CN109274669A - One kind bypassing WAF reverse proxy method based on online traffic mirroring - Google Patents
One kind bypassing WAF reverse proxy method based on online traffic mirroring Download PDFInfo
- Publication number
- CN109274669A CN109274669A CN201811087143.5A CN201811087143A CN109274669A CN 109274669 A CN109274669 A CN 109274669A CN 201811087143 A CN201811087143 A CN 201811087143A CN 109274669 A CN109274669 A CN 109274669A
- Authority
- CN
- China
- Prior art keywords
- request
- waf
- service device
- response
- testing service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Abstract
The invention discloses one kind to bypass WAF reverse proxy method based on online traffic mirroring, comprising: step S100: in WAF system site configuration testing service device;Step S200: the service traffics on service server are carried out real-time mirror image by testing service device;Step S300: the request and response that testing service device obtains mirror image in service traffics are parsed and are pre-processed;Step S400: pretreated request and response are sent to WAF system and carry out safety detection by testing service device.The present invention is using bypass deployment way, in the case where not influencing business on line, WAF system function can be tested, avoid having network topology on modification line, and real traffic on line is obtained using bypass is carried out in linear flow rate, flow on line is analyzed in real time.
Description
Technical field
The present invention relates to technical field of network security, are a kind of reversed based on online traffic mirroring bypass WAF specifically
Proxy Method.
Background technique
With e-commerce, Web bank, E-Government it is prevailing, WEB server carrying business value it is higher and higher,
The security threat that WEB server is faced also increases with it, and therefore, the defence for WEB application layer becomes inexorable trend, WAF
(WebApplicationFirewall, WEB application firewall) product comes into vogue.WAF product can according to Form division
To be divided into three kinds, hardware, software and cloud service.Software WAF is due to function and the defect of aspect of performance, gradually by market institute
It eliminates.It just rises within cloud WAF nearly 2 years, product and market also all also prematurities.Compared with first two form, hardware WAF warp
Cross the application of many years, in all respects all in relative maturity and perfect and existing market WAF product mainstream form.For line
Upper already existing business progress WAF product is online, and WAF product stability and reliability are most important.
Summary of the invention
The purpose of the present invention is to provide one kind to bypass WAF reverse proxy method based on online traffic mirroring, for solving
Simulation actual services flow but also not traffic affecting problem cannot not only be reached to the test of WAF system in the prior art.
The present invention is solved the above problems by following technical proposals:
One kind bypassing WAF reverse proxy method based on online traffic mirroring, comprising:
Step S100: in WAF system site configuration testing service device;
Step S200: the service traffics on service server are carried out real-time mirror image by testing service device;
Step S300: the request and response that testing service device obtains mirror image in service traffics carry out parsing and pre- place
Reason;
Step S400: pretreated request and response are sent to WAF system and carry out safety detection by testing service device.
Survey for testing WAF system function is installed on WAF system site configuration testing service device, testing service device
Try software.Testing service device by the traffic mirroring program on service server, by user issue the request of service server with
And response of the service server to request.Traffic mirroring program, first creation service traffics selection rule, and by service server
Network interface card and network protocol module unbind, and service server network interface card is associated with mirror module, then by mirror module and network protocol
Module relation selects the received data on flows packet of service server network interface card according to flow selection rule, and will meet stream
The data on flows packet of amount selection rule is sent to testing service device by udp protocol, and data on flows packet is issued business service
Device network interface card.Service server goes out the data on flows Packet analyzing received to request and response, and is located in advance to request and response
Pretreated request is issued WAF system and carries out safety detection by reason, and whether WAF system detection has attack, attack if it exists,
Exception is then returned to testing service device, returns to request if without attack, testing service device is according to the request ID of return return pair
The response answered, WAF system carry out safety detection to the response of return, attack if it exists, then return to exception to testing service device, if
Then response is returned without attack.Whether testing service device is consistent with the quantity of return request and the return of WAF system to request
Whether response is corresponding with the request of transmission, to detect the function of WAF system.Entire bypass of the detection process based on service server
The testing service device of deployment, therefore will not influence business on line, and due to by the way of traffic mirroring, it both can be to true on line
Real service traffics are simulated, and do not need have topology on modification line.
Further, the step S200 is specifically included:
Step S210: user sends http request to load balancer;
Step S220: http request is transmitted to service server by load balancer;
Step S230: service server passes through net by http request and to the response of http request using traffic mirroring program
Network layers real-time mirror image is to testing service device.
When user sends a request to service server, service server by traffic mirroring program in real time will request with
And service server does the response that request is made and is mirrored to testing service device, and the true mould in linear flow rate on line may be implemented
It is quasi-, as the flow of test WAF system, therefore, business on line is neither influenced, and can be surveyed with real simulation service server
Examination.
Further, the step S400 is specifically included:
Step S410: pretreated request is sent to WAF system, the request that WAF system docking is received by testing service device
Safety detection is carried out, if detecting attack, is returned abnormal to testing service device;Otherwise, WAF system forwards are requested to test
Server;
Step S420: the corresponding data of the request of WAF system forwards are returned to WAF system by testing service device;
The data that step S430:WAF system docking receives carry out safety detection and return to exception if detecting attack
Give testing service device;Otherwise, WAF system forwards respond to testing service device;
Step S440: the request and response that testing service device returns to the request of transmission and response with WAF system are to score
Analysis, obtains testing result.
Pretreated request is sent to WAF system by testing service device, carries out safety detection to request by WAF system,
There is attack in request if detected, returns to exception and return request if not detecting attack to testing service device
Testing service device is returned, testing service device records and judge the request sent and whether the request returned is consistent, and asking return
Corresponding response is asked to be sent to WAF system, the response that WAF system docking receives carries out safety detection, if detecting attack,
Exception is returned to testing service device, if not detecting attack, returning response gives testing service device, testing service device record
And whether the response for detecting the return of WAF system is corresponding with request is sent, and analyzes and determines the function of WAF system.In testing service device
Test program is installed, which mainly possesses the function of three aspects, and (1) UDP mirror image receives service, receives image program
The UDP message packet sended over parses the TCP data of encapsulation out of UDP message packet, realizes the parsing of request and response;(2)
Request and response are pre-processed;(3) according to the response results of WAF system, statistical analysis output test report, wherein reporting an error
Exception response, attack-response, normal response three classes result.
Further, carrying out pretreatment to request in the step S300 includes carrying out the TCP data packet of same request
Assembling, and increase xff head in the http header of request, for carrying out true source client mark, Yi Ji to request
Increase request-test-id head in the http header of request, for carrying out unique identification to request;Step S300 is to sound
Should carry out pretreatment includes assembling to the TCP data packet response contents of same request, and coded format carries out according to response
Segment processing.
Since the packet capturing in request is segmentation, it is possible to which there are have multiple requests or one is asked in a data packet
It asks inside different data packets, it is therefore desirable to the same request in different data packet be assembled, TCP data packet is handled
Situations such as random ordering, packet loss, increases xff and request-test-id head in the http header of request, is identified true
Real source client and unique identification can trace to the source to request.Since the corresponding response of the same request may also be respectively present
In multiple data packets, therefore, the pretreatment of response is needed to assemble the TCP data packet response contents of the same request,
Situations such as handling TCP out-of-order, packet loss, and coded format carries out segment processing according to response.
Compared with prior art, the present invention have the following advantages that and the utility model has the advantages that
The present invention can carry out WAF system function in the case where not influencing business on line using bypass deployment way
Test avoids having network topology on modification line, and obtains real traffic on line using bypass is carried out in linear flow rate, to line upstream
Amount is analyzed in real time.
Detailed description of the invention
Fig. 1 is flow chart of the invention.
Specific embodiment
The present invention is described in further detail below with reference to embodiment, embodiments of the present invention are not limited thereto.
Embodiment 1:
In conjunction with shown in attached drawing 1, one kind bypassing WAF reverse proxy method based on online traffic mirroring, comprising:
Step S100: in WAF system site configuration testing service device;
Step S200: the service traffics on service server are carried out real-time mirror image by testing service device:
Step S210: user sends http request to load balancer;
Step S220: http request is transmitted to service server by load balancer;
Step S230: service server passes through net by http request and to the response of http request using traffic mirroring program
Network layers real-time mirror image is to testing service device;
Step S300: the request and response that testing service device obtains mirror image in service traffics carry out parsing and pre- place
Situations such as reason: carrying out pretreatment to request includes assembling the TCP data packet of same request, processing TCP random ordering, packet loss,
And increase xff head in the http header of request, it is used to carry out true source client mark to request, and requesting
Http header in increase request-test-id head, for request carry out unique identification;Step S300 to respond into
Situations such as row pretreatment includes assembling to the TCP data packet response contents of same request, processing TCP random ordering, packet loss, and root
Segment processing is carried out according to response coded format;
Step S400: pretreated request and response are sent to WAF system and carry out safety detection by testing service device:
Step S410: pretreated request is sent to WAF system, the request that WAF system docking is received by testing service device
Safety detection is carried out, if detecting attack, is returned abnormal to testing service device;Otherwise, WAF system forwards are requested to test
Server;
Step S420: the corresponding data of the request of WAF system forwards are returned to WAF system by testing service device;
The data that step S430:WAF system docking receives carry out safety detection and return to exception if detecting attack
Give testing service device;Otherwise, WAF system forwards respond to testing service device;
Step S440: the request and response that testing service device returns to the request of transmission and response with WAF system are to score
Analysis, obtains testing result.
Survey for testing WAF system function is installed on WAF system site configuration testing service device, testing service device
Try software.Testing service device by the traffic mirroring program on service server, by user issue the request of service server with
And response of the service server to request.The step of traffic mirroring includes:
A1, initialization flow selection rule and UDP socket;
A2, cancel being associated with for network interface card and network protocol module in service server, creation network interface card is associated with mirror module,
Creation mirror module is associated with network protocol module;
A3, monitor whether network interface card receives the network packet outside service server;If so, A4 is then entered step, it is no
Then continue to monitor;The network packet from application layer whether is received while listening for network protocol module;If so, then entering step
Otherwise A7 continues to monitor;
A4, corresponding network packet is obtained from network interface card and network packet is pre-processed, judge whether network packet meets stream
Amount selection rule, such as meets and enters step A5, otherwise enter step A6;
A5, the network packet for meeting flow selection rule is sent by udp protocol to destination server;
A6, network packet is sent to network protocol module;
A7, corresponding network packet is obtained from network protocol module and network packet is pre-processed, judge that network packet is
It is no to meet flow rotary rule, such as meet and enter step A8, otherwise enters step A9;
A8, the corresponding network packet for meeting flow selection rule is sent by udp protocol to destination server;
A9, network packet is sent to network interface card.
Service server goes out to request from the data on flows Packet analyzing received and response, since the packet capturing in request is segmentation
, it is possible to there are have multiple requests or a request in a data packet inside different data packets, it is therefore desirable to right
Request pretreatment: the same request in different data packet is assembled, and increases xff head in the http header of request
With request-test-id head, it is identified true source client and unique identification, can be traced to the source request.Due to same
A to request corresponding response that be respectively present in multiple data packets, therefore, it is necessary to the pretreatments to response: ask same
It asks corresponding response to be assembled, WAF system then is issued into pretreated request and carries out safety detection, WAF system detection
Whether there is attack, attack if it exists, then returns to exception to testing service device, return to request if without attack, testing service device
Corresponding response is returned to according to the request ID of return, WAF system carries out safety detection to the response of return, attacks if it exists, then
Exception is returned to testing service device, returns to response if without attack.Testing service device to request with return request quantity be
Whether the response that no consistent and WAF system returns is corresponding with the request of transmission, to detect the function of WAF system.Testing service
Test program is installed, the test program test program mainly possesses the function of three aspects, and (1) UDP mirror image receives clothes in device
Business receives the UDP message packet that image program sends over, the TCP data of encapsulation is parsed out of UDP message packet, realizes request
With the parsing of response;(2) request and response are pre-processed;(3) according to the response results of WAF system, statistical analysis output
Test report, wherein the exception response that reports an error, attack-response, normal response three classes result.
When user sends a request to service server, service server by traffic mirroring program in real time will request with
And service server does the response that request is made and is mirrored to testing service device, and the true mould in linear flow rate on line may be implemented
It is quasi-, as the flow of test WAF system, the testing service device that entire detection process is disposed based on service server bypass, therefore
It will not influence business on line, and due to can not only simulate to actual services flow on line by the way of traffic mirroring, but also
Do not need have topology on modification line.
Although reference be made herein to invention has been described for explanatory embodiment of the invention, and above-described embodiment is only this hair
Bright preferable embodiment, embodiment of the present invention are not limited by the above embodiments, it should be appreciated that those skilled in the art
Member can be designed that a lot of other modification and implementations, these modifications and implementations will fall in principle disclosed in the present application
Within scope and spirit.
Claims (4)
1. one kind bypasses WAF reverse proxy method based on online traffic mirroring characterized by comprising
Step S100: in WAF system site configuration testing service device;
Step S200: the service traffics on service server are carried out real-time mirror image by testing service device;
Step S300: the request and response that testing service device obtains mirror image in service traffics are parsed and are pre-processed;
Step S400: pretreated request and response are sent to WAF system and carry out safety detection by testing service device.
2. according to claim 1 a kind of based on online traffic mirroring bypass WAF reverse proxy method, which is characterized in that
The step S200 is specifically included:
Step S210: user sends http request to load balancer;
Step S220: http request is transmitted to service server by load balancer;
Step S230: service server passes through network layer by http request and to the response of http request using traffic mirroring program
Real-time mirror image is to testing service device.
3. according to claim 2 a kind of based on online traffic mirroring bypass WAF reverse proxy method, which is characterized in that
The step S400 is specifically included:
Step S410: pretreated request is sent to WAF system by testing service device, and the request that WAF system docking is received carries out
Safety detection returns abnormal to testing service device if detecting attack;Otherwise, WAF system forwards are requested to testing service
Device;
Step S420: the corresponding data of the request of WAF system forwards are returned to WAF system by testing service device;
The data that step S430:WAF system docking receives carry out safety detection, if detecting attack, return abnormal to survey
Try server;Otherwise, WAF system forwards respond to testing service device;
Step S440: the request and response comparative analysis that testing service device returns to the request of transmission and response with WAF system obtain
To testing result.
4. according to claim 3 a kind of based on online traffic mirroring bypass WAF reverse proxy method, which is characterized in that
Carrying out pretreatment to request in the step S300 includes assembling the TCP data packet of same request, and in request
Increase xff head in http header, for carrying out true source client mark, and the http in request to request
Increase request-test-id head in header, for carrying out unique identification to request;Step S300 pre-processes response
Including assembling to the TCP data packet response contents of same request, and according to response, coded format carries out segment processing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811087143.5A CN109274669B (en) | 2018-09-18 | 2018-09-18 | WAF reverse proxy method based on online flow mirror image bypass |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811087143.5A CN109274669B (en) | 2018-09-18 | 2018-09-18 | WAF reverse proxy method based on online flow mirror image bypass |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109274669A true CN109274669A (en) | 2019-01-25 |
CN109274669B CN109274669B (en) | 2021-04-27 |
Family
ID=65196968
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811087143.5A Active CN109274669B (en) | 2018-09-18 | 2018-09-18 | WAF reverse proxy method based on online flow mirror image bypass |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109274669B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112165408A (en) * | 2020-09-16 | 2021-01-01 | 杭州安恒信息技术股份有限公司 | Test method and device for simulating client serial deployment environment |
CN112242990A (en) * | 2019-07-17 | 2021-01-19 | 卡巴斯基实验室股份制公司 | System and method for detecting anomalies in a technical system |
CN112437124A (en) * | 2020-11-09 | 2021-03-02 | 北京金山云网络技术有限公司 | Method and device for processing flow mirror image request and load balancing server |
CN114338169A (en) * | 2021-12-29 | 2022-04-12 | 北京天融信网络安全技术有限公司 | Request processing method, device, server and computer readable storage medium |
CN114915578A (en) * | 2021-02-08 | 2022-08-16 | 中国电信股份有限公司 | WAF test method and device |
CN115776414A (en) * | 2023-02-10 | 2023-03-10 | 天翼云科技有限公司 | Monitoring method, monitoring device, electronic equipment and readable storage medium |
CN117395082A (en) * | 2023-12-11 | 2024-01-12 | 深圳市移卡科技有限公司 | Service processing method, electronic device and storage medium |
CN114915578B (en) * | 2021-02-08 | 2024-04-30 | 中国电信股份有限公司 | WAF test method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103580943A (en) * | 2012-08-03 | 2014-02-12 | 亿赞普(北京)科技有限公司 | Network software online testing method and system |
CN106453299A (en) * | 2016-09-30 | 2017-02-22 | 北京奇虎科技有限公司 | Network security monitoring method and device, and cloud WEB application firewall |
CN106470136A (en) * | 2015-08-21 | 2017-03-01 | 腾讯科技(北京)有限公司 | Platform test method and platform testing system |
US20170244737A1 (en) * | 2016-02-23 | 2017-08-24 | Zenedge, Inc. | Analyzing Web Application Behavior to Detect Malicious Requests |
CN107426206A (en) * | 2017-07-17 | 2017-12-01 | 北京上元信安技术有限公司 | A kind of protector and method to web server |
CN107426202A (en) * | 2017-07-13 | 2017-12-01 | 北京知道未来信息技术有限公司 | A kind of method that automatic test WAF intercepts rule |
CN107634964A (en) * | 2017-10-13 | 2018-01-26 | 杭州迪普科技股份有限公司 | A kind of method of testing and device for WAF |
-
2018
- 2018-09-18 CN CN201811087143.5A patent/CN109274669B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103580943A (en) * | 2012-08-03 | 2014-02-12 | 亿赞普(北京)科技有限公司 | Network software online testing method and system |
CN106470136A (en) * | 2015-08-21 | 2017-03-01 | 腾讯科技(北京)有限公司 | Platform test method and platform testing system |
US20170244737A1 (en) * | 2016-02-23 | 2017-08-24 | Zenedge, Inc. | Analyzing Web Application Behavior to Detect Malicious Requests |
CN106453299A (en) * | 2016-09-30 | 2017-02-22 | 北京奇虎科技有限公司 | Network security monitoring method and device, and cloud WEB application firewall |
CN107426202A (en) * | 2017-07-13 | 2017-12-01 | 北京知道未来信息技术有限公司 | A kind of method that automatic test WAF intercepts rule |
CN107426206A (en) * | 2017-07-17 | 2017-12-01 | 北京上元信安技术有限公司 | A kind of protector and method to web server |
CN107634964A (en) * | 2017-10-13 | 2018-01-26 | 杭州迪普科技股份有限公司 | A kind of method of testing and device for WAF |
Non-Patent Citations (3)
Title |
---|
M. CANNATARO AND D. PASCUZZI: ""An object-based architecture for WAP-compliant applications"", 《PROCEEDINGS 11TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, LONDON, UK, 2000》 * |
博客博主: ""反向代理服务器-HTTP请求头中的XFF"", 《HTTPS://BLOG.CSDN.NET/QQ_38680693/ARTICLE/DETAILS/81661521》 * |
张爱华,林园,郁继锋,夏洪涛: ""面向Web应用的前置URL控制机制研究"", 《华中科技大学学报(自然科学版)》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112242990A (en) * | 2019-07-17 | 2021-01-19 | 卡巴斯基实验室股份制公司 | System and method for detecting anomalies in a technical system |
CN112165408A (en) * | 2020-09-16 | 2021-01-01 | 杭州安恒信息技术股份有限公司 | Test method and device for simulating client serial deployment environment |
CN112437124A (en) * | 2020-11-09 | 2021-03-02 | 北京金山云网络技术有限公司 | Method and device for processing flow mirror image request and load balancing server |
CN114915578A (en) * | 2021-02-08 | 2022-08-16 | 中国电信股份有限公司 | WAF test method and device |
CN114915578B (en) * | 2021-02-08 | 2024-04-30 | 中国电信股份有限公司 | WAF test method and device |
CN114338169A (en) * | 2021-12-29 | 2022-04-12 | 北京天融信网络安全技术有限公司 | Request processing method, device, server and computer readable storage medium |
CN114338169B (en) * | 2021-12-29 | 2023-11-14 | 北京天融信网络安全技术有限公司 | Request processing method, device, server and computer readable storage medium |
CN115776414A (en) * | 2023-02-10 | 2023-03-10 | 天翼云科技有限公司 | Monitoring method, monitoring device, electronic equipment and readable storage medium |
CN115776414B (en) * | 2023-02-10 | 2023-04-07 | 天翼云科技有限公司 | Monitoring method, monitoring device, electronic equipment and readable storage medium |
CN117395082A (en) * | 2023-12-11 | 2024-01-12 | 深圳市移卡科技有限公司 | Service processing method, electronic device and storage medium |
CN117395082B (en) * | 2023-12-11 | 2024-03-22 | 深圳市移卡科技有限公司 | Service processing method, electronic device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109274669B (en) | 2021-04-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274669A (en) | One kind bypassing WAF reverse proxy method based on online traffic mirroring | |
US6694288B2 (en) | System and method for automated analysis of load testing results | |
US7401141B2 (en) | Method and system for monitoring performance of distributed applications | |
US11233709B2 (en) | Method and system for monitoring performance of an application system | |
CN103117907B (en) | The method and system of server is accelerated in network speed method of testing and system, selection | |
US20060085420A1 (en) | Method and apparatus for monitoring real users experience with a website | |
US8732302B2 (en) | Method and system for monitoring performance of an application system | |
US20030115334A1 (en) | Business transaction monitoring system and method | |
KR102076862B1 (en) | Network performance indicator visualization method and apparatus, and system | |
US20160378615A1 (en) | Tracking Health Status In Software Components | |
US7577701B1 (en) | System and method for continuous monitoring and measurement of performance of computers on network | |
US20020167942A1 (en) | Server-site response time computation for arbitrary applications | |
US20210184937A1 (en) | Auto discovery of network proxies | |
US9231982B2 (en) | Data transfer for network interaction fraudulence detection | |
CN107179995A (en) | A kind of performance test methods of application program of computer network | |
US20220050902A1 (en) | Opentelemetry security extensions | |
CN109672662A (en) | Dependence construction method is serviced in a kind of micro services environment | |
US10462031B1 (en) | Network visibility for cotenant processes | |
CN110048908A (en) | Instruction Network Test System Platform, network test method and device | |
US11962666B2 (en) | User-configurable end user monitoring (EUM) | |
US20180121329A1 (en) | Uninstrumented code discovery | |
CN107104997A (en) | A kind of reorientation method, terminal and system | |
CN113542044A (en) | Network quality monitoring method and device and computing equipment | |
Toll et al. | IoTreeplay: Synchronous Distributed Traffic Replay in IoT Environments | |
FR3028973A1 (en) | SYSTEM AND METHOD FOR PERFORMANCE TESTING OF A COMPUTER INFRASTRUCTURE |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |