head in the http header of request, for carrying out unique identification to request;Step S300 is to sound Should carry out pretreatment includes assembling to the TCP data packet response contents of same request, and coded format carries out according to response Segment processing.
Since the packet capturing in request is segmentation, it is possible to which there are have multiple requests or one is asked in a data packet It asks inside different data packets, it is therefore desirable to the same request in different data packet be assembled, TCP data packet is handled Situations such as random ordering, packet loss, increases xff and request-test-id head in the http header of request, is identified true Real source client and unique identification can trace to the source to request.Since the corresponding response of the same request may also be respectively present In multiple data packets, therefore, the pretreatment of response is needed to assemble the TCP data packet response contents of the same request, Situations such as handling TCP out-of-order, packet loss, and coded format carries out segment processing according to response.
Compared with prior art, the present invention have the following advantages that and the utility model has the advantages that
The present invention can carry out WAF system function in the case where not influencing business on line using bypass deployment way Test avoids having network topology on modification line, and obtains real traffic on line using bypass is carried out in linear flow rate, to line upstream Amount is analyzed in real time.
Detailed description of the invention
Fig. 1 is flow chart of the invention.
Specific embodiment
The present invention is described in further detail below with reference to embodiment, embodiments of the present invention are not limited thereto.
Embodiment 1:
In conjunction with shown in attached drawing 1, one kind bypassing WAF reverse proxy method based on online traffic mirroring, comprising:
Step S100: in WAF system site configuration testing service device;
Step S200: the service traffics on service server are carried out real-time mirror image by testing service device:
Step S210: user sends http request to load balancer;
Step S220: http request is transmitted to service server by load balancer;
Step S230: service server passes through net by http request and to the response of http request using traffic mirroring program Network layers real-time mirror image is to testing service device;
Step S300: the request and response that testing service device obtains mirror image in service traffics carry out parsing and pre- place Situations such as reason: carrying out pretreatment to request includes assembling the TCP data packet of same request, processing TCP random ordering, packet loss, And increase xff head in the http header of request, it is used to carry out true source client mark to request, and requesting Http header in increase request-test-id head, for request carry out unique identification;Step S300 to respond into Situations such as row pretreatment includes assembling to the TCP data packet response contents of same request, processing TCP random ordering, packet loss, and root Segment processing is carried out according to response coded format;
Step S400: pretreated request and response are sent to WAF system and carry out safety detection by testing service device:
Step S410: pretreated request is sent to WAF system, the request that WAF system docking is received by testing service device Safety detection is carried out, if detecting attack, is returned abnormal to testing service device;Otherwise, WAF system forwards are requested to test Server;
Step S420: the corresponding data of the request of WAF system forwards are returned to WAF system by testing service device;
The data that step S430:WAF system docking receives carry out safety detection and return to exception if detecting attack Give testing service device;Otherwise, WAF system forwards respond to testing service device;
Step S440: the request and response that testing service device returns to the request of transmission and response with WAF system are to score Analysis, obtains testing result.
Survey for testing WAF system function is installed on WAF system site configuration testing service device, testing service device Try software.Testing service device by the traffic mirroring program on service server, by user issue the request of service server with And response of the service server to request.The step of traffic mirroring includes:
A1, initialization flow selection rule and UDP socket;
A2, cancel being associated with for network interface card and network protocol module in service server, creation network interface card is associated with mirror module, Creation mirror module is associated with network protocol module;
A3, monitor whether network interface card receives the network packet outside service server;If so, A4 is then entered step, it is no Then continue to monitor;The network packet from application layer whether is received while listening for network protocol module;If so, then entering step Otherwise A7 continues to monitor;
A4, corresponding network packet is obtained from network interface card and network packet is pre-processed, judge whether network packet meets stream Amount selection rule, such as meets and enters step A5, otherwise enter step A6;
A5, the network packet for meeting flow selection rule is sent by udp protocol to destination server;
A6, network packet is sent to network protocol module;
A7, corresponding network packet is obtained from network protocol module and network packet is pre-processed, judge that network packet is It is no to meet flow rotary rule, such as meet and enter step A8, otherwise enters step A9;
A8, the corresponding network packet for meeting flow selection rule is sent by udp protocol to destination server;
A9, network packet is sent to network interface card.
Service server goes out to request from the data on flows Packet analyzing received and response, since the packet capturing in request is segmentation , it is possible to there are have multiple requests or a request in a data packet inside different data packets, it is therefore desirable to right Request pretreatment: the same request in different data packet is assembled, and increases xff head in the http header of request With request-test-id head, it is identified true source client and unique identification, can be traced to the source request.Due to same A to request corresponding response that be respectively present in multiple data packets, therefore, it is necessary to the pretreatments to response: ask same It asks corresponding response to be assembled, WAF system then is issued into pretreated request and carries out safety detection, WAF system detection Whether there is attack, attack if it exists, then returns to exception to testing service device, return to request if without attack, testing service device Corresponding response is returned to according to the request ID of return, WAF system carries out safety detection to the response of return, attacks if it exists, then Exception is returned to testing service device, returns to response if without attack.Testing service device to request with return request quantity be Whether the response that no consistent and WAF system returns is corresponding with the request of transmission, to detect the function of WAF system.Testing service Test program is installed, the test program test program mainly possesses the function of three aspects, and (1) UDP mirror image receives clothes in device Business receives the UDP message packet that image program sends over, the TCP data of encapsulation is parsed out of UDP message packet, realizes request With the parsing of response;(2) request and response are pre-processed;(3) according to the response results of WAF system, statistical analysis output Test report, wherein the exception response that reports an error, attack-response, normal response three classes result.
When user sends a request to service server, service server by traffic mirroring program in real time will request with And service server does the response that request is made and is mirrored to testing service device, and the true mould in linear flow rate on line may be implemented It is quasi-, as the flow of test WAF system, the testing service device that entire detection process is disposed based on service server bypass, therefore It will not influence business on line, and due to can not only simulate to actual services flow on line by the way of traffic mirroring, but also Do not need have topology on modification line.
Although reference be made herein to invention has been described for explanatory embodiment of the invention, and above-described embodiment is only this hair Bright preferable embodiment, embodiment of the present invention are not limited by the above embodiments, it should be appreciated that those skilled in the art Member can be designed that a lot of other modification and implementations, these modifications and implementations will fall in principle disclosed in the present application Within scope and spirit.

Claims (4)

1. one kind bypasses WAF reverse proxy method based on online traffic mirroring characterized by comprising
Step S100: in WAF system site configuration testing service device;
Step S200: the service traffics on service server are carried out real-time mirror image by testing service device;
Step S300: the request and response that testing service device obtains mirror image in service traffics are parsed and are pre-processed;
Step S400: pretreated request and response are sent to WAF system and carry out safety detection by testing service device.
2. according to claim 1 a kind of based on online traffic mirroring bypass WAF reverse proxy method, which is characterized in that The step S200 is specifically included:
Step S210: user sends http request to load balancer;
Step S220: http request is transmitted to service server by load balancer;
Step S230: service server passes through network layer by http request and to the response of http request using traffic mirroring program Real-time mirror image is to testing service device.
3. according to claim 2 a kind of based on online traffic mirroring bypass WAF reverse proxy method, which is characterized in that The step S400 is specifically included:
Step S410: pretreated request is sent to WAF system by testing service device, and the request that WAF system docking is received carries out Safety detection returns abnormal to testing service device if detecting attack;Otherwise, WAF system forwards are requested to testing service Device;
Step S420: the corresponding data of the request of WAF system forwards are returned to WAF system by testing service device;
The data that step S430:WAF system docking receives carry out safety detection, if detecting attack, return abnormal to survey Try server;Otherwise, WAF system forwards respond to testing service device;
Step S440: the request and response comparative analysis that testing service device returns to the request of transmission and response with WAF system obtain To testing result.
4. according to claim 3 a kind of based on online traffic mirroring bypass WAF reverse proxy method, which is characterized in that Carrying out pretreatment to request in the step S300 includes assembling the TCP data packet of same request, and in request Increase xff head in http header, for carrying out true source client mark, and the http in request to request Increase request-test-id head in header, for carrying out unique identification to request;Step S300 pre-processes response Including assembling to the TCP data packet response contents of same request, and according to response, coded format carries out segment processing.
CN201811087143.5A 2018-09-18 2018-09-18 WAF reverse proxy method based on online flow mirror image bypass Active CN109274669B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811087143.5A CN109274669B (en) 2018-09-18 2018-09-18 WAF reverse proxy method based on online flow mirror image bypass

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811087143.5A CN109274669B (en) 2018-09-18 2018-09-18 WAF reverse proxy method based on online flow mirror image bypass

Publications (2)

Publication Number Publication Date
CN109274669A true CN109274669A (en) 2019-01-25
CN109274669B CN109274669B (en) 2021-04-27

Family

ID=65196968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811087143.5A Active CN109274669B (en) 2018-09-18 2018-09-18 WAF reverse proxy method based on online flow mirror image bypass

Country Status (1)

Country Link
CN (1) CN109274669B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112165408A (en) * 2020-09-16 2021-01-01 杭州安恒信息技术股份有限公司 Test method and device for simulating client serial deployment environment
CN112242990A (en) * 2019-07-17 2021-01-19 卡巴斯基实验室股份制公司 System and method for detecting anomalies in a technical system
CN112437124A (en) * 2020-11-09 2021-03-02 北京金山云网络技术有限公司 Method and device for processing flow mirror image request and load balancing server
CN114338169A (en) * 2021-12-29 2022-04-12 北京天融信网络安全技术有限公司 Request processing method, device, server and computer readable storage medium
CN114915578A (en) * 2021-02-08 2022-08-16 中国电信股份有限公司 WAF test method and device
CN115776414A (en) * 2023-02-10 2023-03-10 天翼云科技有限公司 Monitoring method, monitoring device, electronic equipment and readable storage medium
CN117395082A (en) * 2023-12-11 2024-01-12 深圳市移卡科技有限公司 Service processing method, electronic device and storage medium
CN114915578B (en) * 2021-02-08 2024-04-30 中国电信股份有限公司 WAF test method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580943A (en) * 2012-08-03 2014-02-12 亿赞普(北京)科技有限公司 Network software online testing method and system
CN106453299A (en) * 2016-09-30 2017-02-22 北京奇虎科技有限公司 Network security monitoring method and device, and cloud WEB application firewall
CN106470136A (en) * 2015-08-21 2017-03-01 腾讯科技(北京)有限公司 Platform test method and platform testing system
US20170244737A1 (en) * 2016-02-23 2017-08-24 Zenedge, Inc. Analyzing Web Application Behavior to Detect Malicious Requests
CN107426206A (en) * 2017-07-17 2017-12-01 北京上元信安技术有限公司 A kind of protector and method to web server
CN107426202A (en) * 2017-07-13 2017-12-01 北京知道未来信息技术有限公司 A kind of method that automatic test WAF intercepts rule
CN107634964A (en) * 2017-10-13 2018-01-26 杭州迪普科技股份有限公司 A kind of method of testing and device for WAF

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580943A (en) * 2012-08-03 2014-02-12 亿赞普(北京)科技有限公司 Network software online testing method and system
CN106470136A (en) * 2015-08-21 2017-03-01 腾讯科技(北京)有限公司 Platform test method and platform testing system
US20170244737A1 (en) * 2016-02-23 2017-08-24 Zenedge, Inc. Analyzing Web Application Behavior to Detect Malicious Requests
CN106453299A (en) * 2016-09-30 2017-02-22 北京奇虎科技有限公司 Network security monitoring method and device, and cloud WEB application firewall
CN107426202A (en) * 2017-07-13 2017-12-01 北京知道未来信息技术有限公司 A kind of method that automatic test WAF intercepts rule
CN107426206A (en) * 2017-07-17 2017-12-01 北京上元信安技术有限公司 A kind of protector and method to web server
CN107634964A (en) * 2017-10-13 2018-01-26 杭州迪普科技股份有限公司 A kind of method of testing and device for WAF

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
M. CANNATARO AND D. PASCUZZI: ""An object-based architecture for WAP-compliant applications"", 《PROCEEDINGS 11TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, LONDON, UK, 2000》 *
博客博主: ""反向代理服务器-HTTP请求头中的XFF"", 《HTTPS://BLOG.CSDN.NET/QQ_38680693/ARTICLE/DETAILS/81661521》 *
张爱华,林园,郁继锋,夏洪涛: ""面向Web应用的前置URL控制机制研究"", 《华中科技大学学报(自然科学版)》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112242990A (en) * 2019-07-17 2021-01-19 卡巴斯基实验室股份制公司 System and method for detecting anomalies in a technical system
CN112165408A (en) * 2020-09-16 2021-01-01 杭州安恒信息技术股份有限公司 Test method and device for simulating client serial deployment environment
CN112437124A (en) * 2020-11-09 2021-03-02 北京金山云网络技术有限公司 Method and device for processing flow mirror image request and load balancing server
CN114915578A (en) * 2021-02-08 2022-08-16 中国电信股份有限公司 WAF test method and device
CN114915578B (en) * 2021-02-08 2024-04-30 中国电信股份有限公司 WAF test method and device
CN114338169A (en) * 2021-12-29 2022-04-12 北京天融信网络安全技术有限公司 Request processing method, device, server and computer readable storage medium
CN114338169B (en) * 2021-12-29 2023-11-14 北京天融信网络安全技术有限公司 Request processing method, device, server and computer readable storage medium
CN115776414A (en) * 2023-02-10 2023-03-10 天翼云科技有限公司 Monitoring method, monitoring device, electronic equipment and readable storage medium
CN115776414B (en) * 2023-02-10 2023-04-07 天翼云科技有限公司 Monitoring method, monitoring device, electronic equipment and readable storage medium
CN117395082A (en) * 2023-12-11 2024-01-12 深圳市移卡科技有限公司 Service processing method, electronic device and storage medium
CN117395082B (en) * 2023-12-11 2024-03-22 深圳市移卡科技有限公司 Service processing method, electronic device and storage medium

Also Published As

Publication number Publication date
CN109274669B (en) 2021-04-27

Similar Documents

Publication Publication Date Title
CN109274669A (en) One kind bypassing WAF reverse proxy method based on online traffic mirroring
US6694288B2 (en) System and method for automated analysis of load testing results
US7401141B2 (en) Method and system for monitoring performance of distributed applications
US11233709B2 (en) Method and system for monitoring performance of an application system
CN103117907B (en) The method and system of server is accelerated in network speed method of testing and system, selection
US20060085420A1 (en) Method and apparatus for monitoring real users experience with a website
US8732302B2 (en) Method and system for monitoring performance of an application system
US20030115334A1 (en) Business transaction monitoring system and method
KR102076862B1 (en) Network performance indicator visualization method and apparatus, and system
US20160378615A1 (en) Tracking Health Status In Software Components
US7577701B1 (en) System and method for continuous monitoring and measurement of performance of computers on network
US20020167942A1 (en) Server-site response time computation for arbitrary applications
US20210184937A1 (en) Auto discovery of network proxies
US9231982B2 (en) Data transfer for network interaction fraudulence detection
CN107179995A (en) A kind of performance test methods of application program of computer network
US20220050902A1 (en) Opentelemetry security extensions
CN109672662A (en) Dependence construction method is serviced in a kind of micro services environment
US10462031B1 (en) Network visibility for cotenant processes
CN110048908A (en) Instruction Network Test System Platform, network test method and device
US11962666B2 (en) User-configurable end user monitoring (EUM)
US20180121329A1 (en) Uninstrumented code discovery
CN107104997A (en) A kind of reorientation method, terminal and system
CN113542044A (en) Network quality monitoring method and device and computing equipment
Toll et al. IoTreeplay: Synchronous Distributed Traffic Replay in IoT Environments
FR3028973A1 (en) SYSTEM AND METHOD FOR PERFORMANCE TESTING OF A COMPUTER INFRASTRUCTURE

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant